Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 19:47
Static task
static1
Behavioral task
behavioral1
Sample
05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe
-
Size
512KB
-
MD5
05f0258937d4d1a23c98d5dc52515bf1
-
SHA1
e39d7c6eb6e89f6b2505eeaf26afb4c5697fc22f
-
SHA256
bfe4c94cc551e3c6daaccee31f3803ea069e40c0e96fcaf944ed8b91b3d08503
-
SHA512
618907fda7d7a1fb72193a7b6f36b142593a4fe44292b220f9d19afc1f3ab57595549b6ff1c19eb82ed7815039322cba39184db5b935c664df12bdea541a1487
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj64:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5/
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
ligbocdkoc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ligbocdkoc.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
ligbocdkoc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ligbocdkoc.exe -
Processes:
ligbocdkoc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ligbocdkoc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ligbocdkoc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ligbocdkoc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ligbocdkoc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ligbocdkoc.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
ligbocdkoc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ligbocdkoc.exe -
Executes dropped EXE 5 IoCs
Processes:
ligbocdkoc.exekfwnafzcwkgybeq.exevespwjuy.exeonubnxeyiznfp.exevespwjuy.exepid process 2604 ligbocdkoc.exe 2748 kfwnafzcwkgybeq.exe 2488 vespwjuy.exe 2632 onubnxeyiznfp.exe 2556 vespwjuy.exe -
Loads dropped DLL 5 IoCs
Processes:
05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exeligbocdkoc.exepid process 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2604 ligbocdkoc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
ligbocdkoc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ligbocdkoc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ligbocdkoc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ligbocdkoc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ligbocdkoc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ligbocdkoc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ligbocdkoc.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
kfwnafzcwkgybeq.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\edumadgb = "ligbocdkoc.exe" kfwnafzcwkgybeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oxjdnjaz = "kfwnafzcwkgybeq.exe" kfwnafzcwkgybeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "onubnxeyiznfp.exe" kfwnafzcwkgybeq.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ligbocdkoc.exevespwjuy.exevespwjuy.exedescription ioc process File opened (read-only) \??\j: ligbocdkoc.exe File opened (read-only) \??\k: ligbocdkoc.exe File opened (read-only) \??\r: ligbocdkoc.exe File opened (read-only) \??\s: vespwjuy.exe File opened (read-only) \??\u: vespwjuy.exe File opened (read-only) \??\n: ligbocdkoc.exe File opened (read-only) \??\v: ligbocdkoc.exe File opened (read-only) \??\e: vespwjuy.exe File opened (read-only) \??\q: vespwjuy.exe File opened (read-only) \??\g: vespwjuy.exe File opened (read-only) \??\a: ligbocdkoc.exe File opened (read-only) \??\u: vespwjuy.exe File opened (read-only) \??\x: vespwjuy.exe File opened (read-only) \??\v: vespwjuy.exe File opened (read-only) \??\a: vespwjuy.exe File opened (read-only) \??\e: vespwjuy.exe File opened (read-only) \??\g: ligbocdkoc.exe File opened (read-only) \??\j: vespwjuy.exe File opened (read-only) \??\i: vespwjuy.exe File opened (read-only) \??\v: vespwjuy.exe File opened (read-only) \??\s: ligbocdkoc.exe File opened (read-only) \??\k: vespwjuy.exe File opened (read-only) \??\t: vespwjuy.exe File opened (read-only) \??\q: ligbocdkoc.exe File opened (read-only) \??\l: vespwjuy.exe File opened (read-only) \??\k: vespwjuy.exe File opened (read-only) \??\s: vespwjuy.exe File opened (read-only) \??\b: vespwjuy.exe File opened (read-only) \??\j: vespwjuy.exe File opened (read-only) \??\m: vespwjuy.exe File opened (read-only) \??\q: vespwjuy.exe File opened (read-only) \??\r: vespwjuy.exe File opened (read-only) \??\y: vespwjuy.exe File opened (read-only) \??\m: ligbocdkoc.exe File opened (read-only) \??\y: ligbocdkoc.exe File opened (read-only) \??\l: vespwjuy.exe File opened (read-only) \??\o: ligbocdkoc.exe File opened (read-only) \??\x: ligbocdkoc.exe File opened (read-only) \??\o: vespwjuy.exe File opened (read-only) \??\h: ligbocdkoc.exe File opened (read-only) \??\a: vespwjuy.exe File opened (read-only) \??\b: vespwjuy.exe File opened (read-only) \??\h: vespwjuy.exe File opened (read-only) \??\h: vespwjuy.exe File opened (read-only) \??\l: ligbocdkoc.exe File opened (read-only) \??\p: ligbocdkoc.exe File opened (read-only) \??\u: ligbocdkoc.exe File opened (read-only) \??\r: vespwjuy.exe File opened (read-only) \??\n: vespwjuy.exe File opened (read-only) \??\p: vespwjuy.exe File opened (read-only) \??\e: ligbocdkoc.exe File opened (read-only) \??\w: ligbocdkoc.exe File opened (read-only) \??\z: vespwjuy.exe File opened (read-only) \??\t: ligbocdkoc.exe File opened (read-only) \??\m: vespwjuy.exe File opened (read-only) \??\n: vespwjuy.exe File opened (read-only) \??\t: vespwjuy.exe File opened (read-only) \??\w: vespwjuy.exe File opened (read-only) \??\b: ligbocdkoc.exe File opened (read-only) \??\g: vespwjuy.exe File opened (read-only) \??\i: vespwjuy.exe File opened (read-only) \??\o: vespwjuy.exe File opened (read-only) \??\w: vespwjuy.exe File opened (read-only) \??\z: vespwjuy.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
ligbocdkoc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ligbocdkoc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ligbocdkoc.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2440-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\kfwnafzcwkgybeq.exe autoit_exe \Windows\SysWOW64\ligbocdkoc.exe autoit_exe \Windows\SysWOW64\vespwjuy.exe autoit_exe \Windows\SysWOW64\onubnxeyiznfp.exe autoit_exe C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe autoit_exe C:\Users\Admin\Music\MountWatch.doc.exe autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exeligbocdkoc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\onubnxeyiznfp.exe 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ligbocdkoc.exe File opened for modification C:\Windows\SysWOW64\ligbocdkoc.exe 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\kfwnafzcwkgybeq.exe 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe File created C:\Windows\SysWOW64\vespwjuy.exe 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vespwjuy.exe 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe File created C:\Windows\SysWOW64\onubnxeyiznfp.exe 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe File created C:\Windows\SysWOW64\ligbocdkoc.exe 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe File created C:\Windows\SysWOW64\kfwnafzcwkgybeq.exe 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
Processes:
vespwjuy.exevespwjuy.exedescription ioc process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vespwjuy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal vespwjuy.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vespwjuy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal vespwjuy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vespwjuy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal vespwjuy.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vespwjuy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vespwjuy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal vespwjuy.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vespwjuy.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vespwjuy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vespwjuy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vespwjuy.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vespwjuy.exe -
Drops file in Windows directory 5 IoCs
Processes:
WINWORD.EXE05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEligbocdkoc.exe05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ligbocdkoc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB6B12F449438E252C9BAA733E9D4CF" 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" ligbocdkoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg ligbocdkoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" ligbocdkoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ligbocdkoc.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 2432 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exeligbocdkoc.exevespwjuy.exekfwnafzcwkgybeq.exeonubnxeyiznfp.exevespwjuy.exepid process 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2604 ligbocdkoc.exe 2604 ligbocdkoc.exe 2604 ligbocdkoc.exe 2604 ligbocdkoc.exe 2604 ligbocdkoc.exe 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2488 vespwjuy.exe 2488 vespwjuy.exe 2488 vespwjuy.exe 2488 vespwjuy.exe 2748 kfwnafzcwkgybeq.exe 2748 kfwnafzcwkgybeq.exe 2748 kfwnafzcwkgybeq.exe 2748 kfwnafzcwkgybeq.exe 2748 kfwnafzcwkgybeq.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2556 vespwjuy.exe 2556 vespwjuy.exe 2556 vespwjuy.exe 2556 vespwjuy.exe 2748 kfwnafzcwkgybeq.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2748 kfwnafzcwkgybeq.exe 2748 kfwnafzcwkgybeq.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2748 kfwnafzcwkgybeq.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2748 kfwnafzcwkgybeq.exe 2748 kfwnafzcwkgybeq.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2748 kfwnafzcwkgybeq.exe 2748 kfwnafzcwkgybeq.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2748 kfwnafzcwkgybeq.exe 2748 kfwnafzcwkgybeq.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2748 kfwnafzcwkgybeq.exe 2748 kfwnafzcwkgybeq.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exeligbocdkoc.exevespwjuy.exekfwnafzcwkgybeq.exeonubnxeyiznfp.exevespwjuy.exepid process 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2604 ligbocdkoc.exe 2604 ligbocdkoc.exe 2604 ligbocdkoc.exe 2488 vespwjuy.exe 2488 vespwjuy.exe 2488 vespwjuy.exe 2748 kfwnafzcwkgybeq.exe 2748 kfwnafzcwkgybeq.exe 2748 kfwnafzcwkgybeq.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2556 vespwjuy.exe 2556 vespwjuy.exe 2556 vespwjuy.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exeligbocdkoc.exevespwjuy.exekfwnafzcwkgybeq.exeonubnxeyiznfp.exevespwjuy.exepid process 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe 2604 ligbocdkoc.exe 2604 ligbocdkoc.exe 2604 ligbocdkoc.exe 2488 vespwjuy.exe 2488 vespwjuy.exe 2488 vespwjuy.exe 2748 kfwnafzcwkgybeq.exe 2748 kfwnafzcwkgybeq.exe 2748 kfwnafzcwkgybeq.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2632 onubnxeyiznfp.exe 2556 vespwjuy.exe 2556 vespwjuy.exe 2556 vespwjuy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 2432 WINWORD.EXE 2432 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exeligbocdkoc.exeWINWORD.EXEdescription pid process target process PID 2440 wrote to memory of 2604 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe ligbocdkoc.exe PID 2440 wrote to memory of 2604 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe ligbocdkoc.exe PID 2440 wrote to memory of 2604 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe ligbocdkoc.exe PID 2440 wrote to memory of 2604 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe ligbocdkoc.exe PID 2440 wrote to memory of 2748 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe kfwnafzcwkgybeq.exe PID 2440 wrote to memory of 2748 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe kfwnafzcwkgybeq.exe PID 2440 wrote to memory of 2748 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe kfwnafzcwkgybeq.exe PID 2440 wrote to memory of 2748 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe kfwnafzcwkgybeq.exe PID 2440 wrote to memory of 2488 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe vespwjuy.exe PID 2440 wrote to memory of 2488 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe vespwjuy.exe PID 2440 wrote to memory of 2488 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe vespwjuy.exe PID 2440 wrote to memory of 2488 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe vespwjuy.exe PID 2440 wrote to memory of 2632 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe onubnxeyiznfp.exe PID 2440 wrote to memory of 2632 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe onubnxeyiznfp.exe PID 2440 wrote to memory of 2632 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe onubnxeyiznfp.exe PID 2440 wrote to memory of 2632 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe onubnxeyiznfp.exe PID 2604 wrote to memory of 2556 2604 ligbocdkoc.exe vespwjuy.exe PID 2604 wrote to memory of 2556 2604 ligbocdkoc.exe vespwjuy.exe PID 2604 wrote to memory of 2556 2604 ligbocdkoc.exe vespwjuy.exe PID 2604 wrote to memory of 2556 2604 ligbocdkoc.exe vespwjuy.exe PID 2440 wrote to memory of 2432 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe WINWORD.EXE PID 2440 wrote to memory of 2432 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe WINWORD.EXE PID 2440 wrote to memory of 2432 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe WINWORD.EXE PID 2440 wrote to memory of 2432 2440 05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe WINWORD.EXE PID 2432 wrote to memory of 272 2432 WINWORD.EXE splwow64.exe PID 2432 wrote to memory of 272 2432 WINWORD.EXE splwow64.exe PID 2432 wrote to memory of 272 2432 WINWORD.EXE splwow64.exe PID 2432 wrote to memory of 272 2432 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\05f0258937d4d1a23c98d5dc52515bf1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\ligbocdkoc.exeligbocdkoc.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\vespwjuy.exeC:\Windows\system32\vespwjuy.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2556
-
-
-
C:\Windows\SysWOW64\kfwnafzcwkgybeq.exekfwnafzcwkgybeq.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2748
-
-
C:\Windows\SysWOW64\vespwjuy.exevespwjuy.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2488
-
-
C:\Windows\SysWOW64\onubnxeyiznfp.exeonubnxeyiznfp.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2632
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:272
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD597db290bc0a1a666b7bef51414ade4c0
SHA19d9e687be2c2f1e8721635e0d1b7e57d4f07ac5a
SHA2564b55e2cbc2c1c040527b3e8eb50b6ae3090deb5260bf6b9b4abc815b785160df
SHA5126a2fa3a4690861f6fc7e0fa5a7a606f49d954ab34a9b3fe1275d8c137c961d5097da9a519267c32ce966f84aba7b82d9b7819f2ff928d1ca3c0e8f5d6af01357
-
Filesize
20KB
MD57cd3293b5e1bde7b6c4515ff2bd0a020
SHA170d620c89aac1334352e88de353e41e52806bdd0
SHA2563726b1290443a1420b0d9076c2ff23d92039f1673d673f037535eac549b40adc
SHA512a579eb1aaa0a9b755acfe469651745cb938bde456c0aba0446c2182d287e59b7d36a5fc7c797cba7aec0d69dfcdc616ac619ed1010aa81fedc786b39fa64d6d0
-
Filesize
512KB
MD5e2e8a1aed2c64f21f2e4d338b9ad3262
SHA13cdbb40be9cf80776e33b27d931d72e498f1de81
SHA256b42d6a74c13a0fa7233c5ba396c147b3195aca41f919564cfabcde528612f3b7
SHA512ecff4127a55f22aee7947f89029672a68333527505c3d19bd862ddaf3bda5eff6beb44bd059a30b97830e95bcefcbb508a43c3c8ffd5a55eaaadb290db120e02
-
Filesize
512KB
MD5e84311e0c5a506b8a92349ce29b4abfc
SHA1c5778a309d8434be56a61efa09d8605c09b8c6af
SHA256b67095f8409b7f8d74ceacdb04069acb5e57b3897c3299d08f7f6a0c94332e77
SHA51284b960a8095581fd49058a1a09b9dff8d87aa558527434d9634cad2f2ae2fe1b3983a846b9872fd4d4b77726daf169690fec159614f7582a4d75808c01781f5c
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD552cef060412d178e90469527d9273f7e
SHA13632686407b35c0eb8255a5d4c588aa50bd81e90
SHA256d256a6b0e99d97222f8cfb071c8fce66e1c1c6c13d2bded6e5a5158ff1ddc47c
SHA51208128ee1dd4cfa3ff5dd5279533294865be6534a8f81ad019faa6739b9ba29d6df699d54b9818930c04b5e274bb71043e2fe4f040488b325cdd306e3a755562e
-
Filesize
512KB
MD54124da9952a6a95785ea9447343d78fc
SHA17f387a463e04fa11305a5b7ca22c9860aea33613
SHA25601712bd0cf1385c18d5cba51f7f43518d4a34e620643c4d0822ee0a8698bcacc
SHA512a06fdba35b2deeb6ac9520ff8e2e9dfcd56c568585635734ab647fd8f890bf9bc4a037834272cdcb449a804161e5c78be7308b5f9f9d17b31d9fe667ce06a83e
-
Filesize
512KB
MD50bc2589fd21f5338ed6cf109b84f93e9
SHA1eef060a20a36e9ab25797fadf0ef762c590aca5b
SHA256f3c80de4d085ce0e0742c2a5319ba493b4f47ef68203c36f63252610bb8f730c
SHA51249e2b2ffad290251c574124de212b666a23fedfde7c26a2621030da5aa2408c9dbc36e89a4d832980cb4873a89c175d46b1f6f8ee6ee5e29e117e487ae61390f