Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe
-
Size
512KB
-
MD5
106fe205ca4aa54d81a5c56401dc49d5
-
SHA1
030af7eecf6698fbd94dc7396cf73d28f9d615f9
-
SHA256
fffa54ac4f2d502023e81a92abe83c3dc0859ab156c15f5ea2a1fdb16351740d
-
SHA512
4fca826b42b67ff794eb2d33d88bf59eb16c79f3424584310f3351fa7aca301619c2c8634143b8abab584a37d01b3f9750c124da2c77be54b5e493061af314f0
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6V:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5w
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" vndtgvxurf.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vndtgvxurf.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" vndtgvxurf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" vndtgvxurf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" vndtgvxurf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" vndtgvxurf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" vndtgvxurf.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vndtgvxurf.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 5 IoCs
pid Process 2628 vndtgvxurf.exe 2672 hufessdqfmifjjt.exe 2416 hgsrbmgw.exe 2620 lukkmkabecfny.exe 2464 hgsrbmgw.exe -
Loads dropped DLL 5 IoCs
pid Process 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 2628 vndtgvxurf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" vndtgvxurf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" vndtgvxurf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" vndtgvxurf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" vndtgvxurf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" vndtgvxurf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" vndtgvxurf.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "lukkmkabecfny.exe" hufessdqfmifjjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dgtoaodc = "vndtgvxurf.exe" hufessdqfmifjjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nxjobvnh = "hufessdqfmifjjt.exe" hufessdqfmifjjt.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: hgsrbmgw.exe File opened (read-only) \??\n: hgsrbmgw.exe File opened (read-only) \??\x: vndtgvxurf.exe File opened (read-only) \??\k: hgsrbmgw.exe File opened (read-only) \??\e: hgsrbmgw.exe File opened (read-only) \??\e: vndtgvxurf.exe File opened (read-only) \??\j: vndtgvxurf.exe File opened (read-only) \??\q: vndtgvxurf.exe File opened (read-only) \??\z: hgsrbmgw.exe File opened (read-only) \??\h: hgsrbmgw.exe File opened (read-only) \??\w: vndtgvxurf.exe File opened (read-only) \??\n: hgsrbmgw.exe File opened (read-only) \??\u: hgsrbmgw.exe File opened (read-only) \??\i: hgsrbmgw.exe File opened (read-only) \??\k: hgsrbmgw.exe File opened (read-only) \??\k: vndtgvxurf.exe File opened (read-only) \??\v: vndtgvxurf.exe File opened (read-only) \??\g: hgsrbmgw.exe File opened (read-only) \??\l: hgsrbmgw.exe File opened (read-only) \??\z: vndtgvxurf.exe File opened (read-only) \??\v: hgsrbmgw.exe File opened (read-only) \??\w: hgsrbmgw.exe File opened (read-only) \??\v: hgsrbmgw.exe File opened (read-only) \??\x: hgsrbmgw.exe File opened (read-only) \??\b: vndtgvxurf.exe File opened (read-only) \??\s: vndtgvxurf.exe File opened (read-only) \??\m: hgsrbmgw.exe File opened (read-only) \??\e: hgsrbmgw.exe File opened (read-only) \??\t: hgsrbmgw.exe File opened (read-only) \??\j: hgsrbmgw.exe File opened (read-only) \??\m: hgsrbmgw.exe File opened (read-only) \??\a: vndtgvxurf.exe File opened (read-only) \??\m: vndtgvxurf.exe File opened (read-only) \??\u: vndtgvxurf.exe File opened (read-only) \??\l: hgsrbmgw.exe File opened (read-only) \??\p: hgsrbmgw.exe File opened (read-only) \??\z: hgsrbmgw.exe File opened (read-only) \??\l: vndtgvxurf.exe File opened (read-only) \??\t: vndtgvxurf.exe File opened (read-only) \??\y: vndtgvxurf.exe File opened (read-only) \??\u: hgsrbmgw.exe File opened (read-only) \??\y: hgsrbmgw.exe File opened (read-only) \??\n: vndtgvxurf.exe File opened (read-only) \??\j: hgsrbmgw.exe File opened (read-only) \??\p: hgsrbmgw.exe File opened (read-only) \??\i: vndtgvxurf.exe File opened (read-only) \??\x: hgsrbmgw.exe File opened (read-only) \??\o: hgsrbmgw.exe File opened (read-only) \??\r: hgsrbmgw.exe File opened (read-only) \??\t: hgsrbmgw.exe File opened (read-only) \??\o: vndtgvxurf.exe File opened (read-only) \??\s: hgsrbmgw.exe File opened (read-only) \??\b: hgsrbmgw.exe File opened (read-only) \??\i: hgsrbmgw.exe File opened (read-only) \??\q: hgsrbmgw.exe File opened (read-only) \??\r: hgsrbmgw.exe File opened (read-only) \??\w: hgsrbmgw.exe File opened (read-only) \??\h: vndtgvxurf.exe File opened (read-only) \??\g: hgsrbmgw.exe File opened (read-only) \??\h: hgsrbmgw.exe File opened (read-only) \??\y: hgsrbmgw.exe File opened (read-only) \??\q: hgsrbmgw.exe File opened (read-only) \??\s: hgsrbmgw.exe File opened (read-only) \??\r: vndtgvxurf.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" vndtgvxurf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" vndtgvxurf.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1968-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x00390000000167ef-5.dat autoit_exe behavioral1/files/0x000b000000016056-17.dat autoit_exe behavioral1/files/0x0007000000016c2e-28.dat autoit_exe behavioral1/files/0x0007000000016c7a-33.dat autoit_exe behavioral1/files/0x0031000000018649-71.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\hgsrbmgw.exe 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\hgsrbmgw.exe 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll vndtgvxurf.exe File opened for modification C:\Windows\SysWOW64\hufessdqfmifjjt.exe 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vndtgvxurf.exe 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe File created C:\Windows\SysWOW64\hufessdqfmifjjt.exe 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe File created C:\Windows\SysWOW64\lukkmkabecfny.exe 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lukkmkabecfny.exe 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe File created C:\Windows\SysWOW64\vndtgvxurf.exe 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe hgsrbmgw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe hgsrbmgw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal hgsrbmgw.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe hgsrbmgw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe hgsrbmgw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe hgsrbmgw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal hgsrbmgw.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe hgsrbmgw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe hgsrbmgw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal hgsrbmgw.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe hgsrbmgw.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe hgsrbmgw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal hgsrbmgw.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe hgsrbmgw.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg vndtgvxurf.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184EC7791591DAB4B8BD7FE2ED9034BA" 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" vndtgvxurf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32452C769C2D82206A4477D6772E2DDB7CF564DF" 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" vndtgvxurf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" vndtgvxurf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2484 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 2628 vndtgvxurf.exe 2628 vndtgvxurf.exe 2628 vndtgvxurf.exe 2628 vndtgvxurf.exe 2628 vndtgvxurf.exe 2416 hgsrbmgw.exe 2416 hgsrbmgw.exe 2416 hgsrbmgw.exe 2416 hgsrbmgw.exe 2672 hufessdqfmifjjt.exe 2672 hufessdqfmifjjt.exe 2672 hufessdqfmifjjt.exe 2672 hufessdqfmifjjt.exe 2672 hufessdqfmifjjt.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2464 hgsrbmgw.exe 2464 hgsrbmgw.exe 2464 hgsrbmgw.exe 2464 hgsrbmgw.exe 2672 hufessdqfmifjjt.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2672 hufessdqfmifjjt.exe 2672 hufessdqfmifjjt.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2672 hufessdqfmifjjt.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2672 hufessdqfmifjjt.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2672 hufessdqfmifjjt.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2672 hufessdqfmifjjt.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2672 hufessdqfmifjjt.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2672 hufessdqfmifjjt.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2672 hufessdqfmifjjt.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2672 hufessdqfmifjjt.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2672 hufessdqfmifjjt.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1372 explorer.exe Token: SeShutdownPrivilege 1372 explorer.exe Token: SeShutdownPrivilege 1372 explorer.exe Token: SeShutdownPrivilege 1372 explorer.exe Token: SeShutdownPrivilege 1372 explorer.exe Token: SeShutdownPrivilege 1372 explorer.exe Token: SeShutdownPrivilege 1372 explorer.exe Token: SeShutdownPrivilege 1372 explorer.exe Token: SeShutdownPrivilege 1372 explorer.exe Token: SeShutdownPrivilege 1372 explorer.exe Token: SeShutdownPrivilege 1372 explorer.exe Token: SeShutdownPrivilege 1372 explorer.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 2628 vndtgvxurf.exe 2628 vndtgvxurf.exe 2628 vndtgvxurf.exe 2416 hgsrbmgw.exe 2416 hgsrbmgw.exe 2416 hgsrbmgw.exe 2672 hufessdqfmifjjt.exe 2672 hufessdqfmifjjt.exe 2672 hufessdqfmifjjt.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2464 hgsrbmgw.exe 2464 hgsrbmgw.exe 2464 hgsrbmgw.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 2628 vndtgvxurf.exe 2628 vndtgvxurf.exe 2628 vndtgvxurf.exe 2416 hgsrbmgw.exe 2416 hgsrbmgw.exe 2416 hgsrbmgw.exe 2672 hufessdqfmifjjt.exe 2672 hufessdqfmifjjt.exe 2672 hufessdqfmifjjt.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2620 lukkmkabecfny.exe 2464 hgsrbmgw.exe 2464 hgsrbmgw.exe 2464 hgsrbmgw.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe 1372 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2484 WINWORD.EXE 2484 WINWORD.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2628 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 28 PID 1968 wrote to memory of 2628 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 28 PID 1968 wrote to memory of 2628 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 28 PID 1968 wrote to memory of 2628 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 28 PID 1968 wrote to memory of 2672 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 29 PID 1968 wrote to memory of 2672 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 29 PID 1968 wrote to memory of 2672 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 29 PID 1968 wrote to memory of 2672 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 29 PID 1968 wrote to memory of 2416 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 30 PID 1968 wrote to memory of 2416 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 30 PID 1968 wrote to memory of 2416 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 30 PID 1968 wrote to memory of 2416 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 30 PID 1968 wrote to memory of 2620 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2620 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2620 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2620 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 31 PID 2628 wrote to memory of 2464 2628 vndtgvxurf.exe 32 PID 2628 wrote to memory of 2464 2628 vndtgvxurf.exe 32 PID 2628 wrote to memory of 2464 2628 vndtgvxurf.exe 32 PID 2628 wrote to memory of 2464 2628 vndtgvxurf.exe 32 PID 1968 wrote to memory of 2484 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 33 PID 1968 wrote to memory of 2484 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 33 PID 1968 wrote to memory of 2484 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 33 PID 1968 wrote to memory of 2484 1968 106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\106fe205ca4aa54d81a5c56401dc49d5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\vndtgvxurf.exevndtgvxurf.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\hgsrbmgw.exeC:\Windows\system32\hgsrbmgw.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2464
-
-
-
C:\Windows\SysWOW64\hufessdqfmifjjt.exehufessdqfmifjjt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2672
-
-
C:\Windows\SysWOW64\hgsrbmgw.exehgsrbmgw.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2416
-
-
C:\Windows\SysWOW64\lukkmkabecfny.exelukkmkabecfny.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2620
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2484
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1372
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5674f7f15197f897b4dff7428e976b0b6
SHA1f15df3516102e05fff2ffcd4f9a7c632be0d1865
SHA2566d20aa6e3a331333c0c8e8de1b79ea70470f988ffbd69700fc3ebdb5b1100b16
SHA51216a41a0e314d550287b23223278af0589be8115dc090d1db937f630931afddca7bae139563d1de8e91e654846106074612ea5a706f079d83449578052b99e06a
-
Filesize
512KB
MD59bcff4f4735b38f21475b7e6b786be11
SHA19a5f0efa47233df755b0c1155d8de6c414f64d6a
SHA256db1367a779257258d27603061982b456583fb91b8cdbefd17cc4e53cd954a2ae
SHA512a64ef246b3033143754183069cb1284f6bd98a14242999ecc50c43c5c4f24d37e89e3b3e2e65d6a29f26b3a9ffd1dd068488db2b0c4c74fda4a63feb93e000a1
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5b070becc97c4587eb58b52208e2eb85d
SHA1f7daa0d840edd15ff64e9b0f2b81aae2c0d339f0
SHA256cf7c954b1a7e8ed9ddfda349de57bd8d267cbaf858df25750c1efee92991c05d
SHA5124d990b513a2a5122e5c259b8f97ed7b1fb895cebbec9d26b7f58087af988050c1a66a115d4f64f4c1b1acadd1179a8de90f85c05b9b2ccfaba14d0235631cc66
-
Filesize
512KB
MD58c5bf7ef161ed1863f3c8fa4b4a5254f
SHA150f004d6b636d94f10ef60eec631328ea6a56082
SHA2563e8d1b28c22bc5c073a5bff904e8c29312788c6e599931aa229500c61959e020
SHA51279c871426b973b08a6d9f88cbbc87446276d58574ba415e7b6ac676a760333a924fbca942995a4cf0b1dd2dd3115b7f44833e0b34cd06026da88f8c938c58fc7
-
Filesize
512KB
MD5bbb0f44f14b7e2a240515709af5389f4
SHA196f4dea98a9840fb23e778ae8b06c82fa914637c
SHA25652098849b802240a005c91b3fb3683f6ce2169959af2f02beaacbae7ceaf84a9
SHA512e7d54d1152289cb568d7dc621f2b36b781681ccaf32146793f960733724c77f4b363fad5cda4a0f5f1fe252213b0d0b9181e560a3c1808076d1112fda0350023