Analysis
-
max time kernel
134s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 23:11
Static task
static1
Behavioral task
behavioral1
Sample
154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
154318b9f7bb8b29a565a7a897cb7745
-
SHA1
7cb9ae7669a3ccdb76c2c24eedecf07cd6af8cf4
-
SHA256
64197e0039e3c21e521444b713047c1f91692fed9e265350bf97cc141dc622b3
-
SHA512
da52eeaef7f08025c5c65a8c3f175940acfdf1878c0d66437d3ef834f1c154d89e57c430825066939e23cbf05a45ec3147793cc1b1780f48972e30efe0840116
-
SSDEEP
24576:jbfU+yAGbQLIDXB20iTqF43bkrbE9Nu5n0Q5f25:8qG0abiTqFykHqNupO5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation YontooSetup-Silent.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe -
Executes dropped EXE 3 IoCs
pid Process 1156 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe 2316 YontooSetup-Silent.exe 3116 YontooSetup-Silent-090C.exe -
Loads dropped DLL 5 IoCs
pid Process 1156 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe 1156 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe 3116 YontooSetup-Silent-090C.exe 3116 YontooSetup-Silent-090C.exe 3116 YontooSetup-Silent-090C.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: YontooSetup-Silent-090C.exe File opened (read-only) \??\K: YontooSetup-Silent-090C.exe File opened (read-only) \??\N: YontooSetup-Silent-090C.exe File opened (read-only) \??\T: YontooSetup-Silent-090C.exe File opened (read-only) \??\U: YontooSetup-Silent-090C.exe File opened (read-only) \??\V: YontooSetup-Silent-090C.exe File opened (read-only) \??\X: YontooSetup-Silent-090C.exe File opened (read-only) \??\L: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\T: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\X: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\J: YontooSetup-Silent-090C.exe File opened (read-only) \??\Q: YontooSetup-Silent-090C.exe File opened (read-only) \??\S: YontooSetup-Silent-090C.exe File opened (read-only) \??\M: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\N: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\O: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\U: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\H: YontooSetup-Silent-090C.exe File opened (read-only) \??\L: YontooSetup-Silent-090C.exe File opened (read-only) \??\G: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\Y: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\G: YontooSetup-Silent-090C.exe File opened (read-only) \??\R: YontooSetup-Silent-090C.exe File opened (read-only) \??\Q: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\R: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\M: YontooSetup-Silent-090C.exe File opened (read-only) \??\Y: YontooSetup-Silent-090C.exe File opened (read-only) \??\E: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\H: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\I: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\P: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\I: YontooSetup-Silent-090C.exe File opened (read-only) \??\Z: YontooSetup-Silent-090C.exe File opened (read-only) \??\J: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\K: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\V: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\O: YontooSetup-Silent-090C.exe File opened (read-only) \??\S: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\W: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\Z: 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe File opened (read-only) \??\P: YontooSetup-Silent-090C.exe File opened (read-only) \??\W: YontooSetup-Silent-090C.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}\ = "Yontoo Layers" YontooSetup-Silent-090C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}\NoExplorer = "1" YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8} YontooSetup-Silent-090C.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Yontoo Layers Runtime\YontooIEClient.dll YontooSetup-Silent-090C.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YontooSetup-Silent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YontooSetup-Silent-090C.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\Recovery\Active 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}\ProgID YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}\InprocServer32\ = "C:\\Program Files (x86)\\Yontoo Layers Runtime\\YontooIEClient.dll" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}\TypeLib\Version = "1.0" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1AD27395-1659-4DFF-A319-2CFA243861A5}\ = "IApi" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}\TypeLib\ = "{D372567D-67C1-4B29-B3F0-159B52B3E967}" YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YontooIEClient.Layers\CLSID YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80922ee0-8a76-46ae-95d5-bd3c3fe0708d}\ = "71ed4d00-0ba2-4712-b2c3-fb1fe885780b" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{80922ee0-8a76-46ae-95d5-bd3c3fe0708d} YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}\ProxyStubClsid32 YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\YontooIEClient.DLL\AppID = "{CFDAFE39-20CE-451D-BD45-A37452F39CF0}" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YontooIEClient.Layers.1\CLSID\ = "{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}\InprocServer32\ = "C:\\Program Files (x86)\\Yontoo Layers Runtime\\YontooIEClient.dll" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1AD27395-1659-4DFF-A319-2CFA243861A5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}\ProgID YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}\InProcServer32\ThreadingModel = "Both" YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE} YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}\InprocServer32 YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D372567D-67C1-4B29-B3F0-159B52B3E967}\1.0\0\win32 YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}\ = "ILayers" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1AD27395-1659-4DFF-A319-2CFA243861A5}\NumMethods\ = "17" YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YontooIEClient.Api.1 YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D372567D-67C1-4B29-B3F0-159B52B3E967}\1.0\HELPDIR YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}\ = "ILayers" YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}\NumMethods YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}\TypeLib YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YontooIEClient.Layers YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}\ProgID\ = "YontooIEClient.Layers.1" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}\TypeLib\ = "{D372567D-67C1-4B29-B3F0-159B52B3E967}" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D372567D-67C1-4B29-B3F0-159B52B3E967}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Yontoo Layers Runtime" YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{FE9271F2-6EFD-44b0-A826-84C829536E93} YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}\TypeLib YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401} YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE9271F2-6EFD-44b0-A826-84C829536E93}\defaultEnableAppsList YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YontooIEClient.Api YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YontooIEClient.Api\CLSID YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YontooIEClient.Api\CurVer YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}\VersionIndependentProgID YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}\VersionIndependentProgID\ = "YontooIEClient.Api" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YontooIEClient.Layers\ = "Yontoo Layers" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YontooIEClient.Layers\CLSID\ = "{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{CFDAFE39-20CE-451D-BD45-A37452F39CF0}\ = "YontooIEClient" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YontooIEClient.Api.1\ = "Yontoo Layers Api" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1AD27395-1659-4DFF-A319-2CFA243861A5}\ProxyStubClsid32\ = "{10DE7085-6A1E-4D41-A7BF-9AF93E351401}" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE9271F2-6EFD-44b0-A826-84C829536E93}\ = "2f497908-a6ad-4835-8b53-86a63c9bfb75" YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8} YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}\TypeLib\Version = "1.0" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YontooIEClient.Api\CLSID\ = "{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YontooIEClient.Layers.1\ = "Yontoo Layers" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}\TypeLib\ = "{D372567D-67C1-4B29-B3F0-159B52B3E967}" YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\YontooIEClient.DLL YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}\ProgID\ = "YontooIEClient.Api.1" YontooSetup-Silent-090C.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\WOW6432Node\Interface YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}\Programmable YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D372567D-67C1-4B29-B3F0-159B52B3E967}\1.0\0 YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}\ = "PSFactoryBuffer" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE9271F2-6EFD-44b0-A826-84C829536E93}\ = "5ef709a4-95e9-4a7c-9512-17fb77215dea" YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D372567D-67C1-4B29-B3F0-159B52B3E967}\1.0\FLAGS YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}\TypeLib YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1AD27395-1659-4DFF-A319-2CFA243861A5} YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1AD27395-1659-4DFF-A319-2CFA243861A5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" YontooSetup-Silent-090C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}\TypeLib YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YontooIEClient.Api\ = "Yontoo Layers Api" YontooSetup-Silent-090C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D372567D-67C1-4B29-B3F0-159B52B3E967}\1.0\0\win32\ = "C:\\Program Files (x86)\\Yontoo Layers Runtime\\YontooIEClient.dll" YontooSetup-Silent-090C.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1156 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe 1156 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe 3120 msedge.exe 3120 msedge.exe 1584 msedge.exe 1584 msedge.exe 720 identity_helper.exe 720 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1156 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe 2316 YontooSetup-Silent.exe 3116 YontooSetup-Silent-090C.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3960 wrote to memory of 1156 3960 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118.exe 82 PID 3960 wrote to memory of 1156 3960 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118.exe 82 PID 3960 wrote to memory of 1156 3960 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118.exe 82 PID 1156 wrote to memory of 2316 1156 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe 89 PID 1156 wrote to memory of 2316 1156 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe 89 PID 1156 wrote to memory of 2316 1156 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe 89 PID 2316 wrote to memory of 3116 2316 YontooSetup-Silent.exe 90 PID 2316 wrote to memory of 3116 2316 YontooSetup-Silent.exe 90 PID 2316 wrote to memory of 3116 2316 YontooSetup-Silent.exe 90 PID 1156 wrote to memory of 1584 1156 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe 96 PID 1156 wrote to memory of 1584 1156 154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe 96 PID 1584 wrote to memory of 3416 1584 msedge.exe 97 PID 1584 wrote to memory of 3416 1584 msedge.exe 97 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 1940 1584 msedge.exe 98 PID 1584 wrote to memory of 3120 1584 msedge.exe 99 PID 1584 wrote to memory of 3120 1584 msedge.exe 99 PID 1584 wrote to memory of 2972 1584 msedge.exe 100 PID 1584 wrote to memory of 2972 1584 msedge.exe 100 PID 1584 wrote to memory of 2972 1584 msedge.exe 100 PID 1584 wrote to memory of 2972 1584 msedge.exe 100 PID 1584 wrote to memory of 2972 1584 msedge.exe 100 PID 1584 wrote to memory of 2972 1584 msedge.exe 100 PID 1584 wrote to memory of 2972 1584 msedge.exe 100 PID 1584 wrote to memory of 2972 1584 msedge.exe 100 PID 1584 wrote to memory of 2972 1584 msedge.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe"C:\Users\Admin\AppData\Local\Temp\154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118-0F78.exe" "C:\Users\Admin\AppData\Local\Temp\154318b9f7bb8b29a565a7a897cb7745_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\YontooSetup-Silent.exe"C:\Users\Admin\AppData\Local\Temp\YontooSetup-Silent.exe" "YontooApp=DDD" "InstallSource=DDD-L" "EnableMoreAppsList=DropDownDeals," "OptimizeForIE9=1"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\YontooSetup-Silent-090C.exe"C:\Users\Admin\AppData\Local\Temp\YontooSetup-Silent-090C.exe" /q2 "YontooApp=DDD" "InstallSource=DDD-L" "EnableMoreAppsList=DropDownDeals," "OptimizeForIE9=1" "C:\Users\Admin\AppData\Local\Temp\YontooSetup-Silent.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3116
-
-
-
C:\program files (x86)\microsoft\edge\application\msedge.exe"C:\program files (x86)\microsoft\edge\application\msedge.exe" http://dropdowndeals.com/DownloadSuccess.php?App=DDD&Source=DDD-L&IEGuid=2f497908-a6ad-4835-8b53-86a63c9bfb75&FFGuid=3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\program files (x86)\microsoft\edge\application\msedge.exe"C:\program files (x86)\microsoft\edge\application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\program files (x86)\microsoft\edge\application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffdd0ef46f8,0x7ffdd0ef4708,0x7ffdd0ef47184⤵PID:3416
-
-
C:\program files (x86)\microsoft\edge\application\msedge.exe"C:\program files (x86)\microsoft\edge\application\msedge.exe" --type=gpu-process --field-trial-handle=2080,18301328599009017323,6542508476034034681,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:24⤵PID:1940
-
-
C:\program files (x86)\microsoft\edge\application\msedge.exe"C:\program files (x86)\microsoft\edge\application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,18301328599009017323,6542508476034034681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\program files (x86)\microsoft\edge\application\msedge.exe"C:\program files (x86)\microsoft\edge\application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,18301328599009017323,6542508476034034681,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:84⤵PID:2972
-
-
C:\program files (x86)\microsoft\edge\application\msedge.exe"C:\program files (x86)\microsoft\edge\application\msedge.exe" --type=renderer --field-trial-handle=2080,18301328599009017323,6542508476034034681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:14⤵PID:4364
-
-
C:\program files (x86)\microsoft\edge\application\msedge.exe"C:\program files (x86)\microsoft\edge\application\msedge.exe" --type=renderer --field-trial-handle=2080,18301328599009017323,6542508476034034681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:14⤵PID:3572
-
-
C:\program files (x86)\microsoft\edge\application\msedge.exe"C:\program files (x86)\microsoft\edge\application\msedge.exe" --type=renderer --field-trial-handle=2080,18301328599009017323,6542508476034034681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:14⤵PID:2016
-
-
C:\program files (x86)\microsoft\edge\application\msedge.exe"C:\program files (x86)\microsoft\edge\application\msedge.exe" --type=renderer --field-trial-handle=2080,18301328599009017323,6542508476034034681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3600 /prefetch:14⤵PID:3712
-
-
C:\program files (x86)\microsoft\edge\application\92.0.902.67\identity_helper.exe"C:\program files (x86)\microsoft\edge\application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,18301328599009017323,6542508476034034681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:84⤵PID:3948
-
-
C:\program files (x86)\microsoft\edge\application\92.0.902.67\identity_helper.exe"C:\program files (x86)\microsoft\edge\application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,18301328599009017323,6542508476034034681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:720
-
-
C:\program files (x86)\microsoft\edge\application\msedge.exe"C:\program files (x86)\microsoft\edge\application\msedge.exe" --type=renderer --field-trial-handle=2080,18301328599009017323,6542508476034034681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:14⤵PID:2040
-
-
C:\program files (x86)\microsoft\edge\application\msedge.exe"C:\program files (x86)\microsoft\edge\application\msedge.exe" --type=renderer --field-trial-handle=2080,18301328599009017323,6542508476034034681,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:14⤵PID:912
-
-
C:\program files (x86)\microsoft\edge\application\msedge.exe"C:\program files (x86)\microsoft\edge\application\msedge.exe" --type=renderer --field-trial-handle=2080,18301328599009017323,6542508476034034681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:14⤵PID:1832
-
-
C:\program files (x86)\microsoft\edge\application\msedge.exe"C:\program files (x86)\microsoft\edge\application\msedge.exe" --type=renderer --field-trial-handle=2080,18301328599009017323,6542508476034034681,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:14⤵PID:2688
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5e38c90bc9bfda5669dd60a5d00995e38
SHA10fb1d8436c2af49a381747f6d250e63cff31ff38
SHA25645e77ce5ae846ebe46e86f46dc1cf47b1c3d5eb5bc246ca917b94105172e1540
SHA512a7ca19dccded2d58a21490ea309dda67b16ab28d12de91430bc68055b4e81a05b8b4a4e7463071d3e4fa2a082fa17e02ff6ab419fab3796811a9f20e753a2cde
-
Filesize
2KB
MD5a3cf3b9181b38dfc31580a36c3f696dc
SHA18420f6889ccda550d8de53b91e32c7d3ce81fada
SHA256dcfb77c9a4800641b960b7938833582f5b321e4d9abcbfd8750a4b72633fd1d4
SHA5129334d608a0096463f1166c2731bcd06c1d4fa3a28bbba728370e1e1fb7c4eae42fdbc2d037c147fdfed3f7e843740e906c2e4a05e538cf1f7a4546c667f80bc7
-
Filesize
5KB
MD5bfa193782549c6bbc64d7d5ccc21ae13
SHA193cdb6426785f605bb911d173c9f58970edcb987
SHA2569a5625b19fb0baecd309943388dbb65226cef43edfb58f61734a434b3ee2cf87
SHA512c791d209db86c5053babed22623d38981ed8fc7a67cd96ada033f97cae15c8bc4ff5a52477f6558d5e94f35c4342bcc13a81d4e4daa3fc1970a9261a4472d33f
-
Filesize
7KB
MD5ae59f7d9211023e723932282d4fc06b2
SHA17633ef742364b5cee32abaa1e0dff38f51a35860
SHA256f7ad9e8d8553299a6e62d2ed9850be4c3b8705e5fb5b2af774563fa9636d61ca
SHA512db38be22726920fb34ad0f0254d08bed711066fafdd0e7a09019861c4f43a3db12202cb4197ea66b53aa0418ee98e53739dbb672faad12456f3e0d1a9876eed8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD53969fdd2f1d419bdc1f80694445949e2
SHA1b5aa21ad3a6414b6199832fd28b23d736ec0e7de
SHA256ab24e06803846b1f30428b9f45f6e5545a5d6e3523e10fe8e140839158a8e35d
SHA51233b1a2c1a20554b32c3b2613cccf0f4e29f0b60086678e2fe8ecb869e7bb3f79caba3e1eb2354cf286be8bddc0e38d73cb4f88afcba8a927b56a2ed734ee9e36
-
Filesize
222KB
MD55a8222c703b4a34f2227a652a49a2827
SHA1ba8b1c8f341219d608a0a5a2a2c8d63c19697d05
SHA25617936188efac05a0ef9fd87a79b268445ce307dd37a6f9206d116f195ab049c9
SHA5127b1c200cf96ebb5b660fb11a85e3daf908a6e4d984c90207b5afa2444703fc784897160cf05a4bc592ecd908bf09f8dbd9195a4c0c07f1caef04bbd7c6624d9d
-
Filesize
4KB
MD560e3ef9326e8c3f574a2c7b5a31fd895
SHA1d3aa40f8de5c549e6abb189421d6cdcd75ac64f6
SHA2565e8c38cabd089ecd573d953cf2ade243459d7c06aab7b9698975e10dd7f34689
SHA5129a9be32fb1b4355f37766c5296139012d2fd931fb0db871307059cd0afc063a334165f34069a27ed8850889175e2f5f00be65ac2e8b9d22903754a043ae04906
-
Filesize
957KB
MD5e2c2b479150ddf4a231685c7b72336f4
SHA14a20de62af01a762659cbc39b9601ae10f5521be
SHA256deaabaead32008cca991e23a71fea01af59a3a8d87ed48f327be86264280bc21
SHA512ca87c344bbf265e9588aaa73828dc60b78c04c09b8f7a48be32ab0a50844f02464af3d2a30e193487c3d010b09c75d226f52537853899fc21aa54a32fb449f27
-
Filesize
465KB
MD5cf61335caf33d13ba378cfb1fccb1274
SHA148ef8b4e06e0f1d3c06c4d6e1ea2b6ce48aa5231
SHA256be3a36c9758fa8c45988aebd7f96e42381cad303c72e79158cfd86d83414ee87
SHA512e28b73e46c7cc6ea0b61eab80c4f8ef0cb657772f52710ba80746c40656d8f29c1b5008219a35a080d28ff869cb3b7f22ac53fe597e0c4fac876a2eb8b36b37a
-
Filesize
1.0MB
MD5ad0da51af6c889b03eaa889c2ed36cea
SHA1e0f9b85b61b20955f2850c76a64154e08737971a
SHA256be9633710001be885050a444670eebaaaf74d0105e4bfc01f02f5ab02623f841
SHA5125a6011534392f760b60b3b90892e99fb1b93422ce03655830cc9a19d3bb1f9f351307e932ab70ee940484eb6614657b344f19616f3f2c2dc969bd1110a434ff3
-
Filesize
346KB
MD587be92bc89bd5fe4987561bf4be68fff
SHA14e87476dc084c0fd24240ed0540a5a2b77551ff3
SHA256ef1953261684df463d96e25e3ef33911f61a72bb72120fb21e2c97eb1bcdd9d3
SHA5129160c39cbe45fc48997c79eeec8f3febdef3b98eceb1b53378c2d36740f2197a6b362ec95113137efe54850142c8289b56e9cad548ab59e1b660773d93d2fc27
-
Filesize
190KB
MD52a9f7520aa15394ae479957fd38d8a70
SHA1f180defa96a16da39c7989a35bf5631b59c3dbbb
SHA25624710c591c225e7857b49ae98a06f41c367f14608c14bd6885db6dc370a7ee45
SHA512e498d7e49b5e472d7cb7714b046653c64b98ab0d9399125e5528cfef862d83d69302afa2cc8382926c7879f463cf1f6087ebd95673abf7201b6ac11d4029e8d3
-
Filesize
747KB
MD5c3185aa7e41d258fcbd855ad1da117fc
SHA148cb2ebff1265b8a0ff062b028687819e7e293fb
SHA256fe338e659801a2822f028ebecc10c315dddc826d3d9dee6ca967bd449d32fb21
SHA512e2a268c8b73a14b782a0715a33cfa893940cf2f41e2a34ec6dc94ee360a1cf7fe96f27ab3884109a77f48b411d2f59c1ecd195c1d70ba1b9e66235b3837d0ced