Analysis
-
max time kernel
23s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 16:08
Behavioral task
behavioral1
Sample
JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe
-
Size
545KB
-
MD5
7a981ecc0c69c3f6cf74b58d32eb6097
-
SHA1
19a19e046523ef980250c828c4679267c3e46bd2
-
SHA256
c6fe9e76af5ecf62ca0c220fa94e53d8e9c18ee4a585849148668f4e303cf45e
-
SHA512
45f5deb78a4cbe5b08bbdbed4848ed186d5ee53c3880d0dab115dacf9bca1e0a643ba8d8c00cd8056155b75b6c6cbbe5982f59b7b91006f09747831e51e7d269
-
SSDEEP
12288:Rp77UL8TQin9XRc2F0sq9eL3YM6+qwIg1MVwlGuyQmsu6qV8Rg0:XHUQTQ09XRud9eL3YOqwIguV4GLQPUaj
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
cybergate
2.7 Final
vítima
netto.zapto.org:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
Signatures
-
Cybergate family
-
Modifies firewall policy service 3 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" server.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" server.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" server.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" server.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\dir\\install\\install\\server.exe" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\dir\\install\\install\\server.exe" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500} JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}\StubPath = "c:\\dir\\install\\install\\server.exe Restart" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe -
Executes dropped EXE 1 IoCs
pid Process 6184 server.exe -
Loads dropped DLL 2 IoCs
pid Process 2716 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 2716 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: server.exe File opened (read-only) \??\E: JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe File opened (read-only) \??\G: JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe File opened (read-only) \??\H: JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe -
resource yara_rule behavioral1/memory/3052-0-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/3052-1-0x0000000001EE0000-0x0000000002F6E000-memory.dmp upx behavioral1/memory/3052-3-0x0000000001EE0000-0x0000000002F6E000-memory.dmp upx behavioral1/memory/3052-4-0x0000000001EE0000-0x0000000002F6E000-memory.dmp upx behavioral1/memory/3052-6-0x0000000001EE0000-0x0000000002F6E000-memory.dmp upx behavioral1/memory/3052-23-0x0000000001EE0000-0x0000000002F6E000-memory.dmp upx behavioral1/memory/3052-22-0x0000000001EE0000-0x0000000002F6E000-memory.dmp upx behavioral1/memory/3052-21-0x0000000001EE0000-0x0000000002F6E000-memory.dmp upx behavioral1/memory/3052-5-0x0000000001EE0000-0x0000000002F6E000-memory.dmp upx behavioral1/memory/3052-7-0x0000000001EE0000-0x0000000002F6E000-memory.dmp upx behavioral1/memory/2716-52-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/3052-92-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/3052-94-0x0000000001EE0000-0x0000000002F6E000-memory.dmp upx behavioral1/memory/3052-3404-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/3052-3405-0x0000000001EE0000-0x0000000002F6E000-memory.dmp upx behavioral1/files/0x0007000000015d52-3426.dat upx behavioral1/memory/6184-3430-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/6184-3438-0x0000000001DD0000-0x0000000002E5E000-memory.dmp upx behavioral1/memory/6184-3486-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/6184-3487-0x0000000001DD0000-0x0000000002E5E000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 6184 server.exe 2716 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 2716 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 2716 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Token: SeDebugPrivilege 6184 server.exe Token: SeDebugPrivilege 2716 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1108 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 19 PID 3052 wrote to memory of 1168 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 20 PID 3052 wrote to memory of 1204 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 21 PID 3052 wrote to memory of 1488 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 25 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 PID 3052 wrote to memory of 2576 3052 JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe 30 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3052 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a981ecc0c69c3f6cf74b58d32eb6097.exe"3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2716 -
C:\dir\install\install\server.exe"C:\dir\install\install\server.exe"4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:6184
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1488
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
588KB
MD5672c32e7e29a62aee1789729f168719e
SHA18c321fa8508af1532d9f66afcc700078c3fc5bd3
SHA256cf977b3e8f2d9c0350d6cdb19e71136be4aba9aac32f40ef6a41e4649638496b
SHA5127fc2cf728762b3b74bb432f1b67711217fc12b6b19ec48d3b2cfabcbfeb992da3d2dd1050c0d557f101c8eb21e779e32d3df66c0f2a452fc551537ad2fe3d4d4
-
Filesize
8B
MD536179b73c8b588f3899323413c528203
SHA1165954848307274730df60e5ed622eb4f490827f
SHA25643ab82a743305d88b96e859aed4e408a2e8f3697bf113eea6fefcdbb0c754b35
SHA512ec0b17a856f62df5a7a83ebf93f94975044239398ebe35e084a1e3be88d78c315f00a585a887f95f9d3a32c35ac27c3bcc2008955f636d5f1d08c4d91d0ef4e7
-
Filesize
8B
MD5e0df3400948f4831b6a4121db21dc3bc
SHA152409832066aa911c13faa71933fc7e1fe3a0420
SHA25634f8c7367355c6a7d7dad5a2eb8595272f1e4e2f8bb684b60a29f54075346238
SHA512d48a52cbb4064be0654f965247a66e7c498a8343bee966fd5dc04896f35158d5deacca14f4bf4a2985d364674dd02d65dc5b6743c24652853dc033e2bc6d7482
-
Filesize
8B
MD5ea6c15a4cfc8067b29beb431f56fb347
SHA15f6c05165734721d17b6fe11925b43850a3a719c
SHA2569b67bc3340cbe932928ac99250306ec52d577e181e90e59466464bd98dc14d66
SHA5121a72c99c8315c7e3f49ee4ef66c3fefbdc0f8657fa76a06ee22fb4ce62fd23e39071f9eb49f4a8e62bb79efcf1f492c57aff861c7ffeb9638769a593d95b55e9
-
Filesize
8B
MD562567554ab7a0fab7003472982df4e7b
SHA19f7579059b3c4e848688a7e0cf9eacb6daa0e9d2
SHA2564c477305d1eb40c5f9d0f7ee844c69f1c0de90956ae7f6a479a9a8b80fc56b0e
SHA512600b9ca6ce17f71744171f3f52dee671535a78ad2db00857a2f98b712828fa2eeccdc832d5ce7fce60dde51545c0e5ec51cd0798fecd77ec7327fc28652c77ce
-
Filesize
8B
MD563ef209c8cd41ad8817f3b98b6b6c7cd
SHA1e9c887383c274c06b031e759e10c9a5f9cb9fc9a
SHA2568c8d586d751d216de2ff6ad4819fc16a1da819924fcc5204f07d00d36fbcd7f0
SHA512c8ed9b38aee22a5684fdff59ac98265bfb27c873d96b55dd3aa5accf27473c316e879a02bf6e5cc2fb3fc793f80fbe1e3243b242d52eaa01497da2b69591de5c
-
Filesize
8B
MD569ec59b4a48337007b464c5e825ec8d0
SHA17cc28f0a00dc37193ba1cefffc6c034be91b1a8a
SHA2565d5ab12552ce71ffe79c6e04e89eb40ccb557bbbbcc9bc79d302a698cf685c64
SHA512270948d5e5f72c6ca650bd6d8f69203f35a688bdca142ed30f1402380cbf33cbb4d7f7b4850a0b79784ebf1f6c3da5ef48ef6907c9c32ef8748bed4d8d7c591c
-
Filesize
8B
MD562677c354235b069026f6acfc10978bc
SHA1eb52268b64cc957284a80ad146693b7912bc656b
SHA25685c554e5456f3ca5b666168723bc3c0ef63e5de59cb14ecb18368648c306d7e9
SHA51248987c8387d8061fa5b72ee3cb84c3c31bbb6452f6dcebbaf3bd545209a82afd7d078ba151b9340ab11b25a857d3a06a024c6aa39f828142a9531e5444491f8e
-
Filesize
8B
MD5fbfe502c5b1defb6acea379e19a140d5
SHA1e9c9610ce70f91afffdddaf1f1c52f2e1ebd1e2e
SHA256a1c8f0e9a83f62c7e11f96957d6f30d844250db8f4c36eb916f3afa82493c8c2
SHA512a8f9912583e38d59c79f239bb16d20e7f70a32663fde46ae4023db3709c085c2b4b77c9d564b44bc52d9924954d0fcb75ec5dd7cb62542dab3652bce67cf595e
-
Filesize
8B
MD59f54d0e78dbc4728dc36847fab9e7f35
SHA11ceac4055357d5e7e576f6998502c1c5b474011c
SHA2563f498b2c68fca99d3d67ec87ea53be6948f42993b253192fb1ae6712b7659108
SHA512414b02ab0fa3b8ee6dedf9885bcbc3da23373fc15166ee5ca27d2f9152521a7224863c599481601f28d52514ba359f7aea4a697af760ab11588d75d3426fe9be
-
Filesize
8B
MD5a944668b332efaa026b6876857015a9d
SHA134524fffb73addda383375816f6b68ddaf572ff4
SHA256bd71d529d2d0e5c4c8666335def15c77360cacbe95e119a6689a2f6e7ef570ed
SHA5123d7ee6a5bb96bd77d7a4d4ab1957508b1e079993dbf55602fcecf0eddeb5e96c602bad0e788e6068e4d2afb96ff7453e3f6f9ce57884bba63cd1873adf78eb05
-
Filesize
8B
MD57098a1c21be2b7309301b96236dc0f84
SHA1e97018027f8672b76de546ff3b4c69f073bdd855
SHA256f2c0cf26a646b82cd2b697ae6b364daa3f1d82456acc31d46632bc07b2f912d6
SHA5129bd32d8fa3e2a61de422ef40d4ab99fad74ff3e23bb39a44e657d9884e0dcb5ee3170e579b9bd63e6cdff68821decc6f94ab5ace45ca6414f93252f675626671
-
Filesize
8B
MD58a6fb452cf088148c69cb91ceedf1a6c
SHA1e6f816b716b7e073eea1dd3812f386b54c838f67
SHA2563dbdb631d9e4f12d6abef5710801ce0d41218b42e26c97b4480d6e55276c7b51
SHA51205afd25be6b222b380c7dacd583f30bfe91e3c29bb81625973f21e677c7a810bc986a54634c26393e1f9aa5c374201432ba71369b9943aac29f335b0d9f0cfd2
-
Filesize
8B
MD5b02e27bc9f922429df3b1e1ee6b1a3a0
SHA1fe944e9fcf38a2e8e50a73ed8cb5fcf57485d4b0
SHA2569489157d415f760d1f03febd88e2c23f322492b3a2a6f1f59d1dcd388063fbd5
SHA512c10340538a0c3d7ae7b430b7965152bbff4e8b3bcae75b53a85e07035c75a593abf387bb2114efbd5db4269a3a6189f4ae038e3eefbd8e41128ff089e00f116a
-
Filesize
8B
MD56364c892258e066dc7d2724d40db2796
SHA179afb77f69a22e73b90ce579dc19a4a538df238a
SHA2567e7f656d8a5812ba5adebe5c714e863eeff79ab674dafdb1922fee7382ce0e1b
SHA512ca9e12f2d11b61633f0364645bc17466cc3b2fbfc838651e9dfbe9f47c79d303a09bb3a14169f879f420074208cb0b42847e02e960af0f7c141a3006304b87da
-
Filesize
8B
MD58ca52efc03e90dc25ddc8427a36de67a
SHA1dee8e28a2d999ec0599f4a659583aa1eebc087d8
SHA256702a622fb6f4698b2d4e5dde40ba0fb8a90d448a6c1a23c0af4216ff9706443c
SHA5123cbddae05f3b1d7b281c6d236afcc31f614f4fbbf98b5c468176fc0cec3e23352817af4c5ec6d9a00c09c393fab19c6416a01bcf184f41ab3bfa8ffecada3720
-
Filesize
8B
MD564d9983b68b1ac3a7076ca0c1e28ef73
SHA117b12130ec2750e67f1816c0b2ba735e804f4abe
SHA256b635f4e17925046f7d90c39ec9c7ee3106b3e67f5c437bf2460a0fb8cc80f78b
SHA512f59b756876bde6346b84fa63bd74ca5d1e83baa8fe6ec8045df189199d8d4f5206e9f9eb71db3e96f2aa529b430d093d799308edf5f1293400cb9716f9b2b8ca
-
Filesize
8B
MD57739cc1b5d0e8a5575d8c9f418b20e14
SHA14e31d5ffebb8f55500dd1bfec07d053d4dad76a5
SHA2565b8357e73c5518a0210985931ed05324cc5b0b5fd8c767938b8102aa662d0cf0
SHA5125755f32d33238be3f3202b4e1235f8ab6a10c05120c1045eb2089819fd52e8d84380bdbc99806ca00d914d4219e5883cc7270d5390f1fc0ff474adf72c255305
-
Filesize
8B
MD53abd71c45054e79194ac6d8a71f49eb8
SHA16a39391c7c51faaed360d4673a6070179eb936e7
SHA256314703dd95747b2c79232d939be088294515552ac3f7845d3d6caa774f3302af
SHA512a4db85bd21c61c4841cc69f3b1dcc07962d434448ecbeccbb0e4b862749b1e44b668d6d37fabd139f99df4b790c5d4f73e1315b7e141c44b2fc0ee00bc8885a3
-
Filesize
8B
MD5d0480b303dde4f2961dfc0efa90cba3b
SHA1c8adf60e806e9041eb77d01a948364306cc27b0c
SHA256f17edcff131cc59217311a4f950fd6fe1d6e127f212c5893abfd1d06120a7d85
SHA512e7a522f9bef419fac77cbd3016ae6c50f523fb11cdfb218495d5a3cca4278f4401bbdaa354f8672a83c3b63af6d0fc4c52a32c988a76f3b8c6e5e0cd504e13e4
-
Filesize
8B
MD5882294584a2590d9ec7f624d8ec27c6a
SHA17281ebd63360ea4c443b6678b4292d3d9c036be1
SHA25619313fbbc8de3f0d3881535545c60a49a6590cdf8a0c1752580af2c1425e8d3c
SHA512825ea5ef94023e3535ab3ddb71da0f62b0a3fceeec2538b6a3f5a0579859b66ef4f416140141a612f6bcd830d4f9e14ae81ec537bfda521e1113f561f652e5a4
-
Filesize
8B
MD5543d3cfe9c41453c3792fd3c93fd332e
SHA1e9c1d674de3e46e58cbe197ed823b2355404ac02
SHA2560b9c45cfde68a0693348332eff5081a4dbf32fbbbb2778763ee39a4c421b8eee
SHA5122253105ee414f463393f98fa2563acf259991254b16a0eba4586d0dba74f931ef4fd106e2099dedebce2363f6184f1a21dcfda17a2c0c7eca47901bbb1484949
-
Filesize
8B
MD573722cd1cc6ffdaef795fb048f8bed2a
SHA15c7403231aa283570708cd287c022320c45f6137
SHA256bfe3d79e332fe490f65e7e03001231c69bdf2bed4da3abac1eadb88654979250
SHA5125bf02e61241623582245bcc9c385da8b332417cd94bba6a0e49e1ce19ea898dc38e733b2071e182595e3eaa4ffb41f466a50d0b533a66988c0d6304289eb392a
-
Filesize
8B
MD57064cc2951332d9bd6e08c96e066161f
SHA1e80a9521af9d3ccfaf3fb9bfbe498ee20285fdae
SHA256da7403b1aad0b63814d5f50c108fbc399ce6dca99ddffe23f5f5ebfe08a2600b
SHA512a903e9dcfafccd958ae8f2a4c633ca882365510ff73835fadb76ad707b1ae258a5b951734e4e27d18121a7dd898e4c33b7eca457c45e8f381b224d7fbfecade9
-
Filesize
8B
MD5d71001a9331be76b2f9cc847112e8411
SHA1f1dd2d3f18d460fe13eb5034edc8af7bcf4ea314
SHA256556a9ff3e816d027ea1ebc45c8bd43f7228e9cd65b448fe1f68b51e49d22e054
SHA51218562e1261f80c4b79a4caf23ed67db9dd452883d019b02fd675d43a35cd43eed01834c86f353667186a2a431ba062e6ced6f658071e6ef249bdbb884b4d4eb0
-
Filesize
8B
MD5b94be359651926588a75e6000efd0de8
SHA1f70942c0759ebc1127f58c2e11eeb89b21420562
SHA2566e9e6dc1b1fa03654a8ff9d9907b3dae9417a6efea54ec1ab851b009c9c2daeb
SHA5127da936d9314ade9411098bd326b6f43cbc675d6bfa730a111044544726ddf105171df1b7342a6204a6917a3539438f17cd5002e9896c341aef370622d3365182
-
Filesize
8B
MD51df6180208b65a55638836f2e0ba53bc
SHA1d26816073ed71d51300be6c08e78eefc92915cd7
SHA2561617ea63cd3e341df25d1ac8b6b5576b41b5c5315ff3b84fb1ca235a51126203
SHA512567ad8134a1f2362b027098251a7d4a1f90b841383e4893b1b11d26a5f66efe581b7db9830010790772b2bb673f30f27fcb06a11cd454314ce107b1d74896299
-
Filesize
8B
MD5269b51317c5e7fb25a5e06a14fa897b6
SHA1a010cf2f6a95ce57ea2bd76629148ae19daae489
SHA256124ff709ddfa7b37f99e02293ca8c5440f25fcdb8ce557b5a135732d5a8e6ce4
SHA512f28d583b7f6d49be05174571e2bd714129f86bf6df83d4c7fa8e1652872c93e418a14e84370f4a95354ce962429b7eca93757b43e629927947a1c83d35b43e69
-
Filesize
8B
MD5acac00815515b6fc6c95e37af2a37fc6
SHA1100bdc0b4d97cff076e738bb1bea0b2dc2b9b774
SHA256d458522afa6dd58546cffc6d23404744b57590c18610cce8326b862a3a6e1448
SHA5122159281db2c92663c377884c4e097d0999ce4d3ebaa8f1b53736de32e02417987a1f689e7a31754ae9bbd73ef3773b6d4e1d68f3f62161ae4ca3c692c66ba6d4
-
Filesize
8B
MD5e4304afcc38c9f6c73e13d5213de3e97
SHA195db90315163fa939c4f9077313cc8e74b4b608b
SHA256f050d05ce29d9a7bab126a6d880a3ca3a1a6cce0799652b56b2978d6c8b191cb
SHA512d87afde3416e5257b1fb492f3e652d9f929d2ca13b074fe95b937283592c6af3a006a473ae0015a64e38a37847f9a94a4caa6911724f9b9a8535a928bfb987e2
-
Filesize
8B
MD50a85d195050849ecfa38e8d8b79eff5f
SHA1808430b94dfd28d4c63ab40d1ca3ae9a733283e6
SHA256922b0cda4125770293093ef99fdb04a0531dced824cc75e5ac9c2e5c78988749
SHA5122b4c8654348bb1705adccd3a82fa8f79a20b0bb2e8fe8f41560b26cd2ec6a20267d4922f00fd9b52152663da90624e8dca4a2ab01312fdb3c368889847d7a958
-
Filesize
8B
MD5c37810fab38d88a97dc32828fa514260
SHA19964dfdcf57e02e32ab168560944cc1fa9e1e5f2
SHA256d6fad70c60a060998a33a5b4bfb98d407db0af19e37cc71c40ca921edfe1b6b2
SHA5123fba3967c6f322aa77be7a9706e0ce3aecd2230dd0f17d5a2e4e7e2dd0b82f8de47b78b605dd926b6ce5fc46cd0c6898a7306561e23044f855d716967997d4dc
-
Filesize
8B
MD5ae0e6e449e5dca5ac434da5aa5bbc7ba
SHA1c420e8660af4152d16970552ced094a57f5dd0e8
SHA256d4a11e3058ea0305a54cfc53eb272233873b6abaed3e4fdc73744351b24ffd75
SHA5124e1c6c93019a05af68d10c9c0ed24cae3554c551d0934d4f56908df086f89282f57b1fbe0acb5583500ca946624db9de3ecf85ad5718b7e5d73fb5588aa160ad
-
Filesize
8B
MD52deee4ed1558746be9161d692babab23
SHA19a3c6e2e380bbed586826416e8d6b6617e58d8ac
SHA256c31fd441a87d12b1b0d1c1d2718e693e27efad3ce2f9c7f645cf77bc315d5c0c
SHA5126080acf07cbf1103911f69a513ee3829702f773983ebd1e34837311b4b2a62e6ec0b9cacdc6262403747c7400a6fd0e798c3dfab7f95ad9ddf52ff555907c157
-
Filesize
8B
MD57e15482cb98d58da8f76543da706a5d9
SHA15fe6dcab9e206966e598c8949a70325ee9010fc0
SHA25656e2219b85e111d6f4fd60501ea04e8f89e6d7db33cf73704d3edbe30192112c
SHA512ed3e0cf79f65ec2fb35f09fd2ad9ca7f526c7b631e31d9c428807ad3d96c867cb71b1859c78374a8b6e0d1a43eb11bc159d65f5381a424c5a3e3adaacd297e34
-
Filesize
8B
MD5ad9c953d9160f32acec6a296412130cd
SHA16b8864dd960d139d591be6f010eb87af2633790e
SHA256d4e40ff22ec9492425a10b96a96155e9a9d57a2bfa2b3ffd55296fdb332b0286
SHA5123bafdaf878be57170b7651a8b059168811b2007b7303bb2972f8b8e4b72b9e1e52bfcd78d7aaf35599451413f2338bf5e9794729c214b89db24e773371f731c6
-
Filesize
8B
MD59513962ef27077f0e8f78b924396c351
SHA149bc15721fd87564a5c4d5c64836a672ef2a6958
SHA2568c59505f283f7a2519d61f9126f6c014688004a75e781d14b1eccd313b759a79
SHA512493ec3364aa45d32aa08f800707512e5cc2c8d6a8f72d04867ee3cb15be7aae6e3b29eb264d8ec758f8c5d61cf4c65a0170ad618c229491e8855a8572a9d2b32
-
Filesize
8B
MD50615fad4716256e8453de7e2cec0359d
SHA1377147cad38861c18a0f5315cbdac3f556846a21
SHA256873ebeeff777634893a4b79fcce69cb9213db4935a0aada1f1f342bb78f1f1f8
SHA51296655bc8ac96310287e1826b41b2e8991b5e65f5110ca8cd58e4c674edfbcf8d08be0b4db99e465b59aafa8ee87d0115ee1886610b772ee5afacc6b5a7fee5e2
-
Filesize
8B
MD55dc81f31f5e3b86e241754a58ab55900
SHA1bb43bee9bdae38deb4911877eece98ba7b3578bb
SHA2564878a609a262f4819671c82734be658a3269ce0ad2774f7fb511c30e70dba00d
SHA512c07c60e8c8ff1baab8386e0aed4dbcd1ff3e57f5e5a5781b2d08a301b5f825d3930155ef5a2295c66730a88f964cdedacd643ae36f41bddc435e4e0f8d44a4ef
-
Filesize
8B
MD588c499255ecd16f19013dbbd944008fb
SHA1609556cc13a1b73722b10e6e79586d8d42130ee9
SHA256d45db29d4795d4152479c55077c36898ad09f0ba4b7842737cbcdf6355c1efe6
SHA512346a7e86e275ef5693887d05f8a5a6d5cbc410939c750106c6d7271dd3c1ef938d9ff74575e2e9e8b61ed74fa9d59dd31532056bdf47221a2553448d3d74cdde
-
Filesize
8B
MD5c478ca85c9fe74ff4100201b927d6f34
SHA146595752e73f1b08b20e6915a7e8e18bc9f44170
SHA256359cd70e4e0d098350320e7cd5f25f2d937e4dc267340ddae906d2b70aac15cc
SHA512aff4ef47d045cf6be4cc1e898c3a2fe62a3f656fb1f0d79301e71ea755446d2f484a909408426f66604e2d6b39a1183f74a2d6457fc248df605e314d27f0a9ab
-
Filesize
8B
MD5fa70d9fe748a8c4d3b8c1ed0bfdbf7b7
SHA17af5fbb9c7f9e629d659019fe88a46af2036aee9
SHA256f8b4e8d70eeebe264d30fd9c62e26bda2d5297261fc3535378016bcc7a48de89
SHA51298a2ef5c422835c2e50e2342cd04a1483521a7b9e0cc4cd9c2cd5196fb9190a489ce4bf645c02a768cb0f9910b75287a42db01951e6568bc709afb9807135bb1
-
Filesize
8B
MD58f5948370a8d41069a68112c2750310b
SHA17158a977f7cde1b96cfbcb7bfd24de582025d9ab
SHA25650747f6650294a974268fdf8f2202909128191fa25a9a70f5b32724bfe5a7ff0
SHA5129b19530f35f9516e3fb581bb5286829b42b63dda14131effcd29270ef58026c1cdd7c9d7fab259f2cee6596bb637367a326b588bbb501732a05ea7e5f5321337
-
Filesize
8B
MD59b80273e973ef8df0608f89a0b3c2fee
SHA139672c82a7dd2f0f2da8ab44d645752b0b509743
SHA256b3282d2bb4415b344fcdb5871bada3df58f9608e367c555cfd173f48250ee7d0
SHA51237a82aab13505d595e8c709f42d627af95591a4da11ecd3e0c0375f347b5504e3141140e1676b1d829a49a0ef4e016ca3c70ce74c176290130ddbdb0d1b6b5c7
-
Filesize
8B
MD5b6277528c0b6c00557e3c918e91c0c5c
SHA133f7a81b310f36517e0f088348605e9ff74fda4d
SHA2563f5ed6c3f86f1674c504d981d00d9e41ec5af79c0764b6f2b66c6af91318dd54
SHA512a335741094718109b3658d677c85563ff92bc579dbffa5713f31c79b3d3ff9062c97d82c81738484e511ac38d01e08f123b2a76fc1116062f619ca748e4277ac
-
Filesize
8B
MD5470ece5a84888f943e26d966c06544ca
SHA19bee4335d4ea355099362fe7a1627af6c7a65f06
SHA2568fb127753bc45792e89cee9f1ecfa8b8a3baafdf6d251d47a2feb806e5ceb3e1
SHA512f8a4981a1108b7e5680b59c9c0b2365136e0821a085f5c25242c69771dfda2dd43ce71e50a2bcada5253737f2abd4fd2cc1728be932510d9e7c8afb5bd28ac14
-
Filesize
8B
MD5701ccd78ab541202b357bde328a0a5c0
SHA17c0848c760e4c61a9f231a5b1e898142a5b56330
SHA256f564d84a8056df6058bfb04aabed2b6f77e6f5643f8119fbd7a4203a564c9fc2
SHA5121b6417b760f4c8a158398770b0e9b6ddebeedbee8af55d856d8fefc3eb3e92c741687e2f91acb96c7c1a01e679bbee059878a69d1ad818e622c7e4ac139b7402
-
Filesize
8B
MD5c4a2bbfb0377c25073dfda88cdfdd0b2
SHA108f185b6604b0b4aeeb960ff1dc05921eadf7eff
SHA25653a20696f7128ef46849a85088f5f677739556bbb94ff259a840ec644c743393
SHA512d4227bf5ae8bc6b788751e5764e0e275362e0b5e66933ae7778dfa4c7c23869ba37cc6f7ca26f07d1759102cb75cb63c27d0b1df69b0986d95d1f8645dec5e2a
-
Filesize
8B
MD5e2d3101e7dd8481e74eb0aaf0540e3c5
SHA108b68d46e28b702bc6a3f9e66344e3336f15d475
SHA256d39f121593fef6f8c9d480f5e87b2ac5e5f6d2e31d7b24bbae5f88497b5a1331
SHA512211bcfc222872fe274cf3017c1400fae795e777144aa84d39b8108f4685d341ed47dc137f143871064f3fc50a778fa757a2c72dba4c238709f2c51f6141b85d9
-
Filesize
8B
MD5db7eade7a57221b551a03bf01eeb954a
SHA11debf69eef28fd379fb801b54eb2bdd7efc352d5
SHA2562cdd70a578fefb4b44288ebf45490b8a5bffcfb5fa224e948faaefc4b94f9c88
SHA5120e4eb9e3df32523a00e012392335a3d9bf1746f05433d9e04e8a2d1f5d3172158630ffbf125dce8cb70ce3e513de585eab5d38e611421fe6325b29a4892ea3e1
-
Filesize
8B
MD50b533e140f0394ad44653ba0cb17bd90
SHA1ce981d555f13706d2089298f5fd9d179d4b63d1f
SHA25631e9ccc5e6cbcc9075e2af016c879945cfd4cd5028ab2d46408281f083c2b945
SHA512a30023d36cf3b5adaef3825e53e3650a13739d4ab7ff5ed12dd9ed41342205d75c7ac83df8c591427552d3aa9c09b690269b947bf7916ea85b799795e76cb6c9
-
Filesize
8B
MD58f93a35ee7184ac765fce3d36d596316
SHA103bb41a84dfd32f5b38064c5493c92e4191e05fb
SHA2561235361b422a91ac2d7869b61cf2d9ad1583de36959aed08b38051a7c27df068
SHA512a91da2761145bc6c2eb6b375c89c4fcdd693ef58b9d02da2bed4f8966625a43b6b02e22a5f14477f0022fa1393d0974c183a6620840c1b228655ae08a404f8cd
-
Filesize
8B
MD5c93dfd4e7307cad317a1f866c9495305
SHA103b2053f762fde72fb7f1e0754336a75ff435d65
SHA2560972d127eadfb9bc8b8efcddc236d385bfeb70ea5028510a28e3d481f17b1540
SHA5122e449785bcbe1d30ab2ef0bcef78f43d65790e0d9df287aedaafa20ef87f2ed42261ac76d94b27ac70355b2d81dd0180f4f738ad5c14f475708c592d035cd489
-
Filesize
8B
MD5eb7d7b2e24429dc6d3f75742b9990ec5
SHA1e8975f023e7b9cb795ff078c0cddd7f8c24df49f
SHA256ab54a51a31d60417de52cd641d9bd37a31db15972428275c7db32c0a216b437d
SHA512686e33d68322882c9c343ec485cc784cfcea4164b2512ec04174e92827534916b1bd6a7891fbab2d1b97c0d301ddfe7ca50d2aa0cfcb370580604e5426e2850d
-
Filesize
8B
MD5afaca39bbde6efdd126fe4e596b7bb68
SHA1ec01e0da75aa497132cd1f39817bf12fdcd88336
SHA256d2e1e9c7c4245ec77a441f740dfd2c324c88a39f6d1864fafae6eba924baa30d
SHA512e97e61e13209b2e15f761f6295beb11968dfd611de7371911336028594b8307778435b8a971dae5457215d791179ef73d5cf5c8a31e2fd1c14447cf861f4e752
-
Filesize
8B
MD51d3bb0f1e446edaba17cf82785428de4
SHA10e5dd7f9d4e1f41ba768c8902558e97fc71e0306
SHA2563e83de7a32d15ee371b4b449bafd1b775149bec553365354a96d07fedd825313
SHA5122bf8a50d35873a2445da2cd2425592daf1ec5500d87dbc6cb6751d191588d03ac0e15df2b32b27936b7842d8daf35d53c6abe8e7f5406fcc70bd8da3effb819f
-
Filesize
8B
MD5d271fcdf6667aba989607bd36bb857f8
SHA1fd859d9b0ed9379e8eab59ef1a24ef70537283b1
SHA256a20d11a3b1c6419efa16f7e308dbce5977df7510c77b12aae858f45746dda6d3
SHA512921af2cb589365b695867a489ae0b70c0e1864b8537cf37833979708ff1052147a47202fb593b423fa8c3b232825869618b3d4c82f0aeee540b2365ad61afa06
-
Filesize
8B
MD5b768794597f2094667853eaa3985daaf
SHA1e9000d8c481d13ef0f4b02e7ce4d2f88bf5e77e7
SHA256ca4fef2478a612b6feee2e4e3b98f18445fe3fa455b5901ed37565ed713dbe1e
SHA512332af490fe68909d7d8135636ca4905daa7278b3f5e7d192ea70e7c2bb0a7b984667453dc18a06cdb2634d082c93f2e2d1572cace7653f723d8083084f36a7a7
-
Filesize
8B
MD5cd4efe5b29403edd3441a88963d8f7b0
SHA1afc30642a50e51450fa1952b6b093ac6ccfb1f3b
SHA25672fa5bbb5bd956246c91b2a6ae3f8fc63c2b91033897526ffa34d6fe3836aadb
SHA51242cda4c34182272bface35d62576132088097fc013e81bd8895608ddd2e28cd6fb927fe9de39138a7c00260cdfffcdbcde74b1b5875426180abec2931af7c6ed
-
Filesize
8B
MD541a931f424045494d75c4a3f8a99d302
SHA13ab896827209eaf5dc6f19302b71219576f5890d
SHA256d4f4de2c12eac44ce16c6df41b1478016856b90bbd4b7337481ad6dbbe305a2c
SHA5125fd6e1535d07a069cb1aa9df3336d80fc124837ab554228b6383e4710f101463bda2cab3b5d74c969e83127b972ffe2ab0346cdfbbfe791f52901b7cc4be1950
-
Filesize
8B
MD5f67894d5ff4a9287032e69c1bacf382e
SHA1552765e82f38eada6cd04d90fa4046e4669377ad
SHA2568cc1f35c53113d0983212c2c3f17e2d99fb6e25eeca00b9cfc6877fe2e900d56
SHA51258ac869f0dfc7e844c834447cc4263e60c3d2ef223cea8ef52f887a4546778cbc373f454070daae76c1f6f6f7c69ea845be4b646ab6e2c249026ed4d62365491
-
Filesize
8B
MD5344e483ce426e2f745a50b8021a2e644
SHA153ecb854e5e8e3aaa9ea5c1f4ac87748ca5e8e35
SHA256d57205dbd8f5f7222a7bc3f79f1dc9fde680ab997da37f197176b250c087af72
SHA512331c1fd0d231912fec204124ea6aa6e067f5c47bb69dec3e4f47d83221e249ba36643f0e725f6d135bdd31b5cd150d02b384c85ebbd26d69ac29dd130f629f0b
-
Filesize
8B
MD5cec485ea056a25822fdcfe28c966bc6e
SHA18d1f0c8569c84363a2a29cbd7b97b6536ea18842
SHA256c6c088b4ea815c58ee9cbdda73a642ab97a818d692c29b5a9ea857d18301d896
SHA512b0bd45e8bc2b4a18ac032d6bd3632ae52f9d2a14f8c80dd4151717e54995201c0ee4bd13e4db79930373b3cff48f9ae0e161f3d586287175d1ef83ed4bb1f3b9
-
Filesize
8B
MD5c12bfcf506a19724ae3cbebc6f930d27
SHA1a70106e3aead0ab5cb23a447ff3dfd14d7f45099
SHA2561b34fc5ff8553b4cc4d7f71288a0dad7686d436b6252829d13cf7eec613b6a50
SHA5125b39706913818a189ff1a9a3d05c342f765d6b3c5dd623c454c493184ca5df84662127348277a7c6ab8a28fb0975d9331915cfefa5ba4c621c2d9681e17c5c84
-
Filesize
8B
MD5ee8eb63d647a04c3aa608388332042e2
SHA18c448ffc4df3a10305a78e74e12f6644f9e97534
SHA256ec6f4374c8cf158231b491ddb5d2b03958c54446b90a0698d21d8c753c446704
SHA51258f702b24e58afe6e59bf1f2e91104fbf4d5b3748a321408061487292434ff8ed19854f3a82762928b4137442ac02990a30f1d8a373bbc5acbd3e4a0ba0848ae
-
Filesize
8B
MD5df553298372dcd3bacae90862964ebb4
SHA181a9f8d50e66bf1a6a946aa3097182a1d0e45988
SHA25644edec3cbd2df430eebc0d222899e197ff2d346e7f95695f5edf36e72ec22cdb
SHA5120266870f4a2be739539c11781859aa714a19569d0fda2350eab3767ed48469d5db1d712b4b65b61bbe4a46196ebca0be8ac97cfd5ede8de51ceb1bf38e6a91ff
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
256B
MD5450327918c016b667739e025b8df4c81
SHA1c0979ed35320bfe4fcc34de9c93da255a1a72f4a
SHA25631dd48e5391b4e1d88dfe78aad0a2086cdaabc5a8ab70aeef8dbe3fd6907edcb
SHA512235a6bb550d58dc8380944408cb012bd05d13fd5a3de6d0b1418f3c4836a253a908c9cff2a7bbed4c7c4341a40411c322ad3ca033c6616d0ce152b6bf0a7095e
-
Filesize
545KB
MD57a981ecc0c69c3f6cf74b58d32eb6097
SHA119a19e046523ef980250c828c4679267c3e46bd2
SHA256c6fe9e76af5ecf62ca0c220fa94e53d8e9c18ee4a585849148668f4e303cf45e
SHA51245f5deb78a4cbe5b08bbdbed4848ed186d5ee53c3880d0dab115dacf9bca1e0a643ba8d8c00cd8056155b75b6c6cbbe5982f59b7b91006f09747831e51e7d269
-
Filesize
100KB
MD5c34756238cf8bc6f66a7bc3bcd0f85f9
SHA1ff9da5e7ded873d6082929d1267936a963c9de97
SHA256641fa7b875cd744face2d67607da173a1ce2d4e370fa938817d80c43f94cc0c7
SHA512f2925192894b835d6a9e9494571c451ce82a40fbb8fd8f9866bc365177b2fdfc02817a4a9e4743b592d25c49bec2f9fe27b410bda6ab37c776e0d3c4a69851cd