Analysis
-
max time kernel
122s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 19:42
Static task
static1
Behavioral task
behavioral1
Sample
4314d785cea1470e12518301d08c1d79_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
4314d785cea1470e12518301d08c1d79_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
4314d785cea1470e12518301d08c1d79
-
SHA1
0e618872304d49e9eb8687155600bd134af80118
-
SHA256
f81ff37c86e302b80b85a566a5801a99958acc1fc4ddc08d08c04d3a34b1ca7a
-
SHA512
ab13980789d22746ac5e4db93345c86d0e48ccffcfc167a32ec467fd0dfacb7ffe9c0d6695d0147e914c3d8c67e715f1eac2be1b22ccd5ee0f1fe3e63ae066ef
-
SSDEEP
24576:5MqeaXUpR4wQV6icoEC3mfgjKcUemuZ+5:5MqhXUf4lkoEUagGcUerE5
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" BaTurajA v7.0.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" BaTurajA v7.0.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" BaTurajA v7.0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" BaTurajA v7.0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" BaTurajA v7.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" BaTurajA v7.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" BaTurajA v7.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" BaTurajA v7.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" BaTurajA v7.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" BaTurajA v7.0.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4314d785cea1470e12518301d08c1d79_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4624 BaTurajA v7.0.exe -
resource yara_rule behavioral2/memory/4624-19-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-27-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-36-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-41-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-30-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-47-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-42-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-28-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-48-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-29-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-62-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-63-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-88-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-94-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-104-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-168-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-171-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-176-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-177-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-196-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-197-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-213-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-216-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-220-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-222-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-223-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-225-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-231-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-232-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-234-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-238-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-239-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-251-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-252-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-254-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-256-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx behavioral2/memory/4624-259-0x0000000002AC0000-0x0000000003B7A000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" BaTurajA v7.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc BaTurajA v7.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" BaTurajA v7.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" BaTurajA v7.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" BaTurajA v7.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" BaTurajA v7.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" BaTurajA v7.0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" BaTurajA v7.0.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: BaTurajA v7.0.exe File opened (read-only) \??\Y: BaTurajA v7.0.exe File opened (read-only) \??\O: BaTurajA v7.0.exe File opened (read-only) \??\P: BaTurajA v7.0.exe File opened (read-only) \??\U: BaTurajA v7.0.exe File opened (read-only) \??\R: BaTurajA v7.0.exe File opened (read-only) \??\M: BaTurajA v7.0.exe File opened (read-only) \??\S: BaTurajA v7.0.exe File opened (read-only) \??\W: BaTurajA v7.0.exe File opened (read-only) \??\I: BaTurajA v7.0.exe File opened (read-only) \??\K: BaTurajA v7.0.exe File opened (read-only) \??\L: BaTurajA v7.0.exe File opened (read-only) \??\J: BaTurajA v7.0.exe File opened (read-only) \??\N: BaTurajA v7.0.exe File opened (read-only) \??\Q: BaTurajA v7.0.exe File opened (read-only) \??\T: BaTurajA v7.0.exe File opened (read-only) \??\V: BaTurajA v7.0.exe File opened (read-only) \??\E: BaTurajA v7.0.exe File opened (read-only) \??\G: BaTurajA v7.0.exe File opened (read-only) \??\H: BaTurajA v7.0.exe File opened (read-only) \??\Z: BaTurajA v7.0.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf BaTurajA v7.0.exe File opened for modification F:\autorun.inf BaTurajA v7.0.exe -
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe BaTurajA v7.0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe BaTurajA v7.0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe BaTurajA v7.0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe BaTurajA v7.0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe BaTurajA v7.0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe BaTurajA v7.0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe BaTurajA v7.0.exe File opened for modification C:\Program Files\7-Zip\7z.exe BaTurajA v7.0.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe BaTurajA v7.0.exe File opened for modification C:\Program Files\7-Zip\7zG.exe BaTurajA v7.0.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe BaTurajA v7.0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\e575ed9 BaTurajA v7.0.exe File opened for modification C:\Windows\SYSTEM.INI BaTurajA v7.0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4404 msedge.exe 4404 msedge.exe 4076 msedge.exe 4076 msedge.exe 3144 msedge.exe 3144 msedge.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4872 identity_helper.exe 4872 identity_helper.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe Token: SeDebugPrivilege 4624 BaTurajA v7.0.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4624 BaTurajA v7.0.exe 4624 BaTurajA v7.0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 628 wrote to memory of 4624 628 4314d785cea1470e12518301d08c1d79_JaffaCakes118.exe 86 PID 628 wrote to memory of 4624 628 4314d785cea1470e12518301d08c1d79_JaffaCakes118.exe 86 PID 628 wrote to memory of 4624 628 4314d785cea1470e12518301d08c1d79_JaffaCakes118.exe 86 PID 4624 wrote to memory of 792 4624 BaTurajA v7.0.exe 8 PID 4624 wrote to memory of 800 4624 BaTurajA v7.0.exe 9 PID 4624 wrote to memory of 388 4624 BaTurajA v7.0.exe 13 PID 4624 wrote to memory of 3052 4624 BaTurajA v7.0.exe 51 PID 4624 wrote to memory of 3112 4624 BaTurajA v7.0.exe 52 PID 4624 wrote to memory of 3152 4624 BaTurajA v7.0.exe 53 PID 4624 wrote to memory of 3356 4624 BaTurajA v7.0.exe 55 PID 4624 wrote to memory of 3540 4624 BaTurajA v7.0.exe 57 PID 4624 wrote to memory of 3720 4624 BaTurajA v7.0.exe 58 PID 4624 wrote to memory of 3812 4624 BaTurajA v7.0.exe 59 PID 4624 wrote to memory of 3880 4624 BaTurajA v7.0.exe 60 PID 4624 wrote to memory of 3984 4624 BaTurajA v7.0.exe 61 PID 4624 wrote to memory of 3140 4624 BaTurajA v7.0.exe 62 PID 4624 wrote to memory of 1048 4624 BaTurajA v7.0.exe 74 PID 4624 wrote to memory of 2856 4624 BaTurajA v7.0.exe 76 PID 4624 wrote to memory of 4768 4624 BaTurajA v7.0.exe 80 PID 4624 wrote to memory of 5056 4624 BaTurajA v7.0.exe 81 PID 4624 wrote to memory of 628 4624 BaTurajA v7.0.exe 82 PID 4624 wrote to memory of 628 4624 BaTurajA v7.0.exe 82 PID 4624 wrote to memory of 3576 4624 BaTurajA v7.0.exe 84 PID 4624 wrote to memory of 1032 4624 BaTurajA v7.0.exe 85 PID 4624 wrote to memory of 3144 4624 BaTurajA v7.0.exe 87 PID 4624 wrote to memory of 3144 4624 BaTurajA v7.0.exe 87 PID 3144 wrote to memory of 3024 3144 msedge.exe 88 PID 3144 wrote to memory of 3024 3144 msedge.exe 88 PID 4624 wrote to memory of 3964 4624 BaTurajA v7.0.exe 89 PID 4624 wrote to memory of 3964 4624 BaTurajA v7.0.exe 89 PID 3964 wrote to memory of 2372 3964 msedge.exe 90 PID 3964 wrote to memory of 2372 3964 msedge.exe 90 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 PID 3144 wrote to memory of 440 3144 msedge.exe 91 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" BaTurajA v7.0.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:800
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:388
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3112
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3152
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\4314d785cea1470e12518301d08c1d79_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4314d785cea1470e12518301d08c1d79_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\~sfx0055108380\BaTurajA v7.0.exe"C:\Users\Admin\AppData\Local\Temp\~sfx0055108380\BaTurajA v7.0.exe"3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cheaterbaturaja.blogspot.com/4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb99dc46f8,0x7ffb99dc4708,0x7ffb99dc47185⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:25⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:85⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:15⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:15⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:15⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:15⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:15⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:15⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:85⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2588 /prefetch:15⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:15⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:15⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:15⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,266772498597103973,17445164024792563801,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5060 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cheaterbaturaja.blogspot.com/4⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb99dc46f8,0x7ffb99dc4708,0x7ffb99dc47185⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,11878185895188537226,3905858646982146807,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:25⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,11878185895188537226,3905858646982146807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3540
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3720
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3812
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3880
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3984
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3140
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:1048
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2856
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4768
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:5056
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3576
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4164
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4672
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3012
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1132
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD57857fd010dd69b4f530e06cdb783352f
SHA171313de781263efb893e6f76fa8cfe3c35e04f1e
SHA2562546b727918bef3004aeffccc2700db375b39e9534cc23c559122039c9c859a1
SHA512f71536d668d196f617614a1fa917539f88fe5b5571bd66e381dbb9c65040152cc5c4de276ac68749b2e0f8e82112fac464c7ca0b94288a63741c465d1430c7cd
-
Filesize
3KB
MD5046d5f67e1750e2c5f7de4c80cddd329
SHA173a189fb15e7de2eeea2269b5b18858b2f7e2bf0
SHA25633888ccc805552116c2dd2116d73301fb14e8bd286d5bc676b97fe9f4a2f0011
SHA512d893d537feeef71da794d21faa1d3c89a26d2e3fce21928db2aa2b8b15e1c07e8433cd4b59b3e68fa9781e7bcdf304ac5b0c076955f5b1fbd4ed8b5d280dab30
-
Filesize
6KB
MD5ba2eebe0af6d659e09ba68636df62250
SHA183bbbcd4572778fe219698d8ebdd7c0f6f9b7d6c
SHA256fa06259c53c5c30c1caee194e86c5572bb046c0af2bd52d0af8b4a7ee2e1c6b6
SHA5120b074da13234977434204bbf592a1972a1469e6ba0c1d5a80fc012ae58f4d236deec2f5fad5ec63b21a3863001fa6c71badd1e6826abe756bee95704af2cb908
-
Filesize
8KB
MD5f1c3a4b19dfc16e0ba87ebc65af3f26c
SHA10b4801b1795c6bf4b5028a3670ff677bbe9b9479
SHA25628a65fae1b4dd682c81671e2af3f7102184311b5a6fc7e0b30f50c6c0e23b809
SHA5126fe8bfa1456f8e7c531de5e96d0c43cebcd461b8a402e1f47f730c33e2229e5065c0a39ba13e545ece47ced362631ba1f61ce18e08dab05e5b3761055e8c5381
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5011264d51bc2cb14182a9defd6710799
SHA194a9f1633a5c28e1f9a684f84b827d2bdb96baf7
SHA2562d978dfbee20042044b27e306cd641f5102b359c3a569939edead8caa2c1ec7c
SHA5128343b982a48709da3babedade8ed67f69ff683bd86884cfbdcef467e330c9c6b76c08f00e8febe81fb4432c0dcec86b041006380868b1ffb1d5dba2738759cdd
-
Filesize
11KB
MD533a3ae7b6b0a60e2b6b49837d2b3f322
SHA1f0f680aba10d1fbd1d3194f1d32a4177d059d098
SHA256863d934a703d62872c57ca56a520943a95da39a6d7611df16874c44832b46018
SHA5127e95fb1c2b4f8da927d06ca6be65a702dfdf0dac571bb33cdef159b16a8e148c30d4cd96e48a454164fc8ab3de9255d63024ce803765f89bc8dbd8623ac724bf
-
Filesize
212KB
MD59fd2e7510214e121f0f06899ec4a5aa7
SHA11b89d29c21874ed4845491be310294565d9aff2e
SHA256a4d2d7df4f2279e5d133712cc6b0c6de6baa81c451a2ea31facf7923c69cac70
SHA512b151cc02ac09009a387072d66c84afece0220f636f795a405e52a7ce80a443e70a02eea55959eace66b1c267827789898d9f22e3e6c3522e00eb237e773de86d
-
Filesize
97KB
MD5b5c817a52d9e47518b14fdd53eacafae
SHA1fc10bd6e1c66bcadac74e427398d3d6b7c62364b
SHA2563999bdd799cdfc773c9db9d6ab3a287b8d7fad644a0cb999630d3821f5ce0546
SHA512a0f42a6020a71bf0285fd3a72101141f7b0eb116bdb3ab75d4fc58c09aa05d9ee59f8a88d12870d27579900d75ecc7d4734537d366dd3759d48820767b46b19b