Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/02/2025, 09:07
Behavioral task
behavioral1
Sample
JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe
-
Size
2.4MB
-
MD5
86d01168bb4bfd6841116fde1b3a9ffe
-
SHA1
8e3dcca917b111b8149e0b35ef8f9f088f0ea076
-
SHA256
eaff591a670d3fbad23e8edfbffc656728af2194a09387fbd2437bf3b17339e3
-
SHA512
5865970704f6f82794c52d19ddc3a07048b5a1e6500a435ac1afe46da8e41d9ed7355a259cdad71a16c8ce58d6abb3e5429c2dfdd5dc60d80cc63c14525ad8bd
-
SSDEEP
49152:jq3412OCXmO1mNlV0McFF10bqLDOCzt63XME5tjP3:cWbcFewPzt63XV
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\spoclsv.exe JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe File created C:\Windows\SysWOW64\drivers\spoclsv.exe JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe -
Deletes itself 1 IoCs
pid Process 2356 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2636 spoclsv.exe -
Loads dropped DLL 64 IoCs
pid Process 2228 JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe 2228 JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\svcshare = "C:\\Windows\\system32\\drivers\\spoclsv.exe" spoclsv.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: spoclsv.exe File opened (read-only) \??\T: spoclsv.exe File opened (read-only) \??\O: spoclsv.exe File opened (read-only) \??\G: spoclsv.exe File opened (read-only) \??\H: spoclsv.exe File opened (read-only) \??\I: spoclsv.exe File opened (read-only) \??\K: spoclsv.exe File opened (read-only) \??\L: spoclsv.exe File opened (read-only) \??\M: spoclsv.exe File opened (read-only) \??\V: spoclsv.exe File opened (read-only) \??\A: spoclsv.exe File opened (read-only) \??\Y: spoclsv.exe File opened (read-only) \??\X: spoclsv.exe File opened (read-only) \??\J: spoclsv.exe File opened (read-only) \??\P: spoclsv.exe File opened (read-only) \??\Q: spoclsv.exe File opened (read-only) \??\Z: spoclsv.exe File opened (read-only) \??\B: spoclsv.exe File opened (read-only) \??\N: spoclsv.exe File opened (read-only) \??\S: spoclsv.exe File opened (read-only) \??\U: spoclsv.exe File opened (read-only) \??\W: spoclsv.exe File opened (read-only) \??\E: spoclsv.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jre7\Welcome.html spoclsv.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\Desktop_.ini spoclsv.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\Desktop_.ini spoclsv.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jre7\bin\server\Desktop_.ini spoclsv.exe File created C:\Program Files\Java\jre7\lib\deploy\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jre7\lib\security\Desktop_.ini spoclsv.exe File created C:\Program Files\Microsoft Games\FreeCell\de-DE\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\de-DE\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\Desktop_.ini spoclsv.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Microsoft Games\Chess\it-IT\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Microsoft Games\Chess\ja-JP\Desktop_.ini spoclsv.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\Desktop_.ini spoclsv.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\Desktop_.ini spoclsv.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\Desktop_.ini spoclsv.exe File created C:\Program Files\Microsoft Games\Mahjong\it-IT\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\Desktop_.ini spoclsv.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\epl-v10.html spoclsv.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe spoclsv.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe spoclsv.exe File created C:\Program Files\Microsoft Games\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\7-Zip\7zG.exe spoclsv.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\Desktop_.ini spoclsv.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\Desktop_.ini spoclsv.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Desktop_.ini spoclsv.exe File created C:\Program Files\Microsoft Games\More Games\ja-JP\Desktop_.ini spoclsv.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\about.html spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\license.html spoclsv.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\license.html spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Desktop_.ini spoclsv.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\Desktop_.ini spoclsv.exe File created C:\Program Files\Microsoft Games\Chess\en-US\Desktop_.ini spoclsv.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe spoclsv.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Desktop_.ini spoclsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\about.html spoclsv.exe File created C:\Program Files\DVD Maker\DVDMaker.exe spoclsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoclsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2228 JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe 2636 spoclsv.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe Token: SeDebugPrivilege 2636 spoclsv.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2356 2228 JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe 28 PID 2228 wrote to memory of 2356 2228 JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe 28 PID 2228 wrote to memory of 2356 2228 JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe 28 PID 2228 wrote to memory of 2356 2228 JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe 28 PID 2228 wrote to memory of 2636 2228 JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe 30 PID 2228 wrote to memory of 2636 2228 JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe 30 PID 2228 wrote to memory of 2636 2228 JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe 30 PID 2228 wrote to memory of 2636 2228 JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe 30 PID 2636 wrote to memory of 2840 2636 spoclsv.exe 31 PID 2636 wrote to memory of 2840 2636 spoclsv.exe 31 PID 2636 wrote to memory of 2840 2636 spoclsv.exe 31 PID 2636 wrote to memory of 2840 2636 spoclsv.exe 31 PID 2636 wrote to memory of 2856 2636 spoclsv.exe 32 PID 2636 wrote to memory of 2856 2636 spoclsv.exe 32 PID 2636 wrote to memory of 2856 2636 spoclsv.exe 32 PID 2636 wrote to memory of 2856 2636 spoclsv.exe 32 PID 2636 wrote to memory of 2872 2636 spoclsv.exe 33 PID 2636 wrote to memory of 2872 2636 spoclsv.exe 33 PID 2636 wrote to memory of 2872 2636 spoclsv.exe 33 PID 2636 wrote to memory of 2872 2636 spoclsv.exe 33 PID 2840 wrote to memory of 1980 2840 cmd.exe 36 PID 2840 wrote to memory of 1980 2840 cmd.exe 36 PID 2840 wrote to memory of 1980 2840 cmd.exe 36 PID 2840 wrote to memory of 1980 2840 cmd.exe 36 PID 1980 wrote to memory of 1740 1980 net.exe 38 PID 1980 wrote to memory of 1740 1980 net.exe 38 PID 1980 wrote to memory of 1740 1980 net.exe 38 PID 1980 wrote to memory of 1740 1980 net.exe 38 PID 2856 wrote to memory of 804 2856 cmd.exe 39 PID 2856 wrote to memory of 804 2856 cmd.exe 39 PID 2856 wrote to memory of 804 2856 cmd.exe 39 PID 2856 wrote to memory of 804 2856 cmd.exe 39 PID 804 wrote to memory of 1976 804 net.exe 40 PID 804 wrote to memory of 1976 804 net.exe 40 PID 804 wrote to memory of 1976 804 net.exe 40 PID 804 wrote to memory of 1976 804 net.exe 40 PID 2872 wrote to memory of 1968 2872 cmd.exe 41 PID 2872 wrote to memory of 1968 2872 cmd.exe 41 PID 2872 wrote to memory of 1968 2872 cmd.exe 41 PID 2872 wrote to memory of 1968 2872 cmd.exe 41 PID 1968 wrote to memory of 1972 1968 net.exe 42 PID 1968 wrote to memory of 1972 1968 net.exe 42 PID 1968 wrote to memory of 1972 1968 net.exe 42 PID 1968 wrote to memory of 1972 1968 net.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_86d01168bb4bfd6841116fde1b3a9ffe.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\50$$.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Windows\SysWOW64\drivers\spoclsv.exeC:\Windows\system32\drivers\spoclsv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net share F$ /del /y3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\net.exenet share F$ /del /y4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share F$ /del /y5⤵
- System Location Discovery: System Language Discovery
PID:1740
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net share C$ /del /y3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\net.exenet share C$ /del /y4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share C$ /del /y5⤵
- System Location Discovery: System Language Discovery
PID:1976
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net share admin$ /del /y3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\net.exenet share admin$ /del /y4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share admin$ /del /y5⤵
- System Location Discovery: System Language Discovery
PID:1972
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD562441304d7221c43e4cdb40cdf383222
SHA18f171779e2defe74594a0e97344fbd0522fd6022
SHA256af63f90893aff39123c6bfc560598c1e741dff3078c1665c0d7d613f2e22ae87
SHA5125262051930695e5b98a69e132ed1f47e24938cc6f844b3c61e4fd9a25829fc177ff621d96a54e48a4aa14719fa3edf91a3f22db64e72d13f78a7b84c7d211d01
-
Filesize
1.4MB
MD55481b679517fa2f1423776f7345c6f3e
SHA1fa559e515fefc8558095da359c2f7e18b947b448
SHA2567c0edb3c71ab0b93ca75fb7c1276e446a8468e4da59c27d7abe1d64a3f518123
SHA5126f828f68637a08ef15abfadeb93b071c5d2d35fd7d41ed04d3dfdd449758b9fcbbc2bb1aec03c0863885b9a0778571eaa1dc035791441b8a9a6cfca2a643f7d2
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html
Filesize12KB
MD5bc1cdf28aab4e51864c415b88233e195
SHA16d69915561bbb4f97ede19ce3b6453679e0f82d2
SHA2569209ef129e25b5d27a3717c1e5e6f091042a8748a327bbacaa593b6309fe7cb8
SHA51204a1261201408cf485cc408c4f4f0a71c9d49b4c79d4de002595f021afd151693ec75540c7d249dc239b3a244ee89c3611a1947fed9a726854ac50d2ea49838f
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html
Filesize8KB
MD5566eb8b8194ef430396f8c663bec10b0
SHA1a7d8c67b939b70051e10771b16ce784722edcf1a
SHA25634c45b77f3b0629db3bf0089c0b1314d3bcaad52f7c368a29af2042abe3b4ff5
SHA5122f639d7a8f5da2c8d4ad2a363ebf9bcbeef208dd88201d8998b94724c508c727e76bb381a98eb6ebef2d8040257a64929d14a05de40dde91aa72e20899e9a44c
-
Filesize
766B
MD50207754eaad4b4db20ee129ee68c5c88
SHA1c9b6cc0173ce497e3c6cee5862a8ba10cd6a26c6
SHA2567bc50bb4b4fbf19acc227fb8d21d650c2ec7ea2206a8fee24c5072da322e2bd1
SHA512f96485047970cdcff7d816c2e92a9465afc52510af728de13ed9933703fbbe9da95c0030459384c058be2693a1a2502ee055aa9b5eb977c3402f4e1638437249
-
Filesize
569B
MD50f731d4b27024bc9860eac57bd0467c2
SHA18de3e2bf04fc93d78b755ed4de0245f4054229f9
SHA2564c68e844a1573bc791e07b8e565820938919d2bad1a8804237dbc0086cc41849
SHA512fe00b9c69b3ea977c1c6f2058be6348586d05d74e2a751d13c3ef56fdc49133fcff24a622e615539768a60db9c7a7be29d5ccd84e8f3f3a007bd8e8dfd2c2bc4
-
Filesize
145KB
MD59d10f99a6712e28f8acd5641e3a7ea6b
SHA1835e982347db919a681ba12f3891f62152e50f0d
SHA25670964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc
SHA5122141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5
-
Filesize
818KB
MD5a41e524f8d45f0074fd07805ff0c9b12
SHA1948deacf95a60c3fdf17e0e4db1931a6f3fc5d38
SHA256082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7
SHA51291bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f
-
Filesize
507KB
MD5c87e561258f2f8650cef999bf643a731
SHA12c64b901284908e8ed59cf9c912f17d45b05e0af
SHA256a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b
SHA512dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c
-
Filesize
544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
930KB
MD530ac0b832d75598fb3ec37b6f2a8c86a
SHA16f47dbfd6ff36df7ba581a4cef024da527dc3046
SHA2561ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74
SHA512505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057
-
Filesize
684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
14KB
MD5ad782ffac62e14e2269bf1379bccbaae
SHA19539773b550e902a35764574a2be2d05bc0d8afc
SHA2561c8a77db924ebeb952052334dc95add388700c02b073b07973cd8fe0a0a360b8
SHA512a1e9d6316ffc55f4751090961733e98c93b2a391666ff50b50e9dea39783746e501d14127e7ee9343926976d7e3cd224f13736530354d8466ea995dab35c8dc2
-
Filesize
4.3MB
MD52161730a7ae00a1fb8c5020a43be949f
SHA18db6b820472cdfa266c874e0d3a9395412995aa1
SHA25607e7896b2304e3b9966294a02d2ed32f41994ee7bd0a284e4160743edaeb9e15
SHA512aa3659b6184f4273b7fcf1f7d2cd0a5a9129b8856d15e4ca8904b709e85cd432538ce0510ca9777760a1a9d5391671232a79908860e7d665260a54910f6fea5a
-
Filesize
1.6MB
MD5527e039ba9add8a7fac3a6bc30a6d476
SHA1729a329265eda72cada039c1941e7c672addfc19
SHA2564b8a72fc81b733ed2e6e70d4c5401f954002783dbf14927849ad579860780b94
SHA5129e73e14e33a5f07a87e9c1fecfdaee09d1408471052aacfde3d1e877dad4d253b525ebefca6bddabc23cf81d8dcce0785aedcc2f135d171ecbb1feaeb922c449
-
Filesize
1.6MB
MD5ec6386b63c3a5ffe0577905e94262c3a
SHA18f8c428d0e7f32c9d733ca28384ded413a060588
SHA256302c968ab3e1227d54df4e72f39088d7483d25eeb3037f0b16bc39cef2728fa4
SHA512ddbefb759858493de1f9d7addc6ff4488c8be3164374e0a88c3cbe97751510005dfe6d91c5499fcbdc35aa33a8eda2d45591a66e54ab9462277dc833faef77c3
-
Filesize
1.2MB
MD581664a918656ecd5e8eca90cedba1150
SHA1580d0eb98bb2c838ff89eb54efd86535ee8882f6
SHA2562f664c756727c321a3a0fb6c6e68842ca1a5f20575a02312ea10675dbd5dc40e
SHA5127a211a01c674aaa5e8052dd339b412892c452309b651e835f0b8e27f15ee3fed42c58f43910a202150ca90704f522499deb7bca055451f1e6c8515b2d491df3d
-
Filesize
2.8MB
MD5095092f4e746810c5829038d48afd55a
SHA1246eb3d41194dddc826049bbafeb6fc522ec044a
SHA2562f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588
SHA5127f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400
-
Filesize
1020KB
MD5b65d7344b0a7faa207d2e1a7adaafb60
SHA1755ad15b1745b0e730d658d4a92e2b754425b7db
SHA256f4b91fbbcba8a46eefe4965e4a24c6ede3decbd1fec96e141a1953173efd1c92
SHA512f17ac73c2df7c73a31b11ce0f533d6db91bdb0cdeea653dcd52ac72c3cf28da0c236b79586ddc7a6c825fdd171290722f888465e776f12ac2cae75be82726b22
-
Filesize
15KB
MD5c9aaf1247944e0928d6a7eae35e8cdc4
SHA1af91d57336d495bb220d8f72dcf59f34f5998fd3
SHA25605b153ba07dc1a262fb1013d42bfc24d9000ce607f07d227593c975cdf0bb25b
SHA512bf3bc64135810948626105a8f76dc4439e68ee531f20d901c3082ae2155f2ea35f34d408de44b46ede61ded832fcc61ac1cb9719e432f0f07b49479c95847e51
-
Filesize
15KB
MD5407d2d7dab36cdea871d4c6b9c62b258
SHA186cd158ad810c6772c22a5799c7acf4b9d7c9f57
SHA2563c040679ea4be0cc5ca20c9f24caf6c13d3002560347e7446dc963b611523bd9
SHA512dcdb53a3ca2a3637216a9d8133d1dbda336a6d3a98c6b956af42f94adbc136dc5a0245e87512d0314f23dbf3cab4900bc40ac13c79ee93a677d93a89e0cd9e17
-
Filesize
15KB
MD51cb4c95888edfdedb61628680fffd415
SHA13336670c701c61bb8062d7620c4244dbc01756d1
SHA256182d8ab5ec2ee2ec57d60c2d2d75df6c852810e74c50289aa9c2c99a6b050fc6
SHA51224c8c05baef516fba5aa763c0abc603065a75e5816501c713b24ec8baddad4fc290b3973dad89ac65f09d0277c2fa72d8b00f0eb2871170dbd89a8d9062bacf3
-
Filesize
15KB
MD526b70aa2ab871a72a3fd30829f2f1f29
SHA173934bad6bf5ca22484a88e1a4b1263ae278c419
SHA2564e11bf944fb0a34c5cf1871fec3c8f7473e1944642cadf89a86db2eed874d35f
SHA51240cacfff6c7f47aa0703e8cb3186f8bacbff1d56dc0547d67c44e716fc0d28705995a439a88a02ce8a262628b33cf2f6ec6f0586cdc2fc86597e3da4fb6a1d84
-
Filesize
54KB
MD5502e87232756dfacda7d1686d4bc9ea4
SHA16e40897d0a957783b8b88f2a6487dba028954b22
SHA256d230ada81f3add58fd8a646d25b8f25fe6271b3eed5edef9fdc8945baabd5631
SHA51296366e76942f6da30c02e9f6cf7cdf0cb7550455c8cbaaae7358d15a2258e1f0b2bfa960d52cb774039f2070dc8c383c3df187805f4910d40601b853e4309d9b
-
Filesize
15KB
MD53eeb342d48cfaa4c568a93ffdfc847d0
SHA1ed5fd565c4a1867ca554314f038fc20c7de01b90
SHA25629e65344e34c2354da05e8de64b106aa0ec99d8c5c22b58797d0047e227879ff
SHA512db5b84233d40139c44cb8fd1a43e1c8a41c967358641e1488cc19474a8de381c5aa2c84f61b10d69d019f0d7170177cccea47ce9460d409a480c8537232a2ef0
-
Filesize
15KB
MD52f7770a34bb22b99f8f6966851331d82
SHA12a2860cde1482df656544e1983e957f815be4193
SHA256f873c02b69408f905c2c0b35b188d2c0b0a7cccc98a59d18dd0c297f761d2ef7
SHA5128611f8bace081711d6f5dcd41177f594314970c5b2f328755027383e4ad2a239bbd85e0cedf6d1a76d9d1f54afbd340c9bd4ab119bb87cfd5a11149a0cb71dfc
-
Filesize
15KB
MD5a5f4cccc602a42b4ddbd8acbcf34f158
SHA15f26277884b2f6cdac26267f9b582ac5a5d21b08
SHA2562d9044e9265fc09680d5f0c054c4ccac7d8d14b3a4a42e803a2097108e0f1acc
SHA5123cb0d0028468edb1687c6142ce3ed6b594428bd209bf8b85ab2315e7992af12c4d622f26e652d6be0718d51d0d6a171c0a881b36d2e67a199998442e91621149
-
Filesize
185KB
MD5641b4ed6ab90a6f52ee512ea88a64cd1
SHA128d014900accc98e6089d83d0b2a8cb8735ed101
SHA25613590945a04037dfd15d61166e0771682c7809674fca42f53fdb3afdcbe21410
SHA51200a588556196e305dbf1714e573a5c5516c2988356b984a7284ba017a78bacb8d576b590da35be40171d6dca73580c5b9ab06808c7246c2e13c8d9b816f2ca09
-
Filesize
15KB
MD5000b77a2ed92887856174641dfb6f485
SHA17872d9768f3a4b0601b91bd0b55f08c8992819e6
SHA2561100a8d298426491aeb34288f7d6e600622f2d94fc01bfeb093fcea3ac32a8e4
SHA512cec8642269bee8162b8d317ba61777b4005cb2dae8e9837bfd336bc6fd633066cd52b878160f4496113c147a7d0374619367e9bb451e82f7a5a39f0db3fde152
-
Filesize
15KB
MD5516f6320ae4d755b9ea0c7c8347f5801
SHA1bfce7c2869725ec8f327b083be57d20671fcb2a2
SHA2569e696aa5772e8cba27545b47b00be4a3b8fc888f8c83ca11939b753850feab14
SHA5120e12bc2f01f2897df41e56cee150177a3cc09ca5e889b61fcb9dbe07391a6f2537454401a2ca2ad93c652303a8e5782fd9860ca83734401393e314570175a6f0
-
Filesize
78KB
MD5cace8f27a66ffec4f9823aa258c307a9
SHA1dc515d29aa43d2b6b7e157f05e97e87d5f785884
SHA2563cf626dac6e91a03f688bf5ab674871a3e0411314f261bb2c69346a1c46bc733
SHA5124a5d5b564bd483e1949826d388e41c63a7b056236c5972c76721fd98c9b704a79622ed4c1b045080e4470340a9953595df955148999e15677f0e38e529a6a5f7
-
Filesize
15KB
MD58ffd9b7406e8aecf1d6117606d2bd149
SHA1edf1f0f2f1024cd0fb6b39dadca251c99ccdedcc
SHA256dd6b65e78cb194055494bbb7736ef917d3d6da1863567afe50b8abfc8e51267d
SHA512ee54a1bec20608477053e87c641cc59dfe3c5a77061395c9d41759c3c559d6d5e8761b75327f3a05e62c602031650ec0be375a1b2235a944048ab340efce7397
-
Filesize
15KB
MD595cf3bf094a35c9e7434bc402c09630c
SHA12b4d21ee55666f0664a644ec443502a942b9e7d4
SHA2564973b97a274648d53977499891b919f98684fdbebce10751d71ce4d2754f6622
SHA51209db399afec354ab699701f4196e93178db613421beda9e695bc36414698f83084d05b70595d2b31fe2a0d757ba98640f7e3953defb8dd71df03e4c01391fe8e
-
Filesize
185KB
MD50266d98252b6beee2e842d5e876031a8
SHA18d57c6d94835ac6b1b0f9a657af6baa4be25779d
SHA256c5d59069dcaf86222c9c189c8ba8932ced66ab77b4baad485e1f0ac715e6037c
SHA5127eebbff75a67a0408ff2f507d9f1b387dcfbe6765ccd4247fd78a64c2ea6090e88fd30f561e30f48bc107dd9378364fd18dba4ea22eedee76a1f993fbb1e9f32
-
Filesize
312KB
MD5bf91501c9b39c728ade2cf3788b647c8
SHA1fbcb53c4ca9836f5bbfbb2b63e7a1a00a6bf10c6
SHA256d602330327fd3630d625c9023131fd2318f677c67aa421631b8a4080dba38578
SHA51201a6639a580bd418cc4d1dd2bd8794f356c08b6f7fa801245e9200c883d32c6b103aeac2615195868a8e63e3515911de2a9afcced21f62fc41edefdd0a66001c
-
Filesize
15KB
MD536e8cb42bbfc16e1395a88d183caed83
SHA1ca1c513aaa7d49adfe0f43ceec81e6d0c0ae67d8
SHA25640ea55ebd7ef975135dafffb396871a8ab728abc24b42eaab76f08859994e996
SHA512f7620b06a5d43d21a0d492b66b0e5bacea6918f1490fb0504e9440524b7ef02ba83d2ae3c2211113b478b8325a3a6b6c8f65939ef5a01b835451cce2e72de00f
-
Filesize
16KB
MD5805f6272e5e3a80aac3540cc5b42b08e
SHA1437bee3476647f7b55a49630cb86ed4befc34293
SHA256910dbe44d17bd60a295a956e98e18347080cc879ed7ef7241cd2d0edfc060551
SHA512319f8f50dfca4adf148edf878fa7c83bc6e4f1053da0c7d412645fcae9c63e67b838c876838805d9a33b28067947d3844479c9ddab11eb9e760b9df285f27041
-
Filesize
15KB
MD50b5681808a793728fc658f1e9b94ec52
SHA105763b10f153447edcc08afeeeee71fa2f221033
SHA256d18fab0d0e24e8f1d9551e2667f6b2c34fcd75232c39e85ce50660588174079f
SHA51265e64980a30285b29888b9eeb66ec1c27c98a15effd67d761c3c62358e3ec008fbda61feda4fada8f9af8bce740b8f38236495c6f1b274d98c14209cd56b414c
-
Filesize
15KB
MD51dbd51882c2b82a5496106c31db425f1
SHA1f47bee48a7d0da0c4930cccc6fe7a8d8600d4b05
SHA256659fecc81e846405613c2080ac81a567df17c97449a9c2ba179ac216280223db
SHA51281418b0510b58f782b843312069842aeeede8d35feb8f393807169398464896f281dc13bc82d51279a07adfbe97758b82143218cf9a56d653b3a9d11da62f50f
-
Filesize
16KB
MD5f499825b88d200d9348b5f97ff297ec7
SHA1366adce5911c160fa26d6fdb4d65af357cf0e3bc
SHA2568b2d599efa66da695e503b480f355fc5f22347fcf5c294100abaeb3e9a20c1f6
SHA5123017bf630ba53ee0855d1e657df197732e4fe2fa6455fabad2085e5a24918589d487362fc2819fff85b3fcf7e684376d4b7a5bbc6e71ea57cc62ab397a87dba9
-
Filesize
16KB
MD530989429490b9ccbde4fae1fc6df84e4
SHA164c8cf20ebb4e8dc31521f0084eb046a9e3f0500
SHA256aa98634e3668beae535738d25c2094a7ef0d855ebd9d945b484368f9e543bc0d
SHA5129a78ed9cd8dcf333ea240ff309e24a2e5de39bbeba4e9291b55d51fdbc10ee672c674a9f4393b13819562a0d9bc99667eb03519cefed0218444874f15729eefe
-
Filesize
314KB
MD5c8db7998995218d59addc586ce9679d6
SHA1694f18eef5aa6dfe1aa607ad5a08980f9656ed07
SHA256e3712cd917e4d41696165a98233443d63dbfb28560967de92ca4e707c50d7df2
SHA512ba7bdfae350c4b98067a2875295a20fbee1b7e9cb1f1afde1a299ca1b8d6aab3996dec59119cd83214461018e5e4ff91894ad3f0e909359382cf5183811d3d12
-
Filesize
15KB
MD54ce9dbe70ae911f1fef704e2c5594214
SHA13431c1d6fa21e04e79f0b2f48cd30b037ab009cb
SHA256e45733934ff8c01f79a98ea2fd6b2a78fc5f0164e5d4fea7aef5119c7218a5fd
SHA512291420138d84108ebbb8f3dc81bc4595206144b8eac0a459ae63754aa137a3d6789330dc764c6dafb5cecc76908166d93cccaecbcb3987d4cbba662980ee6359
-
Filesize
15KB
MD5c77fa8599058f2f08f6f028ad1ba3d29
SHA1ea42e7eed011b8b71f32d4d47827a5b56198d134
SHA256db2beff59876773d223f4813c05c65a1e582604c420ae6d7f6f3844a0a060398
SHA512f2834be1925ca448884877e7236d2febb72190ebf43a2dab29a76b71c4976360d56df17879966ec74c60b3d62dadd81d577e3034961ed64418c0300f9710f43f
-
Filesize
15KB
MD5da1c77dc8b88afc927144ac6814ffecc
SHA1ff50b5fefd7275f3972f2e3f228384816fe22e63
SHA25678d50c2ca489676456b3a0ccd1696dda0f1e1e144baacd26cdbc472869578b30
SHA51202fbc972c889a71947b2671bcc7e22f9a0edce3e0462f332753d974d73035315aef7b4ae1069e309aa560f98065b792447b2ef8f1e8be1874969de916b2f3e25
-
Filesize
16KB
MD5095d24917473c666b8906e45852378f7
SHA12ca5842715ad03982eb9094786832775926e4b4d
SHA2563289a0fb8c701e7eae9fc792329c0eff6cd2a42ffbf1845f4e630a3e1a019529
SHA512fba9fe4ca6498c9fcf0d251906b537286f2e7bdb2399293c71f9b0bce379c2684da14212231535a81889928fcbe0adf7354bc83e272a3f6d9082f125494cc50c
-
Filesize
15KB
MD5f9ae41a829d457685c00b08ea9185e1d
SHA154eeb13931bfdd989decb7e807996b46b75f1cd6
SHA256d122b3df7c2b81c5eee0d3165a6741fffbc2298a8eb41740dbe0092eecf3cd47
SHA512fef83f2670a11536b57dc3a1d86d014b49b83c720976a5592bf6fef2ec45aeb62e269ce0759b150accfc77a94a28423c833b4ad0fbec6a7e0a4132a2b152a538
-
Filesize
15KB
MD5d33a2ad454c698dc6cc87ff9e484229d
SHA1cdf4c8db79f2530bdfec32a1909be5d129a23058
SHA256bf9aef8af2046c69ccc29ab1f9fa0f4b31cfcb1892158877c01e7b3a8c4eadb3
SHA512682e0b292f0f0cb1613c634a99df53d242ba465f1f754058d508ba8506654ebcb35f79e6e6714a288c2018ab9cdb929ef48a544071bc3ffbf3d362bf3478a818
-
Filesize
192KB
MD541c53a4c392717800ee2661796ce22fd
SHA120a31b7b7b39b5505d1ae7e4a901d8c0d3abc6cf
SHA25633d32fc067d35734819f69c028335e9e9d6d24beccae12b0256403c1c89665a6
SHA512d400dcfbf42c94201e467b984352297dcb323ff0543fe433cac9d6e7a6ae30706fe22fb17c2eb57b479d27efd8c006a3163aaddbf6152a1616316450d8d7839f
-
Filesize
15KB
MD55dfdb82c0f4f7aacd94291367a2cfdb5
SHA1f7fd979fd533117718e7e3521ecf3bd8b3f048eb
SHA25622cef66555cc851733c16103a666a7a6b64f31017fa2932c9148b1a289239281
SHA512806cadd84bdaaed41f1a4dab44c80f46f7709326ba47401057f644f8ac115be7f97323c7273f96f5cd45a838f247f626279c2a07bfac2098f0dfff797c81e69c
-
Filesize
15KB
MD55d3f9112c9eae4363a5d0b6a0df71486
SHA16ec9840609e7a9afc86465e0453701bdb13adb80
SHA256195a691a99a2be918bef7fd99958a0a8a8b1637dda4fb2572af03a1b3ebb2ace
SHA512f3a93980f8105e200dd2764ac30a94d33849755ba16f9671935f2f2a3260678fe6408069d985ad521507304b3dd6fc52f0232377895aabe231010e0401c5bcee
-
Filesize
15KB
MD5ee88ee0bf50a2075eafbaf84273d756a
SHA1e1091501d519c3ac8d81568e7f35cb6834a37e3b
SHA256ba48764ad58238c67f78535a1df897cf9eada40a13a6f33ccdf55ba355a8ec01
SHA51232de135a96fb43ed1b43f44a0f4ad880903d4203969a39a29432e4f42848816a9352a5dca007ad85a56769c74929406e62e8ed38b64a9b066c335700abed38de
-
Filesize
15KB
MD563bef325dd12e369057af89a6888109a
SHA19c45e44be16e685e4137412ff5c9673b83d60c58
SHA25618967fee8faa1a46f0e5403e2e8e44c58932e91337265712e2e7bcd478c6950b
SHA5125bf0c5b0bd2b5873f334f0b9835f03294b36bcdbe8de17720efd9a8b68a391634467077b625fde3683abba89902725be125805ae1dd54c7505a36d2c85580fbf
-
Filesize
15KB
MD5ec77c7625781b38685753eaf48e2b029
SHA12fc583b0557445e8c7ad2ba61011523d6e0bef79
SHA256a5337bddf438fa53517113e61caa27e0e8290cca9ea8c619e6eeed168abcf859
SHA51282a8a79a14dae4d41df5680e532fcb6ec83bf513fc9eda803343fb4eeda8bcbf3517cf6fdb048869689cace3d0c2f53a2532797e1ccbb9969ea67972d0dbe9aa
-
Filesize
16KB
MD58294c536263b2f48addddb85b9da4998
SHA15859bb36a6a47e1d1a6f61b1b5f0401b8182abb4
SHA2563da11e511ff441ed5629e5b3f157abd1d5cd031608b2ac516eec955acfc05dd8
SHA51290e33399ce89e540293403410b1f169c33675082e6363b79063753fa8230bb28afbdb0dac24ac7779ee38fc467efa2ab061eb050349bb47c9442577b4989e455
-
Filesize
15KB
MD5d36e50402809536c0532e22911133833
SHA13e127017671725adc24de136041f83cae2f97c8e
SHA25624fc8ae57ded1c57a5ccce10c87b45c4a125b0efcee1c0c02243128d87258c0c
SHA512d684e799eb2b7ce55e3e3a8752970c8dd50789fc04bddfcb788aa1cd076463aa4e1adab934c468c2dab6c761bd970810fbc2aa535881e4a7f944a74b9df3bc12
-
Filesize
15KB
MD5428e1e272f9e3b8915e999a8ace99a28
SHA180741be97448da187559cb87e698f16e587aea39
SHA2568b6e938ae3d1a7bd3605ddd92ba075e5e4048745433230e6d13799e7cb476240
SHA51217b964e6a7f957ae598f004c48affd13a7f6b27ecd69818a4dc02683bbafcebc6ea4919d7f0b97a76da56865ba85a0ae7406d0bbf9a9fd1b03076fd516e00aaf
-
Filesize
15KB
MD5ecfa924fce77755d29ed3e74c050945e
SHA1c997649bdfb2ccd5cbdd5fc207cf0b8ae6d34b6b
SHA256ab2d9c3a0953786576541ee1f837637981afcec3e7c21203ecf9c357827220e0
SHA5127147a269fa995582ad13b356481538329dfe7fef602d7f48ecff2fabac0201a7125844ef891e80e65acebbe5bd487fae5f12fb0376281a6e08d37306ec53075f
-
Filesize
15KB
MD576777d98af20f1dd10a156d87112905e
SHA1832a308d638a54fb5adb3a9e7ea26701086ebb4c
SHA2563e2c63d90828880ae71f1c5501acff6f1654468e17a3abecd9e78dfbcd20c55c
SHA51205f05f11b96d672f7f2379ccf2a689cc5e93886834a0566b4102ec23bc3ad3755104c99ff2b39d9bea8297d48f6220e80820c918a070f5f5f7fea1c4599b35fb
-
Filesize
15KB
MD596fb77dca3c528d80a58cc7cb671c3d9
SHA1adad0a93fdfff795b75e6a7aaa53d68b03268fc3
SHA256cf1002b4c27a50473e97fcc701c5c630f4e2dada4ec8d61344570e027e595a89
SHA51213a9d0bc8891f62c63c38f20d73553fc1e467bfe20e2c7b3c61801524a897ebfecf61061bd2f51b43342f0c74e0e47d99f819aa0180f3a0adb17c138439e26d9
-
Filesize
15KB
MD5c0f49849415739b810d50ef7e3b57252
SHA1ad65a3ec48d038880671323cee7b0727051526ab
SHA2568d832fc4548596889eb63c97fad83b4ceb53a0236fc8b7cf7417ae7b810b67b1
SHA512bba7f5c5c4bb19335b01b5f8d841a4adc449ce7048a21be79472d2e65bf16c92bbb0ca07a3742be992e60192b298fbff45ff3f5d0f0c5838a546c18c8ea47fa5
-
Filesize
15KB
MD51e8a8df00dba2db4fe8f89a9e3f061b9
SHA130064fd2569c681eeab743fa3208ffee66b14477
SHA256b161e1f1b234e75e3ce4d8ee90c3d6c798aa29fe48ee148c83f87032522b2fe2
SHA512ce658a52610c987d39754fd914fe68f19e742bf9d87812932c337ad5cac289151409013cd69bded611c20a924857a3432d562abcca02b5159f5dff354cead64d
-
Filesize
15KB
MD59a99b65c56eadbef1873acc7d820fef2
SHA120e8f4da81f3a231ab0b08ae8bea4ae0f5437b47
SHA256d126ca158a41d34dca7a04fef09c736e56bcefd9f09108c23527677f92a0cf64
SHA51242c46ec43f53d7a42b9854906d530ba9bcf5171040bf7095a8f0b8749c550abeaa332b3e0ed9c389f05421794caed2c1637209f0d7d6d7406fa311647f7807eb
-
Filesize
16KB
MD5e429735f60be8c2212d26bd43ad5d57c
SHA19e514bdb876f5ca628bf591d0f5f905fd00069a9
SHA2563b124e97c54c81719f7e7225b552248b8af6d9fac539c424305243396d338758
SHA512ba41666b544c274dbbb6b733a9db6639367609b571ab07757111858dc102b40ab2e2e86cf626a8e5de56a2f63dbe4ec0ff6d609908db27586a39010c6bf2b33e
-
Filesize
179KB
MD509b717903d36f943eb51525eeb9eb0bd
SHA120a8a03fbb6950aa53d161811e925af74f59ff8c
SHA25605d0abfdb367e528f06d0a932699c2a6a56abe8520103434c5240df4d61929bd
SHA512de81de8ed0b758d0b50c2c2280b019c170b8dd91fed62123db6e5bab0fae70f50ce31184e7c81c15b8df41c98185a25e7fa3fbf6ba5b89bbf1d490b9cf7c0838
-
Filesize
1.2MB
MD5dcb3084a82eea984d30ebf63efb417f0
SHA1c565548adaf0572b23653de0507b9be2bb671ed3
SHA256292dd2675fcf860854c176c3eaff2ee484ef13c9e6d6740ace6b1a82500634da
SHA512ce366dce715aacfc0280232bc0665594a4dbdd1e41cf75a912e05b9f56b4d7ab87bc5781962d87f6245d028dc6f9507b8c57c713c74019b8aa1ad537afc37b22