Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 12:18
Static task
static1
Behavioral task
behavioral1
Sample
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe
-
Size
512KB
-
MD5
052c5374e64f482cc2707fc2ecf4a678
-
SHA1
71e879e41f9817f2271e29296428807f911f8f72
-
SHA256
812d151c8495635d0171d6ea6c3a7b907a5c163290115baffe80a51672f0783f
-
SHA512
1e1103b9fe1ec12981f58f9ea82e02f89ce7e457306aebf7529ae2cad6ff5105fa6888a79af4f3d594298933c9e92899ddbc035a07894e421b4740b102cf5436
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6N:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5S
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
bpxcpnggfg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" bpxcpnggfg.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
bpxcpnggfg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bpxcpnggfg.exe -
Processes:
bpxcpnggfg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" bpxcpnggfg.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
bpxcpnggfg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bpxcpnggfg.exe -
Executes dropped EXE 5 IoCs
Processes:
bpxcpnggfg.exegrwegcenqsygmdh.exegarmgdaa.exeznbvbuaodbyrv.exegarmgdaa.exepid process 2548 bpxcpnggfg.exe 2588 grwegcenqsygmdh.exe 3040 garmgdaa.exe 2368 znbvbuaodbyrv.exe 2328 garmgdaa.exe -
Loads dropped DLL 5 IoCs
Processes:
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exebpxcpnggfg.exepid process 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2548 bpxcpnggfg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
bpxcpnggfg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" bpxcpnggfg.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
grwegcenqsygmdh.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "znbvbuaodbyrv.exe" grwegcenqsygmdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zdtexdim = "bpxcpnggfg.exe" grwegcenqsygmdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kioqzxtc = "grwegcenqsygmdh.exe" grwegcenqsygmdh.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
garmgdaa.exebpxcpnggfg.exegarmgdaa.exedescription ioc process File opened (read-only) \??\l: garmgdaa.exe File opened (read-only) \??\y: garmgdaa.exe File opened (read-only) \??\a: bpxcpnggfg.exe File opened (read-only) \??\g: bpxcpnggfg.exe File opened (read-only) \??\b: garmgdaa.exe File opened (read-only) \??\a: garmgdaa.exe File opened (read-only) \??\b: bpxcpnggfg.exe File opened (read-only) \??\k: bpxcpnggfg.exe File opened (read-only) \??\j: garmgdaa.exe File opened (read-only) \??\n: garmgdaa.exe File opened (read-only) \??\v: garmgdaa.exe File opened (read-only) \??\q: bpxcpnggfg.exe File opened (read-only) \??\h: bpxcpnggfg.exe File opened (read-only) \??\u: garmgdaa.exe File opened (read-only) \??\e: garmgdaa.exe File opened (read-only) \??\s: garmgdaa.exe File opened (read-only) \??\i: bpxcpnggfg.exe File opened (read-only) \??\w: bpxcpnggfg.exe File opened (read-only) \??\z: bpxcpnggfg.exe File opened (read-only) \??\h: garmgdaa.exe File opened (read-only) \??\w: garmgdaa.exe File opened (read-only) \??\m: garmgdaa.exe File opened (read-only) \??\i: garmgdaa.exe File opened (read-only) \??\h: garmgdaa.exe File opened (read-only) \??\i: garmgdaa.exe File opened (read-only) \??\k: garmgdaa.exe File opened (read-only) \??\n: garmgdaa.exe File opened (read-only) \??\r: garmgdaa.exe File opened (read-only) \??\x: bpxcpnggfg.exe File opened (read-only) \??\q: garmgdaa.exe File opened (read-only) \??\g: garmgdaa.exe File opened (read-only) \??\p: bpxcpnggfg.exe File opened (read-only) \??\s: bpxcpnggfg.exe File opened (read-only) \??\j: bpxcpnggfg.exe File opened (read-only) \??\u: garmgdaa.exe File opened (read-only) \??\p: garmgdaa.exe File opened (read-only) \??\r: garmgdaa.exe File opened (read-only) \??\s: garmgdaa.exe File opened (read-only) \??\v: garmgdaa.exe File opened (read-only) \??\o: garmgdaa.exe File opened (read-only) \??\m: garmgdaa.exe File opened (read-only) \??\u: bpxcpnggfg.exe File opened (read-only) \??\z: garmgdaa.exe File opened (read-only) \??\e: bpxcpnggfg.exe File opened (read-only) \??\l: bpxcpnggfg.exe File opened (read-only) \??\n: bpxcpnggfg.exe File opened (read-only) \??\o: bpxcpnggfg.exe File opened (read-only) \??\t: bpxcpnggfg.exe File opened (read-only) \??\v: bpxcpnggfg.exe File opened (read-only) \??\w: garmgdaa.exe File opened (read-only) \??\l: garmgdaa.exe File opened (read-only) \??\y: garmgdaa.exe File opened (read-only) \??\a: garmgdaa.exe File opened (read-only) \??\q: garmgdaa.exe File opened (read-only) \??\m: bpxcpnggfg.exe File opened (read-only) \??\k: garmgdaa.exe File opened (read-only) \??\t: garmgdaa.exe File opened (read-only) \??\x: garmgdaa.exe File opened (read-only) \??\j: garmgdaa.exe File opened (read-only) \??\p: garmgdaa.exe File opened (read-only) \??\t: garmgdaa.exe File opened (read-only) \??\x: garmgdaa.exe File opened (read-only) \??\y: bpxcpnggfg.exe File opened (read-only) \??\e: garmgdaa.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
bpxcpnggfg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" bpxcpnggfg.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2664-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\garmgdaa.exe autoit_exe \Windows\SysWOW64\bpxcpnggfg.exe autoit_exe C:\Windows\SysWOW64\grwegcenqsygmdh.exe autoit_exe C:\Windows\SysWOW64\znbvbuaodbyrv.exe autoit_exe C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe autoit_exe C:\Users\Admin\Documents\SetConnect.doc.exe autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exebpxcpnggfg.exedescription ioc process File created C:\Windows\SysWOW64\bpxcpnggfg.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bpxcpnggfg.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\grwegcenqsygmdh.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\znbvbuaodbyrv.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll bpxcpnggfg.exe File created C:\Windows\SysWOW64\grwegcenqsygmdh.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File created C:\Windows\SysWOW64\garmgdaa.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\garmgdaa.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File created C:\Windows\SysWOW64\znbvbuaodbyrv.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
Processes:
garmgdaa.exegarmgdaa.exedescription ioc process File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe garmgdaa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal garmgdaa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal garmgdaa.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe garmgdaa.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe garmgdaa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe garmgdaa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe garmgdaa.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe garmgdaa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal garmgdaa.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe garmgdaa.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe garmgdaa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe garmgdaa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe garmgdaa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal garmgdaa.exe -
Drops file in Windows directory 5 IoCs
Processes:
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEbpxcpnggfg.exe052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf bpxcpnggfg.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AC9F9CDFE6AF1E5830C3B42869E39E6B38E038C4261033EE1BA429D08A2" 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" bpxcpnggfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184BC67815EDDBC5B9CE7F95ECE534CA" 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 2456 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exebpxcpnggfg.exegarmgdaa.exegrwegcenqsygmdh.exeznbvbuaodbyrv.exegarmgdaa.exepid process 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2548 bpxcpnggfg.exe 2548 bpxcpnggfg.exe 2548 bpxcpnggfg.exe 2548 bpxcpnggfg.exe 2548 bpxcpnggfg.exe 3040 garmgdaa.exe 3040 garmgdaa.exe 3040 garmgdaa.exe 3040 garmgdaa.exe 2588 grwegcenqsygmdh.exe 2588 grwegcenqsygmdh.exe 2588 grwegcenqsygmdh.exe 2588 grwegcenqsygmdh.exe 2588 grwegcenqsygmdh.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2328 garmgdaa.exe 2328 garmgdaa.exe 2328 garmgdaa.exe 2328 garmgdaa.exe 2588 grwegcenqsygmdh.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2588 grwegcenqsygmdh.exe 2588 grwegcenqsygmdh.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2588 grwegcenqsygmdh.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2588 grwegcenqsygmdh.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2588 grwegcenqsygmdh.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2588 grwegcenqsygmdh.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2588 grwegcenqsygmdh.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2588 grwegcenqsygmdh.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2588 grwegcenqsygmdh.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2588 grwegcenqsygmdh.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2588 grwegcenqsygmdh.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exebpxcpnggfg.exegarmgdaa.exegrwegcenqsygmdh.exeznbvbuaodbyrv.exegarmgdaa.exepid process 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2548 bpxcpnggfg.exe 2548 bpxcpnggfg.exe 2548 bpxcpnggfg.exe 3040 garmgdaa.exe 3040 garmgdaa.exe 3040 garmgdaa.exe 2588 grwegcenqsygmdh.exe 2588 grwegcenqsygmdh.exe 2588 grwegcenqsygmdh.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2328 garmgdaa.exe 2328 garmgdaa.exe 2328 garmgdaa.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exebpxcpnggfg.exegarmgdaa.exegrwegcenqsygmdh.exeznbvbuaodbyrv.exegarmgdaa.exepid process 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2548 bpxcpnggfg.exe 2548 bpxcpnggfg.exe 2548 bpxcpnggfg.exe 3040 garmgdaa.exe 3040 garmgdaa.exe 3040 garmgdaa.exe 2588 grwegcenqsygmdh.exe 2588 grwegcenqsygmdh.exe 2588 grwegcenqsygmdh.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2368 znbvbuaodbyrv.exe 2328 garmgdaa.exe 2328 garmgdaa.exe 2328 garmgdaa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 2456 WINWORD.EXE 2456 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exebpxcpnggfg.exeWINWORD.EXEdescription pid process target process PID 2664 wrote to memory of 2548 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe bpxcpnggfg.exe PID 2664 wrote to memory of 2548 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe bpxcpnggfg.exe PID 2664 wrote to memory of 2548 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe bpxcpnggfg.exe PID 2664 wrote to memory of 2548 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe bpxcpnggfg.exe PID 2664 wrote to memory of 2588 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe grwegcenqsygmdh.exe PID 2664 wrote to memory of 2588 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe grwegcenqsygmdh.exe PID 2664 wrote to memory of 2588 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe grwegcenqsygmdh.exe PID 2664 wrote to memory of 2588 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe grwegcenqsygmdh.exe PID 2664 wrote to memory of 3040 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe garmgdaa.exe PID 2664 wrote to memory of 3040 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe garmgdaa.exe PID 2664 wrote to memory of 3040 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe garmgdaa.exe PID 2664 wrote to memory of 3040 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe garmgdaa.exe PID 2664 wrote to memory of 2368 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe znbvbuaodbyrv.exe PID 2664 wrote to memory of 2368 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe znbvbuaodbyrv.exe PID 2664 wrote to memory of 2368 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe znbvbuaodbyrv.exe PID 2664 wrote to memory of 2368 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe znbvbuaodbyrv.exe PID 2548 wrote to memory of 2328 2548 bpxcpnggfg.exe garmgdaa.exe PID 2548 wrote to memory of 2328 2548 bpxcpnggfg.exe garmgdaa.exe PID 2548 wrote to memory of 2328 2548 bpxcpnggfg.exe garmgdaa.exe PID 2548 wrote to memory of 2328 2548 bpxcpnggfg.exe garmgdaa.exe PID 2664 wrote to memory of 2456 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe WINWORD.EXE PID 2664 wrote to memory of 2456 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe WINWORD.EXE PID 2664 wrote to memory of 2456 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe WINWORD.EXE PID 2664 wrote to memory of 2456 2664 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe WINWORD.EXE PID 2456 wrote to memory of 788 2456 WINWORD.EXE splwow64.exe PID 2456 wrote to memory of 788 2456 WINWORD.EXE splwow64.exe PID 2456 wrote to memory of 788 2456 WINWORD.EXE splwow64.exe PID 2456 wrote to memory of 788 2456 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\bpxcpnggfg.exebpxcpnggfg.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\garmgdaa.exeC:\Windows\system32\garmgdaa.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2328 -
C:\Windows\SysWOW64\grwegcenqsygmdh.exegrwegcenqsygmdh.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2588 -
C:\Windows\SysWOW64\garmgdaa.exegarmgdaa.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3040 -
C:\Windows\SysWOW64\znbvbuaodbyrv.exeznbvbuaodbyrv.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2368 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:788
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5674e7a439bfff12d6ba99df539c22a33
SHA1a309ec676f5ed37e7958dfd9b65463124f40dc10
SHA256d00fdc5ebdd7aa5b3254ee1d5234b4541ea9277a709fbf12bc65ac7ffe68ccb5
SHA5129bc8b6d3ba8e6d290d2e93744f1fc3d9d1ec6982f43a1b0f865cafd8100b0bf7b16cf5e513fd378c354c283309218c9e78291fcc35dd28a5ca7d0b2800381905
-
Filesize
20KB
MD531f2c09c8dd0e0eec03088db55d1eecc
SHA1e30eab946ebf53c0d65e060010eb3db9f2176ae6
SHA256edf41069568644f104b671f5253fb1f993b9c42c4ab48930dee9236fe1c7ec26
SHA512ef0e2d8aad033f6961baf782d7392e14aabdf35a434bff86aedafcb90bcd281b0a06792070cf33471aba5a1ba6f44d191b446e2fbcb25eed53301975c45e69ac
-
Filesize
512KB
MD5133be2031271ada34d7f539ed2a5b489
SHA12edf6e61434876a25c70a9ea90b76cc0cf0739be
SHA25620a19c75b7b299bc62333c3d509d1ba95d4ccf2ab180e86870748c870b46e533
SHA51266edf8866a25fa3d837816effcafc25b7449da32d0baada6c39e4a097466dbc0340913a97a215c10f038ee23c6da31c51b455d62354ba4c59b682f43ad378d70
-
Filesize
512KB
MD534c7faabb0d20fa6767eaadb004dfe11
SHA175e67ea79af7d9a145093675d4b64192159e680f
SHA256cd407f536465036b5c7034521a4b65126d44960470b68150f502176700e48e19
SHA51299bcfb43a3181ec3a1e43a2940d5e51bd70b7b939680494ca2264855f8d4a2e95e9bdf9a6b77332205c750ccbb15c7ba0bb9a4583148c26072a48f3a200ccd6c
-
Filesize
512KB
MD54af2c087f2f60a65df393000483ecb93
SHA1245942318f75a527261651dbca716521b1f77467
SHA2568f6c530dc139fdbff26f2e10cfae71ff207d45f4e755f959db31bf6dae0ff29b
SHA512a45c60d6846cd4852c0bb1f56ee6e9f34ed564bd3c5af9cd596c996b04f214eff56cfb21a2a288fb6db4e0c1dfec9674323186a1696ab24469dadcd28d3bfb4e
-
Filesize
512KB
MD51492f3135f3465271c24b7c1d973f615
SHA12b64c7af3a17fcbe825628c90a28269506040e66
SHA25667d5c09d97287c46e918449ded4f7ca29ac9bd786a288a192c2aef61b0208732
SHA512859c60565a678fe0e783ed0dfcd355fc525a575972175f5d1b9e2f3a4792f0fc96272906a611a9372a0c2ee0952dc17d426b8a58556ef2d9be56fd70ef23ca4d
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5cfe2b05d2963a992dc192e32b0bd0ba4
SHA18e49be20809ac861c0a63b3cf43a18159612c9bc
SHA2560cb348f3dbd1e9668ca7a4078d65566789f79df05868c6fdbec7707165775a2c
SHA512ad4101cb28060e30d7d718b67def6e52fc06f60ead12aef71e0549ff201fd9bc21df95971cc71588530b4309936da35348b76e59b1301ce70d4d74082215dfd0