Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
2e3673ad3fcf84b2ee940163b0606991
-
SHA1
91c9224daca394a6c183b3301ffaa0f686f7514b
-
SHA256
734ab649a60c490a87a8821bba5ec8157b4fcb87a252f23a5fefebac71c9e13f
-
SHA512
66383a954dcaf05270515c3bc552ad6d2ec1a1399b8bb24956f4fe5d06202a0cc8ecce78f9da824dc9f56773efec75afb08e3beb0e7e0c9fef0d274651377214
-
SSDEEP
49152:ujcTfcBU0Ny1x16Yf4WNKlTTKjgvpqQbTh4gUMFIaEOrwHC:/Lf664WN4TZpqQbTh4Cb5rwi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2820 gamevance32.exe -
Loads dropped DLL 4 IoCs
pid Process 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2972 cmd.exe 2820 gamevance32.exe 2324 regsvr32.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Gamevance = "C:\\Program Files (x86)\\Gamevance\\gamevance32.exe a" 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{beaC7DC8-E106-4C6A-931E-5A42E7362883}\ = "Gamevance Text" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{beaC7DC8-E106-4C6A-931E-5A42E7362883}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0ED403E8-470A-4a8a-85A4-D7688CFE39A3} 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{0ED403E8-470A-4a8a-85A4-D7688CFE39A3}\ = "Gamevance" 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{0ED403E8-470A-4a8a-85A4-D7688CFE39A3}\NoExplorer = "1" 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{beaC7DC8-E106-4C6A-931E-5A42E7362883} regsvr32.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\Gamevance\gvtl.dll 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe File created C:\Program Files (x86)\Gamevance\gvff.tmp 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe File created C:\Program Files (x86)\Gamevance\gamevance32.exe 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe File created C:\Program Files (x86)\Gamevance\gvun.exe 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Gamevance\ars.cfg 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Gamevance\ars.cfg gamevance32.exe File created C:\Program Files (x86)\Gamevance\icon.ico 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe File created C:\Program Files (x86)\Gamevance\ars.cfg 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe File created C:\Program Files (x86)\Gamevance\gamevancelib32.dll 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gamevance32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier gamevance32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString gamevance32.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 gamevance32.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS gamevance32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct gamevance32.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434670252" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e004ac0a901adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{462227C1-8683-11EF-B40F-EAF82BEC9AF0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000c92ae7a99fd6af8643de576055ae75274cf65e738699f309071c25b3bafc07e9000000000e80000000020000200000008a77024fb03f1f983ec19200901f7b55dc5eda761e20daa5bee492c2feb97c762000000084ce0c53f088a375eafe8241b5bac4723776409f4e73cc08cca8683c442b8d0e40000000f991b33f912a60141fd01998187f74cf8b32f051ca1a0f37b0bc2a0f14e755eb19d08358038c7e9045e6662d282128647fcac5cf0b82fc7508f02cfb1dceac3c iexplore.exe -
Modifies registry class 31 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GamevanceText.Linker.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GamevanceText.Linker.1\ = "Gamevance Text" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{beaC7DC8-E106-4C6A-931E-5A42E7362883} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{beaC7DC8-E106-4C6A-931E-5A42E7362883}\ProgID\ = "GamevanceText.Linker.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{beaC7DC8-E106-4C6A-931E-5A42E7362883}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{beaC7DC8-E106-4C6A-931E-5A42E7362883}\InprocServer32\ = "C:\\Program Files (x86)\\Gamevance\\gvtl.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0ED403E8-470A-4a8a-85A4-D7688CFE39A3}\InprocServer32\ThreadingModel = "Apartment" 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{beaC7DC8-E106-4C6A-931E-5A42E7362883}\VersionIndependentProgID\ = "GamevanceText.Linker" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{beaC7DC8-E106-4C6A-931E-5A42E7362883}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\GamevanceText.DLL\AppID = "{beaC7DC8-E106-4C6A-931E-5A42E7362883}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GamevanceText.Linker.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GamevanceText.Linker\CurVer\ = "GamevanceText.Linker.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{beaC7DC8-E106-4C6A-931E-5A42E7362883}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{beaC7DC8-E106-4C6A-931E-5A42E7362883}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{beaC7DC8-E106-4C6A-931E-5A42E7362883}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{beaC7DC8-E106-4C6A-931E-5A42E7362883}\TypeLib\ = "{014C4232-6904-47B9-9144-7E0FB7277444}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0ED403E8-470A-4a8a-85A4-D7688CFE39A3}\ = "Gamevance" 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\GamevanceText.DLL\ = "GamevanceText" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GamevanceText.Linker regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GamevanceText.Linker\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{beaC7DC8-E106-4C6A-931E-5A42E7362883}\ = "Gamevance Text" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0ED403E8-470A-4a8a-85A4-D7688CFE39A3}\InprocServer32\ = "C:\\Program Files (x86)\\Gamevance\\gamevancelib32.dll" 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GamevanceText.Linker\CLSID\ = "{beaC7DC8-E106-4C6A-931E-5A42E7362883}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0ED403E8-470A-4a8a-85A4-D7688CFE39A3} 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GamevanceText.Linker\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\GamevanceText.DLL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GamevanceText.Linker.1\CLSID\ = "{beaC7DC8-E106-4C6A-931E-5A42E7362883}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GamevanceText.Linker\ = "Gamevance Text" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{beaC7DC8-E106-4C6A-931E-5A42E7362883}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0ED403E8-470A-4a8a-85A4-D7688CFE39A3}\InprocServer32 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 2820 gamevance32.exe 2820 gamevance32.exe 2820 gamevance32.exe 2820 gamevance32.exe 2820 gamevance32.exe 2820 gamevance32.exe 2820 gamevance32.exe 2820 gamevance32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1652 iexplore.exe 1652 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2972 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 30 PID 2396 wrote to memory of 2972 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 30 PID 2396 wrote to memory of 2972 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 30 PID 2396 wrote to memory of 2972 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 30 PID 2972 wrote to memory of 2820 2972 cmd.exe 32 PID 2972 wrote to memory of 2820 2972 cmd.exe 32 PID 2972 wrote to memory of 2820 2972 cmd.exe 32 PID 2972 wrote to memory of 2820 2972 cmd.exe 32 PID 2396 wrote to memory of 1704 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 34 PID 2396 wrote to memory of 1704 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 34 PID 2396 wrote to memory of 1704 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 34 PID 2396 wrote to memory of 1704 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 34 PID 1704 wrote to memory of 2324 1704 cmd.exe 36 PID 1704 wrote to memory of 2324 1704 cmd.exe 36 PID 1704 wrote to memory of 2324 1704 cmd.exe 36 PID 1704 wrote to memory of 2324 1704 cmd.exe 36 PID 1704 wrote to memory of 2324 1704 cmd.exe 36 PID 1704 wrote to memory of 2324 1704 cmd.exe 36 PID 1704 wrote to memory of 2324 1704 cmd.exe 36 PID 2396 wrote to memory of 1652 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 38 PID 2396 wrote to memory of 1652 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 38 PID 2396 wrote to memory of 1652 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 38 PID 2396 wrote to memory of 1652 2396 2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe 38 PID 1652 wrote to memory of 2864 1652 iexplore.exe 39 PID 1652 wrote to memory of 2864 1652 iexplore.exe 39 PID 1652 wrote to memory of 2864 1652 iexplore.exe 39 PID 1652 wrote to memory of 2864 1652 iexplore.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e3673ad3fcf84b2ee940163b0606991_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files (x86)\Gamevance\gamevance32.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Gamevance\gamevance32.exe"C:\Program Files (x86)\Gamevance\gamevance32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32.exe /s "C:\Program Files (x86)\Gamevance\gvtl.dll"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\Gamevance\gvtl.dll"3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2324
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.gamevance.com/aj/ty.php?p=srKz%2F8u6wsH0srLp59Tr58rHyeSyu8DH%2F7CywLaxssDFu7a7ure6wLH%2Fo%2F%2Bzs7Oys7Ozs%2F%2FMyA2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95B
MD52d72148fcceaeb8467516456b22f350b
SHA19fb4b57f5e0d7dddceae0b575d508d0a77f05b51
SHA2569f74076d62c14cc5e412f0f8197b2368f611472fad42601deac3fa6cdb443501
SHA5126308fb451cf94b20c362562986b6fddf06d643836870c460821c4893997390050d2439c6150235fb898bbacb10cc9dd0c41abd15bc6e5ae942b67263fc72cc49
-
Filesize
107B
MD577aed9fbe29d6d049746404299edce62
SHA14539b254e3cb72359920674c538788fc2f3df061
SHA2568613445c0652a030fb843c5f0e4bd0b2b2f045c0179dc1643be65c456aebc745
SHA5124e8de0059ad7f8e53903124d55ee91cdee1ca24b1090ee863fd9ff37314763cc3b3c43ddd476757075232529e40baae4285912bfa7c5c397afe147987731df4b
-
Filesize
163B
MD55bab9d475fb5a9731c3edc24762c44eb
SHA1c3fb314526e52445d2ce013840270e0b610951c4
SHA256e213b4f807f152d97a6fdeb127f0fd4966739b8121f14c124b5ea262588e44fe
SHA512887046fd1b436063631a33eb761d377d2c2fc3b111574fd86addb0cad44e5c90a1548ac1e2af8b4d7303a3e74399d971f6c8050a6e51e364ea0d8fe61a2f9803
-
Filesize
261KB
MD5a8076c285203aa6c4248362c5168203c
SHA19d73ecaf478d843dff8e1781f6f9aa2f11bf7ba5
SHA256280cd7a2384a21f75541f9bd09ac2660251760ee56759c1d00180f6652a3ea58
SHA512ec44fc926a2daef2a9bcb477cb9f207c012842a896c5945b33cafbfd54ec7dd09610275a7a30182856c76b825d96991882a10a8e06c962c4e862838fa34ad073
-
Filesize
262KB
MD5574eaccc9492b329d83f5a78d48c582d
SHA1b69224f394132c5ec67d2d69e11fcf7d873e5e36
SHA2569ff4ce7bb23d96967e31dfe1e28c66f18ef27170570d3df0f1168f9cf6505473
SHA5124e2ac91cdc562119abfcee4ea44d9e34f08c200fa798209e5994c6389e70baef2a530f593bd37aed22b9ebdfca7f6e42926fee01de6bd0da899649d302586e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe18869086945d9e953cb78578adb912
SHA11c2652d43271919c23e2e1d1e71e76fcbc914f8c
SHA256804bcb842034a71bdc2e0b0d370e4d9c37af051f3f181a24a69246832d8bc51c
SHA512d59a09a48f3d2f82d0d82fc87fae591cfee5bb4ed0a4bb306a644b010ee9263b266b6ffcf773dfd3b197d7a9a73fd1dbe1a87d0dede25d278d5bea1676bc0396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be90b7ecb0f9cbac4e2d453dd3e0bcb
SHA11399aa438a22c425b371f51bef035c4ac460d4c3
SHA256bc5777779d2e83bcd0cc8a62e6e3e51a9783722ac42632aa0b9f75e197bc0427
SHA5126148ced52a9023ea7a814aa39d315a622588afa63c830120fa5ba03278743caca6c2d87c53ccf77fb623491b517611d9edd01991fb4d20490e8fe4ddce837a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f81bebe59427f5a5c811fdee53a5b3f5
SHA11fa5194735987e97c386f0907acfe6b6cc7d05d5
SHA256e59652d23e965dc9a25eec4f88641aa76a62c5fde566e7d1af2518782bf09c31
SHA5129bd49967f387434ff934c1f6a07cd4fd8081223f55c6c1ac2de355b48878e063f4db29756b07872383fd0731c08de87d2c135b6cb84ce90bf43a26713a91e3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d1a0a0f9d923a7a0d9a62518e6ddfff
SHA1affc36d216414ccd774f8988314d05df6c01501e
SHA256020398840f7daee9fd1ad18014a34ddadd1ee6670499ce7909d33fe15b75a87f
SHA512634f4cc992dde8ae5ccdcbc832a52cb2177237c8b70ce15bc1f45166143037a8385b4d10c4a4ccf4285944ae2a9960d5a108a0bb4459d344c26904c3c6d96004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9b547089f1a89b81b1c74efd155324b
SHA1cedfef988c6aa1207728460cca9e79e4e6d97402
SHA256b023a29262bd69f28e2b5de9a93648ded7a262f3e062a6ce75e821de1ad84c87
SHA5120103bc2a68014ab847fc0253025e06a3130d8b5d0f8394535c4f530ad3c655c1eb9b39ab1692884f3c9ec912aff1840e4419cc0a624b266c2edc0cdb4b04207c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b39df568eff280a07672ebe4de9f7122
SHA199b4d18c6cd57c23ba143afc8cc45d037465abc6
SHA2564675a4b59ad1f1f1880e4beb395d79c619c9f48e24bebca550a38ae99baa7a95
SHA51247565c60ee8bfbe11359e52cfbbbb5d37ee351c176d4da9a11804c16c43b3bbd48c7e958ad24bc1fe29c218b814b56eb67b192759c76251a7bda0ae8e33ce9ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5381a5a1f7ed441317ad63b32866481cd
SHA16351380d4d354c852e4c019353dedc7492284170
SHA2560fc5e3e08914c02e66e1c3065a6f7b2ddb499d83b9b45ddef8dfc6ef12106d92
SHA51268e023a593120d372a6f27eb2d26ac622dd6e225ffb04ff7612e51752c08b391a95f1d2d585dffa837ce7755feff88b0b81f27579b9fab34196b6a305e65eb48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d080a2b90f6d9e834cb391c428d18928
SHA10b57bd88144484ea487173a1633dcfd05670418c
SHA256920b62bb795fc5390ef2bbb9a92df8cef69989f2bc94a9a042f27b54692c5b53
SHA512b47fbd2705dfac7a0dc80cf6353de43f4e4db890fbe34eaee1a9d92382dbdfe649bfdc2cf9b24f95d503a16c4fcde77c26f2ca857bcb89e6234a8557693d00fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b469287e05f91f5e391ec97680636442
SHA14390601b87eae1309f604f21149f6fdd277410f5
SHA256cf84b8c5d2c7cd9fedd70c65fa869a9c1292fceeb4c2527594e2d6c43eb99ebe
SHA512ca04b765679f4a4f81f881d350fa153cb0ea498c3eb5f3ddb707bbfd55b217a55364a18ca151b87f3ab1be1a93c6a607419aed6bdba6a493d1d59b96a0179a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccade40d1e93b0551ccf1b0f183cdbf0
SHA16793b6d6125395b96682327b8949531885c7c6ab
SHA256b0ab108516d780b7b0feddd5fc0f7693bf5958a006c3db770e65b00b24a3bff7
SHA5127facc2e8b233c9caf729031062b891f64482b58bbd9e64be16ea0b42a90fd5e953552bed11f9eb01fda3818e7d6a14e0fe7558191a69c83e24eb7f153d563db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5addc2b47ce41eabb63e247322dc85d08
SHA1471418eebe7885b71dc1869edeb26afa4eeb57ba
SHA256882ac3b790d9eaa02a485a96ac199f1685152ac498a7f843ec52eac2b80eac68
SHA512b0f40aec4cbeb6844999cc4f4a37e009a85a169e1f755918909ee99b15ee7f9c4d72be1d7a9cc7df3678cb3b8631aa6e8d10b2c4dff2d95cdd46e2e449a6f896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501af9cc20b43592aa45b2237768f9784
SHA1e817040ed9959614dbbe575f7e08d316b52a86fc
SHA25617263f14907a00a7cf836801112942ae5e1b4ac8ec683e3f4bff708fa3cfe2cd
SHA512416f7d0b4a97712eeecf0fb96cecb4e84ea47ce95990215e3bf39706fd50540b77752c5108dd5f05c79fbcc38344399cfa61f170eda13f174ae599acc97818fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52190f3e56847e9a16ce10b46ed082773
SHA11ab3ac64d04ca26a086de7bf5a6fbe852c7e25f3
SHA256c9c570042e1da791cc424ac9b1c11e01d953a79facda5880fc769650c536d098
SHA512374f9580e89e82d80b0557655126e0088bafec07979201896c4e1e86feb14a33a5c0d0871e84141dd6ad31f0f1e2ba6478a1795e97603751c08912940e9a4ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bd40e9c14f7e0511d297e1f68a8b817
SHA1b3a95e49da3d980782e496963e015cc918a6cde3
SHA256ad7c04e120419759b3bde632b2c9fee8d895bea29dec29a86891d1cf48749862
SHA5127bf767f6e111510fde0fe798f55780b6fcf2e9ef8125ebd229e4c6ff694fec51c2ef09000507921af194b7a6a05b9266cbd26871e9304c3914d596e474230dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531aa64c4f4493b0c6c1db90dd72958fe
SHA1d4fb0f75a995e8188b166f55fde940468978b6f3
SHA25635528a83b76a260ef0cdf82fa9d85971d68ff126202cdc87219375c37d4312ae
SHA5125a4ea458933d895621bf39ea3893a582b2b6a9fba021aa4528f9c7478f775738fbb77719357c97268ebe82f7d35e29ea555b33296174f995cfcb99ba664342ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b80388825950d6c1305752c8244ec9d
SHA1d64ff36b89d461153f363b7f906898ab6d7bb195
SHA256447f173af5036e55b0d0f1c3c8fcd0b7b7fb5439cedda852061d8b02fc8598f6
SHA5122663253da168e861990d4ce2ea9f10749ab23ae343337de458c24eb1116a7b46ab8a9e2a9a051685cdacad1d8594adc78291a6d9a45d5e1eb4fdcb6bfac78268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f40cf57bd53e59cc261dad44a825ce
SHA13a3b0352db4b406efc983df756e6a4a2d5865b6d
SHA256bd9bbc1828040d0c63a49b180a9fcc290057137452c827982d639586e3a6fb51
SHA512bba49f41b9055ffc4b736a9975a920f434911027509dda8655be1dd0d00db4f9dceaf9c76e94be477e80d44dead12dd004fbd21d4451777c0d2968c302bfe9c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50530efd28a69f4ed0635706f447b8a51
SHA1a9d409b8d98bf7c31358a9e441215841d92eceef
SHA2562f06a8828cbfcec77f33276bf97ebfc5545bcbafeadd9e7374873d273fa51423
SHA512dbf4f67c417f8e0f07e2817a4c20c3d3e17c503d0ea3b13c819176d87021f53404fa98f0c25e52b39558ba907cf949544fc4b9be3cf88ed1b4c58e529604cf1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca907a3a6d7e066209e5201a19d480a
SHA15f77f6c52cd355346b665eddd0e2f31a038bb694
SHA25690a1a9b57ee0b48f1835bf6316ad8e5c81e28a13c56f3aff6c40dfdbc35b95ee
SHA5126f7b56205f55d62980a71e1f1f5bd60291835e5e95964474e9d8eb572846bf1ea2cecdea4d147f237de4a6ccb75cb1b773689e5fadf95082945c321809f25b20
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
241KB
MD5a5aa1e2306a9daee26333e556ae1db3a
SHA10d80d0242cfb7dc87ca66fe17c1df4f86b393302
SHA25692de2ed0ee0bf5984a21261c3334a7af47d2cc69c7f0d5caf5268178ef6ee0a5
SHA51250e8950a349559446a993c62bb53de6c5114ed36eebb059bdf9c56fddf9114b6fe2559f4d9ec85566553d1244b90ad13550b09cee061a2c9899860294d60587a
-
Filesize
228KB
MD5f80b6f3aeb2b3203f35aba9c8b4b8780
SHA18c41eaee63f08aefde159f21fdfa8a06b61c331b
SHA256827ec1f0fb29c6ef9bf449b68eba87172f26b5725939feb1357c2befb5eb519d
SHA512846aace00678e8800adc5ecb7d2923768d913db2d761bb698a080eae18eb009e4905fcade93a30cda52a8d8f8abea9ff9baee7e4a56f3b06ad29fafa26690238