Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe
-
Size
375KB
-
MD5
3722b18641aa6ede7dc102364b583f2e
-
SHA1
3edcff06d8091b9dd4b3a9543f05d3158c29e97a
-
SHA256
55912e6cc4a71d5c51b0eba1e63473f9c5653cfbca176d8cdb22165417a0f2d6
-
SHA512
d171c394ecb45cb3ef61bc89381cb8ea2f99c006f65c2f7fb0146fea8be82e52daa15dd84e14d196948400b024bd970a837ed3a5c2dcb47165792cade7e7d31d
-
SSDEEP
6144:2npfnTfCEkXi0AOddyd1NTGRsPs9vAYY53Su29t7jnTIVcPp/jaL:+5LC1Xi09RRJjQCu2L7jTIah4
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+wka.txt
http://gfhshhf.home7dfg4.com/3CBB1F8BF46677CB
http://td63hftt.buwve5ton2.com/3CBB1F8BF46677CB
https://tw7kaqthui5ojcez.onion.to/3CBB1F8BF46677CB
http://tw7kaqthui5ojcez.onion/3CBB1F8BF46677CB
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 5 IoCs
pid Process 2900 bcdedit.exe 2524 bcdedit.exe 2612 bcdedit.exe 2708 bcdedit.exe 2876 bcdedit.exe -
Renames multiple (375) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 1972 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\how_recover+wka.txt qdwqh-a.exe -
Executes dropped EXE 1 IoCs
pid Process 2052 qdwqh-a.exe -
Loads dropped DLL 1 IoCs
pid Process 2076 3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 myexternalip.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Tanspecks.jpg qdwqh-a.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\sv.pak qdwqh-a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\THIRDPARTYLICENSEREADME.txt qdwqh-a.exe File opened for modification C:\Program Files\Windows Media Player\en-US\how_recover+wka.txt qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\settings.css qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_sun.png qdwqh-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\how_recover+wka.txt qdwqh-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\how_recover+wka.txt qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\how_recover+wka.txt qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_double_orange.png qdwqh-a.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circleround_selectionsubpicture.png qdwqh-a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Notes_loop_PAL.wmv qdwqh-a.exe File opened for modification C:\Program Files\Microsoft Games\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\how_recover+wka.txt qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt qdwqh-a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push_title.png qdwqh-a.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\fr-FR\how_recover+wka.txt qdwqh-a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationUp_ButtonGraphic.png qdwqh-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\how_recover+wka.txt qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\library.js qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waning-gibbous.png qdwqh-a.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\Logo.png qdwqh-a.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\how_recover+wka.txt qdwqh-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\activity16v.png qdwqh-a.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt qdwqh-a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bg-dock.png qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\timeZones.js qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\picturePuzzle.js qdwqh-a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-highlight.png qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\24.png qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked-loading.png qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\9.png qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_cloudy.png qdwqh-a.exe File opened for modification C:\Program Files\Windows Journal\de-DE\how_recover+wka.txt qdwqh-a.exe File opened for modification C:\Program Files\Java\jre7\bin\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\how_recover+wka.txt qdwqh-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\Windows Mail\es-ES\how_recover+wka.txt qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\calendar.css qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\RSSFeeds.css qdwqh-a.exe File opened for modification C:\Program Files\VideoLAN\how_recover+wka.txt qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\highDpiImageSwap.js qdwqh-a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationRight_SelectionSubpicture.png qdwqh-a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\how_recover+wka.html qdwqh-a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\how_recover+wka.html qdwqh-a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2404 vssadmin.exe 2400 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{619B5181-0FEF-11EF-BF06-56D57A935C49} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000009eaeed1fb31ee63188d3cdd19d16a47d85ef57b3b3e3b74362761b624394784b000000000e8000000002000020000000e8ab78fa45d9d6c237a9520eaaf81b34917a10d758661b27a53076bb047796a320000000cfb30ace11d3975d398e7272a4008be2e3110143630be7d1698de37f742ebefa40000000f0ed4dd95d6bde72bf14f15d2ac34524b47d33fde5429606fc2173ff503363e683e77086794d531a4d3db79aaad8ef730836bceaada1ceb071b7d4babc8ddf0e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402e9836fca3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421632497" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1676 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe 2052 qdwqh-a.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2076 3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe Token: SeDebugPrivilege 2052 qdwqh-a.exe Token: SeBackupPrivilege 2452 vssvc.exe Token: SeRestorePrivilege 2452 vssvc.exe Token: SeAuditPrivilege 2452 vssvc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2184 iexplore.exe 2028 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 1580 IEXPLORE.EXE 1580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2052 2076 3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe 28 PID 2076 wrote to memory of 2052 2076 3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe 28 PID 2076 wrote to memory of 2052 2076 3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe 28 PID 2076 wrote to memory of 2052 2076 3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe 28 PID 2076 wrote to memory of 1972 2076 3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe 29 PID 2076 wrote to memory of 1972 2076 3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe 29 PID 2076 wrote to memory of 1972 2076 3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe 29 PID 2076 wrote to memory of 1972 2076 3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe 29 PID 2052 wrote to memory of 2900 2052 qdwqh-a.exe 31 PID 2052 wrote to memory of 2900 2052 qdwqh-a.exe 31 PID 2052 wrote to memory of 2900 2052 qdwqh-a.exe 31 PID 2052 wrote to memory of 2900 2052 qdwqh-a.exe 31 PID 2052 wrote to memory of 2524 2052 qdwqh-a.exe 33 PID 2052 wrote to memory of 2524 2052 qdwqh-a.exe 33 PID 2052 wrote to memory of 2524 2052 qdwqh-a.exe 33 PID 2052 wrote to memory of 2524 2052 qdwqh-a.exe 33 PID 2052 wrote to memory of 2612 2052 qdwqh-a.exe 35 PID 2052 wrote to memory of 2612 2052 qdwqh-a.exe 35 PID 2052 wrote to memory of 2612 2052 qdwqh-a.exe 35 PID 2052 wrote to memory of 2612 2052 qdwqh-a.exe 35 PID 2052 wrote to memory of 2708 2052 qdwqh-a.exe 37 PID 2052 wrote to memory of 2708 2052 qdwqh-a.exe 37 PID 2052 wrote to memory of 2708 2052 qdwqh-a.exe 37 PID 2052 wrote to memory of 2708 2052 qdwqh-a.exe 37 PID 2052 wrote to memory of 2876 2052 qdwqh-a.exe 39 PID 2052 wrote to memory of 2876 2052 qdwqh-a.exe 39 PID 2052 wrote to memory of 2876 2052 qdwqh-a.exe 39 PID 2052 wrote to memory of 2876 2052 qdwqh-a.exe 39 PID 2052 wrote to memory of 2404 2052 qdwqh-a.exe 41 PID 2052 wrote to memory of 2404 2052 qdwqh-a.exe 41 PID 2052 wrote to memory of 2404 2052 qdwqh-a.exe 41 PID 2052 wrote to memory of 2404 2052 qdwqh-a.exe 41 PID 2052 wrote to memory of 1676 2052 qdwqh-a.exe 50 PID 2052 wrote to memory of 1676 2052 qdwqh-a.exe 50 PID 2052 wrote to memory of 1676 2052 qdwqh-a.exe 50 PID 2052 wrote to memory of 1676 2052 qdwqh-a.exe 50 PID 2052 wrote to memory of 2184 2052 qdwqh-a.exe 51 PID 2052 wrote to memory of 2184 2052 qdwqh-a.exe 51 PID 2052 wrote to memory of 2184 2052 qdwqh-a.exe 51 PID 2052 wrote to memory of 2184 2052 qdwqh-a.exe 51 PID 2184 wrote to memory of 1580 2184 iexplore.exe 52 PID 2184 wrote to memory of 1580 2184 iexplore.exe 52 PID 2184 wrote to memory of 1580 2184 iexplore.exe 52 PID 2184 wrote to memory of 1580 2184 iexplore.exe 52 PID 2052 wrote to memory of 2400 2052 qdwqh-a.exe 54 PID 2052 wrote to memory of 2400 2052 qdwqh-a.exe 54 PID 2052 wrote to memory of 2400 2052 qdwqh-a.exe 54 PID 2052 wrote to memory of 2400 2052 qdwqh-a.exe 54 PID 2052 wrote to memory of 2384 2052 qdwqh-a.exe 56 PID 2052 wrote to memory of 2384 2052 qdwqh-a.exe 56 PID 2052 wrote to memory of 2384 2052 qdwqh-a.exe 56 PID 2052 wrote to memory of 2384 2052 qdwqh-a.exe 56 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System qdwqh-a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" qdwqh-a.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Roaming\qdwqh-a.exeC:\Users\Admin\AppData\Roaming\qdwqh-a.exe2⤵
- Drops startup file
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2052 -
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} bootems off3⤵
- Modifies boot configuration data using bcdedit
PID:2900
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} advancedoptions off3⤵
- Modifies boot configuration data using bcdedit
PID:2524
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} optionsedit off3⤵
- Modifies boot configuration data using bcdedit
PID:2612
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:2708
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} recoveryenabled off3⤵
- Modifies boot configuration data using bcdedit
PID:2876
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet3⤵
- Interacts with shadow copies
PID:2404
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Howto_RESTORE_FILES.txt3⤵
- Opens file in notepad (likely ransom note)
PID:1676
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\Howto_RESTORE_FILES.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet3⤵
- Interacts with shadow copies
PID:2400
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Roaming\qdwqh-a.exe3⤵PID:2384
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\3722B1~1.EXE2⤵
- Deletes itself
PID:1972
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD54fdbaae84350b13c67e8ec55f418d7b6
SHA1e7701b352cf13227e6da7407a5faf53c922d6887
SHA2565e23e0967a0fbfc421e5a35e360544e34afc2ab8ca247970e74ffc068d96a0d1
SHA5127d018f773769befda275afc094ac51f2a60641f044f10bb49b56c7978b59c5e3cfbb78a8fb8f539ee469531c03c0ad1a8f05d92e34f6a196f18984c1b863292e
-
Filesize
2KB
MD56d69fb8fda55d8bc8408f7c86ae61c92
SHA1e2cd664a9983313a0b339bb04026acfc4bdcc903
SHA256141d9c2a1c321270d27d2a749ade3af36dd37d1175f3af562d3a8ae92d2195b2
SHA512f2b96fae77857e2feae1307bb53891ac30f5dc333bcfbb5747d4ad896b915f125905adf8dcd827c553c9cc6bfdc3fd9fd8b7a5fb364a29ab4f3331cb8db5a5b7
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD5b08aae79d6a49270dc094527de404493
SHA191ed8f67aaaa0647947f2d22d6977a4e2da033a9
SHA256444c7b9b711ae5c99962f3a1453a3ae8b4369ebc94bda8625ee91e62b8ebc866
SHA512d5ba91ed5f6fbe198f136f26764d3264acf6ecb26c7548bc9fc44928406ca9e874e626e8cbb71b391df1aad92780e1eadc55b42c0c6f9653f35a23a437c46f6f
-
Filesize
109KB
MD5078496533dd38d4bf13f43b88c46d6cf
SHA16a2d20a3071e8e6e53ca7528238373cc0032da8a
SHA256fa35c5261af14dcc864434c79a37eff5d07077b7956ec35f5a55ad216904691a
SHA512acba2452ba32f28ab5b46e207ede97578d046504ba25ac78eec8b323a63f6166bc515107bc326f2ffafd9845a3e1bde684c5dec5ae1277e245b090c7f8b6f567
-
Filesize
173KB
MD5d4e43565cd9cd4ba6a984fa8f128fb5a
SHA10ce183d2a3066cd85de7c7b43fd4fd2db897b247
SHA256f94d17941974c15db440d3180c8b1ed315de8b9587a7253bf473e61237d6d9f9
SHA5127e5636a8a9f6f8a991dcc9809bc66c799be562e6d0cf54ca638cd2a27c645d5004ac15341833aaafab69b230ae758882774c1182b4f2fe31ce5bcca56e88647d
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54cebc7b63c76ff626fb1702a5cee7077
SHA1842558e20b0126f1950c6e1ca6474da31d56b4ab
SHA256a481166761492b51e1a2bc79fe86928c0e58322ef3f3afaab575dd02e8bbbf8d
SHA512a281fa7ca081b47e0c674a7c42cae13d7be815d3d2b182dc5047501ac5a3899d49d325ea4f2b042ff39d1bd39bba74e81bb24fb87f15a015c51b7a1513427c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a071f03ce00b759dd53f5508735126c
SHA1a6fa93bc793ef6e29ba8ac66475ecb103738bdca
SHA256364795860f4ecf27d14d97fed0416d319cf0eade2eb01aee9d662a30081ff43d
SHA5120552e953207c4c93c5695deed757f3c16ec026621ce8a3d78ea3c13f79d64a39b544281334d4a940a31367ba220b34c8dc651ceb70752810e3a82a5665285d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef3ea88acd9ddc7c75274d69762cc418
SHA181521f323b5374736b3e9112fc3c618aa3285e8b
SHA256c7f4f44b1843f93fc145317729f22059b09e6922dea06faf3dd234c006c323ff
SHA51282ec9c0ce0529829256bc366ae87075a6fe4d87ec8236fce25f8ef820fc571bf53afdb43bdad615066972990c4ee49bcd065eeb70a1c6ef72af45a839cc69dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5572b7f5570af577985836cb14e960a90
SHA11f4beb364b82ff97e0f5f0cb030032969218436a
SHA256aeab8da815ba508453ddba486a126bcf1b3db178466939f9cb80e7adec5aa4b2
SHA512a7a872bf0aca56a2caae9aa0eb685e9393b6ff9c1fa3a99d1c4faea1def5c9451c1f51be9741da2842e74080a30ef2073790ad1e73c245bfc6348cb75617ebd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1d21f0ba00e093374b5f53a96a0023a
SHA19ea669c77c52bd97a322e5e5c2461beaba82b956
SHA2567d07eee83a9ccdf08ddc07a1d5c8381db647a102e5ca5ed7268f89ca00cd5914
SHA512c54b4b1d1bb1e0156407663ea251f7c1b3e593b2d23cbc41489c84bb2fe3a6b5f4a954900079c49ba2b16c502858b842731dbb185e34c671904f5e112d5c02a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1b4986daab02a2d3450eb4b6e92eb7f
SHA1c046137c52603dbc4322c20b952aa2ff223c74aa
SHA2565861392e20484d1e821fbaa16bb51a5081a649138e8eda8a234b886bd14c6ec9
SHA51271c77c3491363a90181662cd9b481670c4aada175d39a1bec7b0c6d36a77bd7123425ab007cc6ea910a38c45ab76e1cb319d271aa0335d5082b199fbf31df709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5bd27306a782b69d3684ec0fa9e4f5f
SHA1e67fe3f5ff3a10cf9e9c060863bb645906db2765
SHA256f4eec580e2198928bff83203f2b7c1c12dddc26895bd19fa4778e26cc0df3c52
SHA512be365e6b1783bbb040b895c5eb275dee37480a2d4590582d257b36cfec467e13820e906033e8f72a6fe6ce8c9f7b124b1f6b4f8db3337439512593575803ef2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0b7c25a75b2bd0f3515282f57e62eda
SHA168dde2a19b085d389e1fd8a17715e49d2f07c808
SHA2568d42a6f1b90ab0a7476ea1998e112d83910f727d50ced77dbfbe5c75805db32d
SHA5127d217121e11628eab603cfe5b71afabdfe5fdf2a11f119d49168a44004e8573a34a8dd34dcd042f05f39af3a7a570d085ad292a849357464728210978c73b115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a7c6fe032aeb753951d324b85baabca
SHA1080b909ceb01f63468201779ebd9a4e2cc4d9d7c
SHA25690f0b1f6b5775d2aac54a3e112f4ec35a8cb17e0d8c6055860717dfc635552ba
SHA512205cab6ad6e5a3328d73cb9cfd37b4d81564c7b82e59bf0abbf3a61b1a6adb21e9290a8522a5e4422acc5233e22c369a960ccb98c6cc80017533f857f5b41a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4fee2d47a05979761f5246cd4386096
SHA1174e2dfff9a9300fd988528494a9bd1927c37ebf
SHA2566cb80768e7ab336fe03ce73be68846cabd02089eaa8aaa90301330ae5c979fc8
SHA5120afd90724b6436b6fb68c6044573250c5ec51a93a3a253c09ec98e6869d1e30971326da0272184dc1eac22398f2fa2ef651a70b772812bc45b3faccce024e76a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fc2643758b6ced1bf6a6b3d6c0a8195
SHA1322f82f3666d8b4887d822d5c87fd315049185f2
SHA25610b868f9090f4dbffb9644f783287e4f5dc1f737f86d329f13fcaf1424b78b7b
SHA512046c97a0e5834336bb46dee4130af817416ecae5402588c751c185ac3a54bf7247e942514f3dc6932aa45e406cbb8d527f3405a2a5122de9345e0fa27f42bdb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b553db55b15b1a1720dd473708873ce6
SHA1beb3909035fea5984c3b409a6ec7c408658234d3
SHA2562127e991fc6518237fde58603849d70e05e8a15d8aafb8be213649dd338d48d4
SHA5121cb25fb2465a046f1746cbb7b7aa7d648952b75b96af54578db02e83a571af1212aec7c9fc42b09f0453c16672fb1a36652db06095eeab81ab4741429586928e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53752718dd8b8813cc415b860d0eb1900
SHA1d98d183cd61dae8f5002428ae1ea40bfcd41c1e1
SHA25681f2a1b419f97f01fa020c82504826ec148b927c312b56e8813758dc4232a9d8
SHA512fb020068f759a71856ff5710bef9083a8deaa30eb8a2fb9d1fe6d69a3ea2c2a60b7682a7075d61eb15047d3118e5ac6a5cd527e65f16c531a68433f1c9aec18f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526b506ec87cac1e0feaae8a458d316ce
SHA13cd9603a09dd0454d07e287a8aafc7c6b918369c
SHA256c2baa9fed1b281237797599e6369757f2c94a078f2c821f992af8e829b3f94a9
SHA5121ce7b4ec44f28314f1f5cea0b03ff13653eb8739b265ed1208ceebb77426916523f0d15759267996f5cc80d15015e6517b05b15a717e127edd40d37242afe804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5637f22d749cc57a6a4c2b1298608e057
SHA10cb336cfb08985ecd8057a80917c640ab7ed6a3d
SHA256a72699ce9fe8c9086669701f43763c9dbcf0068d5c8607a86e1ee8a4b44f738f
SHA512822b010b9a90b22d1e625028270f109ea7540dcb823a28cec9538bbba234e70770e2a6fb448a9ac8e1a7e275b450f161edaa5009f4b589da5bbc61620e23c78c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518b123fdd34771c1e1bf235405720416
SHA1989bed5e287349aed8c64a60e1adafd8ff112d5e
SHA2565e5ebd67956e59c284c1ea44e8e20a37a68418cada4e2b5250976bc5fe6584b0
SHA512dbf2361858cd81c93042e7f52e859d570ef2c9a804de5001fc39bf8c6067ab8dceceeef8d41f1d20c93de90b9872989db3af2a199a504a2b8592f93e7ac24078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a635c8b0b51d953865703bf9d058f3e
SHA18344b61d2a6426fab4e7c4a5dd3e12cba521b57a
SHA256bd17aefef0742272869d8c74186653e7ac6e9562cd43286cf30baedcd107994b
SHA5126c1bdff28d33ea4ad86bec6846f6f6e32bc1e6e7fdcbfb0e96e25a763df32efb6571341f544a90ac75640723214d50c0ff587b2cd71f329bad1434a283b4a9b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1817aab3771eaabc209eecbe2420db2
SHA1d5cd4f22ce3d069c636377fd6d06a5c6eb0166cd
SHA256269519caebf8272b5ab755a808e2dd39a52d1c22bd5108a2d474ddf217176b58
SHA5121bfaba883cc9259ab96113237a29d5e740b21a5a4233935dfc557d7b7d7da881a1b3cc70a872ae0b3808e6602d738c92895c95ec4ea11c8d6d0fc64e3dfc89f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3cc1bbb8fb6a5aafcc103dea5837e2a
SHA18c4bb6240689c7de29b75624a029fc0f644d5323
SHA256e3834ae1fa8cc724e999cabad76c803e5c01d6fa0b375c13383032f166162d2d
SHA51255656142b05f9693ca65262b91f0c6090219b37d3f584abc03f921531450415e1245fc41cee9b2132590fc9f8c3838b42a451a70666283935e24c130daf7a6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a6f9ec64b83c2ab5a024940ccd18d294
SHA19ce32cd37b8bce57d3ba85a7285618beba5e985d
SHA25692065d9dc9245e58bef7e18b3b1cb10b3eeff87194bfb693057e1ffefa9050e7
SHA51234172b2ffbbe9e99bd69798ded49e268b9af5523e35a737e89d58504c47b39a887259a02cf607773ae3c11c44b26088989b12595ecf67c8c18d0f0fdc24c5b28
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
3.3MB
MD5b092dda4f22feab3059d592bb3eb052d
SHA1d6c580fbb3916498976c525f0dc30b7b42283544
SHA256cddda769f568d0472f21a4627898868e109e170a82ca8f3f1c1f6bdd829d681b
SHA51204be17083baa8225746b363c10d3c2e64287994c1e0f203f9e4b8420a70cda183e4beac4930b4b68449ccaacd8b48ee00f1e6d39741b7d0aca31881abf92c1cb
-
Filesize
375KB
MD53722b18641aa6ede7dc102364b583f2e
SHA13edcff06d8091b9dd4b3a9543f05d3158c29e97a
SHA25655912e6cc4a71d5c51b0eba1e63473f9c5653cfbca176d8cdb22165417a0f2d6
SHA512d171c394ecb45cb3ef61bc89381cb8ea2f99c006f65c2f7fb0146fea8be82e52daa15dd84e14d196948400b024bd970a837ed3a5c2dcb47165792cade7e7d31d