Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
39c437863ce...18.exe
windows7-x64
79c437863ce...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$R0.dll
windows7-x64
3$R0.dll
windows10-2004-x64
3CopyEngine...ne.dll
windows7-x64
1CopyEngine...ne.dll
windows10-2004-x64
1Listener/c...er.dll
windows7-x64
1Listener/c...er.dll
windows10-2004-x64
1PluginLoad...32.dll
windows7-x64
3PluginLoad...32.dll
windows10-2004-x64
3Qt0SystemInfo.dll
windows7-x64
1Qt0SystemInfo.dll
windows10-2004-x64
1Qt5Core.dll
windows7-x64
1Qt5Core.dll
windows10-2004-x64
1Qt5Gui.dll
windows7-x64
1Qt5Gui.dll
windows10-2004-x64
1Qt5Network.dll
windows7-x64
1Qt5Network.dll
windows10-2004-x64
1Qt5Widgets.dll
windows7-x64
1Qt5Widgets.dll
windows10-2004-x64
1Qt5Xml.dll
windows7-x64
1Qt5Xml.dll
windows10-2004-x64
1libgcc_s_sjlj-1.dll
windows7-x64
1libgcc_s_sjlj-1.dll
windows10-2004-x64
1libstdc++-6.dll
windows7-x64
1libstdc++-6.dll
windows10-2004-x64
1libwinpthread-1.dll
windows7-x64
1libwinpthread-1.dll
windows10-2004-x64
1supercopier.exe
windows7-x64
1supercopier.exe
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
submitted
25/11/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$R0.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$R0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
CopyEngine/Ultracopier/copyEngine.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
CopyEngine/Ultracopier/copyEngine.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Listener/catchcopy-v0002/listener.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Listener/catchcopy-v0002/listener.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
PluginLoader/catchcopy-v0002/catchcopy32.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
PluginLoader/catchcopy-v0002/catchcopy32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Qt0SystemInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Qt0SystemInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Qt5Core.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Qt5Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Qt5Gui.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Qt5Gui.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Qt5Network.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Qt5Network.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Qt5Widgets.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Qt5Widgets.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Qt5Xml.dll
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
Qt5Xml.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
libgcc_s_sjlj-1.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
libgcc_s_sjlj-1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
libstdc++-6.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
libstdc++-6.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
libwinpthread-1.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
libwinpthread-1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
supercopier.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
supercopier.exe
Resource
win10v2004-20241007-en
General
-
Target
9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe
-
Size
6.1MB
-
MD5
9c437863ce287dbe91d54c9d8a06d226
-
SHA1
dface0d050c8010765d3efc8c3940e47bd230a11
-
SHA256
a08a98bc149a27bc5e64f1766b2e3ed500ca32fd46a2ca74df9672860269f396
-
SHA512
f83da58a21c3ac8a5d169426e29d9cdb0ce9e3a6eaef700e686ed884f224bf3817e9fcf1f4e1e2fee790eae589418d6afc541ab9d08eee14db447745cbf9b239
-
SSDEEP
98304:JotyK3buHcaUbxL/EnRJ2VFHFJcPFJPMuG+ZYvZVEfCcfnA9Qzd3cQAspTXoB:EaHS/sMFliN5vtUf4fzfAsdoB
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 3 IoCs
pid Process 2104 supercopier.exe 100 miner.exe 3744 miner.exe -
Loads dropped DLL 58 IoCs
pid Process 3396 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe 3396 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe 3396 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe 1680 regsvr32.exe 1060 regsvr32.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 4232 regsvr32.exe 3460 regsvr32.exe 100 miner.exe 100 miner.exe 100 miner.exe 100 miner.exe 100 miner.exe 100 miner.exe 100 miner.exe 100 miner.exe 3744 miner.exe 3744 miner.exe 3744 miner.exe 3744 miner.exe 3744 miner.exe 3744 miner.exe 3744 miner.exe 3744 miner.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ultracopier = "\"C:\\Program Files\\Supercopier\\supercopier.exe\"" supercopier.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Supercopier\Languages\ja\informations.xml 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Languages\zh\flag.png 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Languages\zh\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Listener\catchcopy-v0002\listener.dll 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File opened for modification C:\Program Files\Supercopier\supercopier.exe 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\libwinpthread-1.dll 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\CopyEngine\Ultracopier\Languages\en\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\CopyEngine\Ultracopier\Languages\zh\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\PluginLoader\catchcopy-v0002\Languages\hu\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Supercopier\Languages\en\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Supercopier\Languages\zh\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\CopyEngine\Ultracopier\copyEngine.dll 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\CopyEngine\Ultracopier\Languages\id\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Languages\el\informations.xml 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Languages\pl\informations.xml 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\PluginLoader\catchcopy-v0002\Languages\fr\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Languages\pt\flag.png 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Supercopier\Languages\de\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Supercopier\Languages\fr\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Teracopy\Languages\de\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Windows\Languages\de\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Languages\fr\flag.png 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\PluginLoader\catchcopy-v0002\Languages\ja\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Clean\Languages\en\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Teracopy\Languages\es\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Teracopy\Languages\ko\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Windows\Languages\hi\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Clean\Languages\hu\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Supercopier\Languages\ja\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Windows\Languages\tr\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Languages\hi\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Clean\Languages\it\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Teracopy\Languages\nl\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\CopyEngine\Ultracopier\Languages\th\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\PluginLoader\catchcopy-v0002\Languages\ar\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Clean\Languages\pl\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Supercopier\Languages\it\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\PluginLoader\catchcopy-v0002\pluginLoader.dll 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Supercopier\Languages\ko\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Teracopy\Languages\hi\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Languages\el\flag.png 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Languages\it\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Listener\catchcopy-v0002\informations.xml 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\PluginLoader\catchcopy-v0002\Languages\id\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Supercopier\Languages\id\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Supercopier\Languages\nl\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\README.txt 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Windows\interface.dll 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\uninst.exe 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Languages\es\qt.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Languages\tr\flag.png 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\PluginLoader\catchcopy-v0002\Languages\ru\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Clean\Languages\th\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Supercopier\Languages\ar\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Supercopier\Languages\ru\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\PluginLoader\catchcopy-v0002\Languages\el\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\PluginLoader\catchcopy-v0002\Languages\no\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Languages\pl\flag.png 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Teracopy\Languages\el\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\miner\zlib1.dll 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Qt0SystemInfo.dll 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Themes\Clean\Languages\id\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\supercopier.exe 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe File created C:\Program Files\Supercopier\Languages\ar\translation.qm 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 61 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\CatchCopy regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{68FF37C4-51BC-4c2a-A992-7E39BC0E706F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\CatchCopy regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\CatchCopy64 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\CatchCopy64\ = "{68FF37C4-51BC-4c2a-A992-7E39BC0E706F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}\ = "CatchCopy Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{68FF37C4-51BC-4c2a-A992-7E39BC0E706F}\InprocServer32\ = "C:\\Program Files\\Supercopier\\PluginLoader\\catchcopy-v0002\\catchcopy64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\CatchCopy64 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{68FF37C4-51BC-4c2a-A992-7E39BC0E706F}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\CatchCopy regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\textfile\shellex regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\textfile\shellex\DragDropHandlers\CatchCopy regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{68FF37C4-51BC-4c2a-A992-7E39BC0E706F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\CatchCopy64\ = "{68FF37C4-51BC-4c2a-A992-7E39BC0E706F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\CatchCopy64\ = "{68FF37C4-51BC-4c2a-A992-7E39BC0E706F}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\CatchCopy64 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\textfile\shellex\DragDropHandlers\CatchCopy\ = "{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}\ = "CatchCopy Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}\InprocServer32\ = "C:\\Program Files\\Supercopier\\PluginLoader\\catchcopy-v0002\\catchcopy32.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\CatchCopy regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{68FF37C4-51BC-4c2a-A992-7E39BC0E706F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\CatchCopy\ = "{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\CatchCopy\ = "{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\CatchCopy64\ = "{68FF37C4-51BC-4c2a-A992-7E39BC0E706F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\CatchCopy regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\textfile\shellex\DragDropHandlers\CatchCopy\ = "{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\textfile\shellex\DragDropHandlers\CatchCopy regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\CatchCopy\ = "{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{68FF37C4-51BC-4c2a-A992-7E39BC0E706F}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{68FF37C4-51BC-4c2a-A992-7E39BC0E706F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{68FF37C4-51BC-4c2a-A992-7E39BC0E706F}\ = "CatchCopy Class" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\CatchCopy regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\CatchCopy regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\CatchCopy64 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\CatchCopy64\ = "{68FF37C4-51BC-4c2a-A992-7E39BC0E706F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\CatchCopy64 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\CatchCopy regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\textfile\shellex\DragDropHandlers regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\CatchCopy\ = "{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\CatchCopy64\ = "{68FF37C4-51BC-4c2a-A992-7E39BC0E706F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}\InprocServer32\ = "C:\\Program Files\\Supercopier\\PluginLoader\\catchcopy-v0002\\catchcopy32.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\CatchCopy64 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{68FF37C4-51BC-4c2a-A992-7E39BC0E706F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{68FF37C4-51BC-4c2a-A992-7E39BC0E706F}\InprocServer32\ = "C:\\Program Files\\Supercopier\\PluginLoader\\catchcopy-v0002\\catchcopy64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\CatchCopy64 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\CatchCopy64 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{68FF37C4-51BC-4c2a-A992-7E39BC0E706F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\CatchCopy64 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\CatchCopy regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\CatchCopy\ = "{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\CatchCopy\ = "{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{68FF37C4-51BC-4c2a-A992-7E39BC0E706F}\ = "CatchCopy Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{68D44A27-FFB6-4B89-A3E5-7B0E50A7AB33} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\textfile\shellex\DragDropHandlers\CatchCopy regsvr32.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe 2104 supercopier.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3396 wrote to memory of 2676 3396 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe 95 PID 3396 wrote to memory of 2676 3396 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe 95 PID 2676 wrote to memory of 1680 2676 regsvr32.exe 96 PID 2676 wrote to memory of 1680 2676 regsvr32.exe 96 PID 2676 wrote to memory of 1680 2676 regsvr32.exe 96 PID 3396 wrote to memory of 1060 3396 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe 97 PID 3396 wrote to memory of 1060 3396 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe 97 PID 3396 wrote to memory of 2104 3396 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe 99 PID 3396 wrote to memory of 2104 3396 9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe 99 PID 2104 wrote to memory of 4232 2104 supercopier.exe 100 PID 2104 wrote to memory of 4232 2104 supercopier.exe 100 PID 2104 wrote to memory of 3152 2104 supercopier.exe 101 PID 2104 wrote to memory of 3152 2104 supercopier.exe 101 PID 3152 wrote to memory of 3460 3152 regsvr32.exe 102 PID 3152 wrote to memory of 3460 3152 regsvr32.exe 102 PID 3152 wrote to memory of 3460 3152 regsvr32.exe 102 PID 2104 wrote to memory of 100 2104 supercopier.exe 106 PID 2104 wrote to memory of 100 2104 supercopier.exe 106 PID 2104 wrote to memory of 3744 2104 supercopier.exe 109 PID 2104 wrote to memory of 3744 2104 supercopier.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9c437863ce287dbe91d54c9d8a06d226_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\Supercopier\PluginLoader\catchcopy-v0002\catchcopy32.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\Supercopier\PluginLoader\catchcopy-v0002\catchcopy32.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1680
-
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\Supercopier\PluginLoader\catchcopy-v0002\catchcopy64.dll"2⤵
- Loads dropped DLL
- Modifies registry class
PID:1060
-
-
C:\Program Files\Supercopier\supercopier.exe"C:\Program Files\Supercopier\supercopier.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 /s "C:/Program Files/Supercopier\PluginLoader\catchcopy-v0002\catchcopy64.dll"3⤵
- Loads dropped DLL
- Modifies registry class
PID:4232
-
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 /s "C:/Program Files/Supercopier\PluginLoader\catchcopy-v0002\catchcopy32.dll"3⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\regsvr32.exe/s "C:/Program Files/Supercopier\PluginLoader\catchcopy-v0002\catchcopy32.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3460
-
-
-
C:\Program Files\Supercopier\miner\miner.exe"C:\Program Files\Supercopier\miner\miner.exe" -o stratum+tcp://stratum.bitcoin.cz:3333 -u alpha_one_x86.ultracopier -p 8zpIIATZEiaZOq7E -o stratum+tcp://api.bitcoin.cz:3333 -u alpha_one_x86.failsafe -p eXxxZHOvy9VvKkEJ -o stratum+tcp://mint.bitminter.com:3333 -u alphaonex86_failsafe -p IBeka72HStdLnDZm --no-adl --real-quiet -T --gpu-threads 13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:100
-
-
C:\Program Files\Supercopier\miner\miner.exe"C:\Program Files\Supercopier\miner\miner.exe" -o stratum+tcp://stratum.bitcoin.cz:3333 -u alpha_one_x86.ultracopier -p 8zpIIATZEiaZOq7E -o stratum+tcp://api.bitcoin.cz:3333 -u alpha_one_x86.failsafe -p eXxxZHOvy9VvKkEJ -o stratum+tcp://mint.bitminter.com:3333 -u alphaonex86_failsafe -p IBeka72HStdLnDZm --no-adl --real-quiet -T --gpu-threads 13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3744
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327B
MD518770de3f96bac1e75e588015024fcf8
SHA1e6254c054edef68f9c27059efd82eeaa69c863b5
SHA256257e81e6819f72b7a38099365e27a76faf9b2b5081290730f4784045ecc2df40
SHA512fcb76291a73d7f2e30f4266ea8f0dfa2d9e203cf9770fb7ffd73cc1994502992fabd0803224c1e1155c1e4b678b5af0e8b3aec114beb1f02299e8885d5a61d0a
-
Filesize
1KB
MD5a2c1b521b30cbdbb199f7feefc7e17dd
SHA1523a481d35ab57553f4f42d4e61efa44fc3814d3
SHA25664f4235a2e3aca2d252eafa840392fb539f98cf2e1a9287e1247deeb550b117d
SHA512c95a813822252dcf8f689a86f232d56537510ce317609588291ee885473847029300ff7a32c8c9294880b97ce46991318d1f46ce677d19016273fe28af8c4273
-
Filesize
2KB
MD585256c44a8a1154e3334e53b8a4642f5
SHA1e9431a86ae542c404afb204c973abfb28695cb15
SHA2569d7ccddc5e79298ca2231a699695531201397a77ee53121e0062f6ef20000ab6
SHA512479410b0296f61b6309257d05207fd5271970556d84bd6e537414769baf7f119c9b798f21228bec5b778b12af6558ce085a408656fbc7106a4c2d341ccd99a4a
-
Filesize
2KB
MD5d88715fb0de32d3dbf15c02c000faaa8
SHA1eb3572ffeae9505e40faaa9ad645bf97274b1a8d
SHA2568e56fd7821fddd9c0ce3d78ea83547c3be353775357c5b647f6187d7327432f4
SHA51247caf42a7c5bce9a61f2e4bd085a0848758736d0e53dd5e80ea2c0dd575b98b6f71369097110b772fafc9eaf1ebd3c1c73f54c922fa02d17d584a0b468cd766d
-
Filesize
2KB
MD53555d1abc169172c904ad862424018aa
SHA1f49eeb5693b1d4ee097a92a5063b299f2f6e8572
SHA25672c9f3a0ae53b95c06e22357474c797d585b98090aa52089150807f4ec18eb42
SHA5121a0863b8bc7d2b4e2f77506d25b6313a2521dcb832202700b872a6eafd89230ae04a7111644ae7a340819b41a772ac10a1ea8add3492740f2f4fa2d4d3353497
-
Filesize
2KB
MD51cfe5d8e48c591c867eab2964f0afeff
SHA18d1bee77c607573605dd64443e2b95e80a297838
SHA2569617014ed0dddaeb0b8eb75fc9b895ead01b1b5873bcc79e4003be43c1a9392f
SHA512a22b214d58002c1d75d8d88a8177c02d51afade44fa4d4f6fa267b17a078ab9575f5d0878ffbf050053262ee8e5cee402e903a53f920580f534ef987e3303e08
-
Filesize
2KB
MD525cbdf207f22069c04df8980ffa0ffd7
SHA14bfbb8b2e1a02dac822743c1a171cb39839ded6a
SHA256ae31a26bb5c0ff223ff69b54d5c46ddc24673db3fe13096136dc8d1f1cdad9c1
SHA512eacd08c39ae9a47586806e1ef1c2e1e179e1147bab585fe4f12c24ec2f162befcbc1df6a719de3db154443936021de3d4cba5c52a3f0988fe5869c7aed0d74b6
-
Filesize
2KB
MD54c55a381d00fbfde180623c52fe1e193
SHA1b9f555be405daeb092d7f6d99fcb0928a881a326
SHA256feef6741cc976bec51cf46b8ca7e6ed7d94c867557fa5cec9019f8106dcaceee
SHA512f3a74301e38d308ce2a94c54f01f9240ee1e388ef1ac8a5786df4a1ce878b985acdd7a3a48db39e7b80787ebe8d7a496d0c37eeae63034f402c5fa4d2438d9af
-
Filesize
1KB
MD5ec247db40ef9839e777bf081c4d6fc2f
SHA12fda39998f0cec78f0e8285f39ef6b112479e58a
SHA25615785e30bbf306fa44f444a746bbc3211a0d9a11a731c3353e041ef3b9fb304f
SHA5128e42de15802cd8a6c5da1948a97c66059d6ca82ed211210719750e4c32c7990abf9b91cad0c334719bccca07746be625a450b3a00680814851593d9e6e73247f
-
Filesize
2KB
MD5b422d876c50776794e300d116c1942a7
SHA18bda9e881fb903a66a13744fb11cd095418a9bce
SHA2563929de168ff12ee878a56229b1d974a1ec7a74cf42c73972803a0b3d78efa24e
SHA512e1ac73ef33c479bf90121c5b765397a371989d2875423af23680688fc0ff8af2fb415fd73590986d3f2fd2177623eb0f8d3609c51578eb4ca379a0d599059ce8
-
Filesize
2KB
MD5c2b8e33dfaa67956eca93890a4a955bd
SHA1bf1a1ce8ede1aec6f1f52c40416aad835426f743
SHA256a951d2772b9208f072993c23432f152ea63681e7e597b03dc0428f3cc25a54bd
SHA512968f04524d6c85328c889f4b98e1bb7a49b88c68f94a3da1120a150df22d72c4e8caaabd32590bf1dd0cbb0bc7b35718b2fcc74209e8a86b92cd138df4e14686
-
Filesize
2KB
MD5d0f45100736a34b4a37a4731de3f06f0
SHA1eb1fbf55dc0385ae8f40e66401ad37b0ee45efcd
SHA256510b001a221b9f49d9191ac56234a6f5e294cf96f5f4bfc0f57babc0aca98609
SHA5126dc9e6432c697ec32fb0a801b14615869d9a63960bccee0baaa0ab5fb915668e88dc15dcfd8d91bc22ccb02166f74037eb9eb70499c056db6c2c744291bd7bda
-
Filesize
2KB
MD5aca0ddd59ab032a50d418b44ee835804
SHA181191f91290d7f2216c66da980aa91a09d5b63bf
SHA256e6eb3710361b2abe854944bf810f19f9d3ccb88d37ce98981bb41562efbc8355
SHA5126a4b4d152bdd2620d5dc7e78766d759af43d775ec486cf79a46bf6d97d3d370190f997cf92a8a53eff4e6c2f597b28890d0d7e2bcab5584386ea8e92116bd0f7
-
Filesize
2KB
MD5f1bd1eea1262ca0280f735384358cfaa
SHA11077792a443e45b9a2f953c85ef8d9ef59c46dc1
SHA2562af9c934bc4cdf978ad4652035386bee1c4bc97314bff665e882a1a32138cb93
SHA512f38b4d7300f3713884b822c5cf5d5e408292a22d906612001e497566c475db4b3492b58b874914885fbbbcc6c3ecdc5b0d51b1fa464a3aa2f257c9e7ed538e34
-
Filesize
2KB
MD521d7ec2bd85e741d0363ae1dd1923404
SHA17875d9e39f1eb7a440a330065db480478fb9e18f
SHA2562855bc8701ef680123b26427cd9f650d12aaab9b08048020bb394c672f670b97
SHA5125f1ba75d544d5d6fb929c95e40372ce58fd35d937fd7fd68209b281d68e3d3b69d3d55a820615966b9aa6a127fa30027361226687733efaf4666dfb69e809aab
-
Filesize
2KB
MD53f74240600f89ef23656ad9441163abe
SHA1fb95058907105c38e8093f0f380ffe14b4de6b52
SHA2566387522ebe903f6c406047318427584f4f46aa84791f69f40b1a20b47aeca7b5
SHA5125de1b02ed7da4c3e9a468aecf9d103fe39c4a24e586991085d7886575ad61ad83874a04a547a4e104e16c4cd1f8d663bbb3ceacf445b8d267ca4bafc4275f4c0
-
Filesize
2KB
MD520ba8ae503282446b3bae28928c7e309
SHA1b2996340475e60f938eb46e4963f2799732f3dec
SHA25672db695aaf960ee4fd828fab54d3f03865c067a3d47b8f1e6cda01fd3fdffde3
SHA5123e98e8b8d72265d98997d026640c39ee916293b0bffcdddcfec207d700a649fcff14b38731ff8e8887a02d433c0dedad9c034eb155ae1c7cb000a105418728f9
-
Filesize
2KB
MD594b5229f88de6fa0470dfcc15d3c0047
SHA12892cb796b25e3641023db7190bb913de3f7eb7e
SHA256ffa44f35acc4bf8ef9649fecebc7f5907cd1f20dd2d1860c192ed1f816efe041
SHA512104cf0cb98f9b97d83f26063cac58b3694b3e5c7919e64ab56622f3d84efc12d7bd3f78aa93d35b4f1e160b46ddf614298abd1cabc9fc61bef14e26c67af4052
-
Filesize
2KB
MD5afbec8cf0f20119f7f4d2b1ed61539e9
SHA173cae0d81d1bfed1673c8fd5f7379e3523544267
SHA256df7065487e58eace1e96d9ba868b9e6228e8ca0a893b79f42f90b80ef6fe5114
SHA51275cef3b6b78c14482ca60324be14ec1b95800af4d77788b8db7cae274462126c50ff896c65126fa5da3bda21218de852f9882745bbe1a2206d853b9fccb7cd60
-
Filesize
2KB
MD5ba92e68e222d71b1f7dbc95cb8cbe7d2
SHA1f65fb7c2b2cdf1464d2d75a6f1e7063d80be6b74
SHA25694b7f8429f39d23780cfdd4b2b46502f3f4b0bed908045d885f44fdef9e09da3
SHA512b673cc02cc955fe00f7ee3ed2dc4c5b8ff0d0629f6732471bb1f3bf82a5ca26bedbfac181a1271a243e9824ea8cf28ad51818d32f159f538923fff218c3efe27
-
Filesize
2KB
MD5d50f2b30614fba2730c7b716d717c426
SHA1d9c539cccb29afd49845446f0abf291299becd91
SHA256ded43dd6660ed945ce4490c0985e2b6b261649fe83d5dda0dde3c120f68ddc72
SHA51239227d46885081271a097d398eb020f9004d3369b33e634d2333fe260f97252061018500e00f39a932c0c87b160374a218ece161fcb7334bb4362263eb32a65e
-
Filesize
2KB
MD5d51391bd145cdd4046bf2a413ac91d04
SHA1597e9aac552026f818b8b83c266b71c7b34fc818
SHA25659db6616267a4497c41e9338ef9f227ba990dcf264c2dd5840843c9b47d6c5a0
SHA512baf59ed14b2cdab8afe76ee3c20a233045e2d9ea1613648d0c0cda1e859fa478f6a344eae3c3cf852972a63ca3563c7d7c1cf6087ed4952eed6f69b0cc8cb062
-
Filesize
94KB
MD5afab0674f49b13307a56d07327ef03c6
SHA1757489b971660708c4bb1447a6130467ed9e2ab1
SHA25653f8b1ce31eedd2bee69ce1b638cdd6e6b4fec09b7642c2b5a41ebadaaf5c191
SHA512677501a993afd883a441ba70089dc8b5de55c7258d217443e0ed6427012ff34e8c9a5c818fa05f93dd50a1f196c84aedf096e5fd367b0cfb68fbd505781e846b
-
Filesize
113KB
MD5793380b335e348c41b7c2837ee1d4b16
SHA1019d6f2fe6e582edf34cda3f38449bd70474a1b9
SHA25616ea035b6f49a4c58e392d447a371d443f78d74cf752e765065846eb5e5c29dc
SHA512c1e2a79b8d6e1f408aa7c94cbcb14a5748a0c4c79b4dc2792850fb65426da67fd2fd6f891db5f9e122b3d4c9276284f9bef77683cee4fb0fab93a99df4cc60af
-
Filesize
2KB
MD5d85030352a1cac7efce37734cde5872f
SHA1a3d9dcc4ba1c49cc184725b24b4059dd6751d400
SHA256db3007839e3b65fe1daf07a4cb3ee386699b01b6c62a52ed92878bb69e76eaf3
SHA5122a2310449780e0b483c37fae9d01332c773ac436a3a5b514bdd39575005fa0bfb55e00329d18ba2281ff77cf82fa71c0b9b5cd126bb696f7cecbf2cdd51dbecb
-
Filesize
4.3MB
MD511b4e2656ee53749e957b6afe955ad20
SHA14ca93e7e038a5c9e1fb387432048b08f3f252f7f
SHA25638223bc55472838e8df49c0a3620254dc871959280e7fdde41055304e7c44296
SHA51256212d7affc21a4d881b36169dfb0cdc5fda315f3abf49135846c11359bb9f2b31f163fc0dbd51e1f13d3b57ad07e2366e5592cccc736894fe13f619be2ba9ad
-
Filesize
2.4MB
MD593c5d793ced80f20b7bbb781a94798fd
SHA17735e255035f7ab95606cbbc559681980fb72ef4
SHA256e00e1c1f44402ffba8532335ecc95b08015f0eb4e3a688b5257f6329b241fc92
SHA512407bbd86c1042fd57e635cfb2c77d367178c64ff722f6a61c4a5c8b101ccde761944a661d07343686db0b6898c6434a16a30c8cb39734571362def956003780e
-
Filesize
756KB
MD59f0e53fc2f0be427c892a6ee9790a1af
SHA1dc83540fab9f595a93ebb5a7f6e1b123b4698ced
SHA2565238f8d8d318d33c5ce52bb45a91be24f393560783c02e1401eccb4d95022e60
SHA512b4f2602c2c1b576b33f8cb4ce44f4ba164dfd8f7ab583a560f0c4e55bce6052b94e8f8bac33d89b4bb986962f12957cd717c28ae31e7f4d802afbb4888d9527e
-
Filesize
4.0MB
MD54fd0f7ec0fa0044f62d9f2c28cc5f29b
SHA16a7532c614c560d11c1eed849e358c1210391137
SHA2569a7a50e6c82e4b1e34c672361eac7b3d4097132597b0f534604000238a1937eb
SHA512ef2eba77a10a935b246aeb49610b6ebf75de63f9724db0c8a24b99088efacdf6e6ab1f242939ed54b831bd2b92178e115479655b538eeef5aeb8ba554b3757ed
-
Filesize
179KB
MD53421d1ba17a27af922c65c63e5dc3663
SHA109b9c3a981f5edbbc9f2a80753e706904b5791f6
SHA256c58674a895f8e5a2541b4823774b869f26ae9446f3dd282dea94712a0a1142cf
SHA51216df400d4c713f26992bb06565b714347032d732112d0609488307d9def39cdeda55b63e0e059bfba975271325a58b9884a409e907f7f0a6656ed5a611499edc
-
Filesize
1KB
MD5f6be7ad15f9f5dc052afa7b6c633acaf
SHA1e293eaee4c56984b99e433436900ffa60aa49cdb
SHA2562dc1f8370c442c1bced1756c8e209d16632652a31bc292c57e49856b29fde3f5
SHA5123fed35c5b3a2f624b2cff9f338f200011ea1a6c836d9878cafc8378533080c953dd5e2065775cff1e342d440cc24166b06423d8ab71687a59056b3e45b18503a
-
Filesize
1KB
MD5ae8e00d3b0bb02d4a3e5c0ed329567ff
SHA10e339c7981047cb65817cbbdd227e632ddf24630
SHA256eb550c8cfd98ba30d6468d452aad1e83734f2083bb03a21827c6cd481c49157d
SHA5129039cfeb50942b33f61232d8bce45d660cf8821b5e9a9bf1a8ef16e5b4f7302cbebe748221d7218501019d72ba6d7f557a2d48f05484d314816b9377ba476947
-
Filesize
123KB
MD5f5a72df864d4fa6aaa5efc06d152163d
SHA18b346ad30c015053428ee0d86eabf11c2986b1e9
SHA2563f3a80d236142e356df06ad7fa7ce25525f23a86b0fe52b89d676ae81eca3e62
SHA512f1efd78cc4347c261a2c725f9055782ab5bf2d5a44c19340532b78d1ee1d4aa705a9e04782f70bf0ba34a8d8a0deae4f27f7794a52fbe313e128dc8cd25d81e5
-
Filesize
334B
MD5d36fe6147829a72b42e054a5db27d270
SHA180779a8eb37d8bb1d5fcc594576f80dbd61fac98
SHA2568e1016c2d749cfd1eb2eb870b90c2b662f0bf7e14f8c14a7be140aa649d33af3
SHA51294224816f757241b3a6d19788225378ae070fc62b4620e11e10a033e3be5d9cc858cd9e669cc275b1fa82e57094d0df13a6d9868cf00afaa17cf2ec0193acd74
-
Filesize
1KB
MD51d7d8c4d71b012ffb32fe1ae880e4efe
SHA1d1f16e06067188d105614ce2fe68cb529d653fa3
SHA2567fdf6a9de31374a9f0bbbc65c1a9ca3f0d199906c84df9fdfb734380421213a5
SHA512d8aa99b9b08d19d753e5b96b05d3d09218244476e2796ed838d578b49b337eded6b8b915b1ab092753d7aec7acc4ceae28cecf888a3946ea8fed171b51386607
-
Filesize
376KB
MD53de494f84d9d8ff33433dec3348b0cd5
SHA18ee2bd6a37ffa3cfa550f5493f7b1f3c71033249
SHA256c6f14df8b988d8bb8d32187a0218328ae57176ecc1a4ebe46721e667ee760c27
SHA5128d3f65230a2f19a8abde264a48cff0d8e7e062d9b4d7e10498bb786030b2b4a673ba56db3580f5bd972a01e03aaf24531bd5b28da7136ec74d9f04d661b4dabf
-
Filesize
1KB
MD5459929702921615016565703b6400475
SHA15ebee332c013ae5b00ea1c5e358f1d44e8b777b7
SHA25609f30a01e612d774b73a2c0995ae3a45f03e3c490d8e33b52fac01864bff96ac
SHA51296ec2f1a87c074fbcf810352920973d58d2ccedfc3361d8dfd5467733143ed1deece229b1ecdbd75f9d100f8bf1e585173d4510bbe479e140e82cfd4ed38384b
-
Filesize
1KB
MD5562d15acb76e733b43903e05151b6de2
SHA1d39c0a12db69ad52d7bf252cfe9e4d4f91cc8593
SHA256769d317d0eabf51f5535e15bd77216157e40a2833a32f29634a7f4addf73e017
SHA51254b3622ced4836c6738da2d684b5f89aabe4517f9dd3c8bdf0bd80a676c8bd0be8794d796237bd0347cdc5a022e9c531e8f648b2b43b6ef38fcd98111e33c184
-
Filesize
98KB
MD506de37e494422eace2a31e917eb90cad
SHA1f4fa57573edbf7332468161b8d55c305b6769795
SHA2568b921520d61d8e291520544a3387bcca162200a9764c0da9425a2a48410c1176
SHA512e25b366060d450dbbbd71459d58e279f68909f2ecfa5e675cd462a53d8486682ec25704f394b45070e25fe5098a5d2844a442fba41d2aecf62cca586c45f8336
-
Filesize
1.0MB
MD508ae623d202400b3e23a920cc475c4b9
SHA176aac4f12f64e065f123b238563c4d9954febe93
SHA2563c6ad971154e6d5d6a0fcb2893cdb0db3237a66570924606d16000147f114c8c
SHA512bbed98118a0044348b91908eeafa4bd36f5db0a981f9b731b37bbd82d3c3f7596f51bfa8cbee2a02f2ce2621e2de9b3427a969b0be9c254e0902ac1056c7c993
-
Filesize
71KB
MD5ee98891d7937cf20829ba13142754030
SHA176594d12f7d4583e7ee058d1b116a94ba8473d8f
SHA256c2ca4f97aecc6546b4f1fe32935c72beb5185c6a3105f6014f298c4e01553445
SHA5120ba4571cae390be9e47ddc725cd48e34427dc8b726ef53f53fa689a3a3a17cd3c8e52c0ecd33749ff1dbc3145248d599be8cadd841122dcba6e8861ec5281048
-
Filesize
820KB
MD587c5a068279d935dc0b52837a71fc05a
SHA1ddf62af8b9addd6a855cf8663ba382532377da3a
SHA256ecff373cad8405b8d694df799da817d960d74d871f5d17d779408821bab1f5cb
SHA512cfd5623684e8858854e48bf853254aecc06a4a2a3035eeb2235791d60c4923928c8ee7e6425237e86ee571f30f0789c6e78f50c223d6923912591c4a2e53bd6b
-
Filesize
1.0MB
MD5b7722163c3012288641f00e859bd268b
SHA109d93e49b8e6b82c34d69171efd58c3bcd39510c
SHA256776e8a6a905b4d17b4507522e3308fd2f3a8b56c61c235080f6593d2b23b4600
SHA512e84c07b3ba8153990b9c1240872dd0841086379ad54503707e263bc5c5d3881d656b54dd73ceee3ec27cb9c93677a3dea231319f7097cbba37867773fe1d205b
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
706B
MD578d2695ecbddb41a9a347db5d60f5f08
SHA1a7f4dd46e3ed75e87a2f387167ae3d2d19acb3fd
SHA256e9f742adf53a9899c616fbfa31da60f49cebcb8195e2684329b5a12fe16ef28d
SHA512ab00ca7e97d030bb607b08184ea0a2f1b61c1506c2781dd13492c4aa7402744a2ac720d155a368270e2418de4a8838c2767cfc0e10b4a0d02d2a2ebfda628464
-
Filesize
687B
MD5b2ef54cb6d16b9a064c679aaf474ce43
SHA1f7d83a4870da5ae51c417a4e31f8eba5644007df
SHA2565a21b35be071da66f32b2d71d40759c05fe604681d77714bae0f261855fe04fc
SHA5120844b20eccb4b48720c9cb3035b23e6b4b2d9bcd9bf3120111c6824e4a0cb25daaf09538c6af3549676b435f5c79aa068571d076313583c5b6ecbc81b8a7507b
-
Filesize
687B
MD5dc3e7dd31e1bf66de5f91758cc9d1d43
SHA150a0ff53287361bc9c58e0110d009ecd805f4134
SHA256dc4cb1d7ea63f4536361a9f487a252c57ae79b8138d55b866eee0c248f1933eb
SHA512daa788aaa6fbed5f64394bc2f63d7e6dd45da722c440c8d11246c072036a17d0719af70d3cd9e93eb8c310f0585c3a9ad3b405c2ce5dcc809f721aef779cc4f7
-
Filesize
408B
MD522ee5c40e5431a43a7314b55a9fa76be
SHA1fc5f826ddf5bc8243fb97004a81ac3f9a1c792c9
SHA25657264d93b5c3f3574558fef50cfc2655396c7e43465e266c1a2d78d376b996b6
SHA5124f0083bb3a785a1fd83e1b223161e2b13caabbfa19c56fc25d221144a25accb6c523137a7a6dfcfca90692ca6ef107d24a22eab4068de8630c637329ab4df6bc