Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 04:53
Static task
static1
Behavioral task
behavioral1
Sample
1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe
-
Size
905KB
-
MD5
1610a1baa2327aacdd625ac9cea6f2b8
-
SHA1
dc90be6ba647911f51ac75573bfa06ef8666e4db
-
SHA256
226d4f9bc4b1acc7b293f8fe4709c1f07ebf75bc66fa4857d68cd26fe1160f5e
-
SHA512
91c725ee93b98f59f0c1ef131221932c03356f1fcf738581af154bec180327ad6f4223cae5351d8e334833477cfae6665f5bfc1c73eebc42e9b5beae8904aeaf
-
SSDEEP
12288:TKKkF1X10ZhaJfC5/cnGLeb8fe6Owhky95g1xGkg1aFSkYu8DU0OYhLu0O49g3k:eKOXuhaJfo/da6OwZy1kkui6uKVOZk
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 2404 minidownload.exe 1664 DownLoadDlg.exe 1688 ExternalApp.exe 1640 UpdateService.exe 1140 XLDownloadCom.exe 1732 UpdateService.exe 1584 MiniTPFw.exe 3048 XLDownloadCom.exe 108 ThunderFW.exe 1436 MiniThunderPlatform.exe -
Loads dropped DLL 47 IoCs
pid Process 2360 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe 2404 minidownload.exe 2404 minidownload.exe 2404 minidownload.exe 2360 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe 2360 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe 2360 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe 1664 DownLoadDlg.exe 1688 ExternalApp.exe 1688 ExternalApp.exe 1688 ExternalApp.exe 1752 regsvr32.exe 2004 regsvr32.exe 1688 ExternalApp.exe 2356 regsvr32.exe 840 regsvr32.exe 2068 regsvr32.exe 616 regsvr32.exe 1688 ExternalApp.exe 1688 ExternalApp.exe 1640 UpdateService.exe 1640 UpdateService.exe 1640 UpdateService.exe 1140 XLDownloadCom.exe 1140 XLDownloadCom.exe 1732 UpdateService.exe 1732 UpdateService.exe 1732 UpdateService.exe 1880 regsvr32.exe 1664 DownLoadDlg.exe 1664 DownLoadDlg.exe 1664 DownLoadDlg.exe 3048 XLDownloadCom.exe 1664 DownLoadDlg.exe 1584 MiniTPFw.exe 3048 XLDownloadCom.exe 3048 XLDownloadCom.exe 3048 XLDownloadCom.exe 3048 XLDownloadCom.exe 3048 XLDownloadCom.exe 1436 MiniThunderPlatform.exe 1436 MiniThunderPlatform.exe 1436 MiniThunderPlatform.exe 1436 MiniThunderPlatform.exe 1436 MiniThunderPlatform.exe 1436 MiniThunderPlatform.exe 1436 MiniThunderPlatform.exe -
Registers COM server for autorun 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\InprocServer32\ = "C:\\Program Files (x86)\\SogouDownLoad\\IEHint64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32\ = "C:\\Program Files (x86)\\SogouDownLoad\\npdownload64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020} regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 DownLoadDlg.exe File opened for modification \??\PhysicalDrive0 MiniThunderPlatform.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy regsvr32.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini regsvr32.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol regsvr32.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI regsvr32.exe -
Drops file in Program Files directory 55 IoCs
description ioc Process File created C:\Program Files (x86)\SogouDownLoad\XLDownloadComPS.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\update\UpdateService.exe ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\DownLoadDlg.exe minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\download.html minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\btn_spr.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\error.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\js\actions.js minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\DlgHandler.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\download\atl71.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\npdownload.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\uninst.exe ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\dlbg.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\js\swfobject.js minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\IEHint64.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\btns.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\errorbg1.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\rocket2.swf minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\config.ini minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\css\down.css minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\error2.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\warning.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\download\dl_peer_id.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\download\id.dat ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\html\js\jquery-1.11.2.min.js minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_spr.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_t.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\download\MiniThunderPlatform.exe ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\download\download_engine.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\IEHint.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\attention.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\bg_line.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\dlico.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_min.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\download\ThunderFW.exe ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\html\repair.html minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\crash\ExceptionReport.exe minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\css\downloader.css minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\progressbar.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\dlico1.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\XLDownloadCom.exe ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\xldl.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\download\msvcr71.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\download\zlib1.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\html\settings.html minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\check.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_set.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\img_exe.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\tmp\ExternalApp.exe DownLoadDlg.exe File created C:\Program Files (x86)\SogouDownLoad\CommonState.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\npdownload64.dll ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\errorbg2.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\rocket1.swf minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_close.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\download\MiniTPFw.exe ExternalApp.exe File created C:\Program Files (x86)\SogouDownLoad\download\msvcp71.dll ExternalApp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x000b000000014230-1.dat nsis_installer_1 behavioral1/files/0x000b000000014230-1.dat nsis_installer_2 behavioral1/files/0x0006000000016dbb-86.dat nsis_installer_1 behavioral1/files/0x0006000000016dbb-86.dat nsis_installer_2 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main DownLoadDlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4A79E46E-5A01-4abb-BCC1-F96D06AEE085} DownLoadDlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4A79E46E-5A01-4abb-BCC1-F96D06AEE085}\AppName = "DownLoadDlg.exe" DownLoadDlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4A79E46E-5A01-4abb-BCC1-F96D06AEE085}\AppPath = "C:\\Program Files (x86)\\SogouDownLoad" DownLoadDlg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4A79E46E-5A01-4abb-BCC1-F96D06AEE085}\Policy = "3" DownLoadDlg.exe -
Modifies data under HKEY_USERS 38 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244} regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion regsvr32.exe Key created \REGISTRY\USER\S-1-5-20 regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains regsvr32.exe Key created \REGISTRY\USER\S-1-5-19 regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Stats regsvr32.exe Key created \REGISTRY\USER\.DEFAULT regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Ext\Stats regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244} regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244} regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0}\TypeLib\ = "{13D91BAE-B37C-41C3-AE86-463E53990546}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B411DAF2-77C4-4478-8477-5826A4147AE9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D85F656-2970-437F-BA8A-C6F95B86EE0D}\1.0\FLAGS\ = "0" XLDownloadCom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B411DAF2-77C4-4478-8477-5826A4147AE9}\TypeLib\Version = "1.0" XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\ = "IEHintBHO Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D91BAE-B37C-41C3-AE86-463E53990546}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{548F20C0-F980-4912-9190-1127D22D883D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{548F20C0-F980-4912-9190-1127D22D883D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D85F656-2970-437F-BA8A-C6F95B86EE0D}\1.0\ = "XLDownloadComLib" XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D85F656-2970-437F-BA8A-C6F95B86EE0D}\1.0\FLAGS XLDownloadCom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D85F656-2970-437F-BA8A-C6F95B86EE0D}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\SogouDownLoad" XLDownloadCom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4A79E46E-5A01-4abb-BCC1-F96D06AEE085}\LocalServer32\ = "C:\\Program Files (x86)\\SogouDownLoad\\DownLoadDlg.exe" DownLoadDlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{548F20C0-F980-4912-9190-1127D22D883D}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{35489C47-0C7C-48D8-8000-0FB159BAF406}\LocalServer32 XLDownloadCom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B411DAF2-77C4-4478-8477-5826A4147AE9}\TypeLib\Version = "1.0" XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{459CB386-4301-448D-A1DA-8751857E980B}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{548F20C0-F980-4912-9190-1127D22D883D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2D85F656-2970-437F-BA8A-C6F95B86EE0D}\1.0\HELPDIR XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B411DAF2-77C4-4478-8477-5826A4147AE9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\Implemented Categories regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32\ = "C:\\Program Files (x86)\\SogouDownLoad\\npdownload64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{35489C47-0C7C-48D8-8000-0FB159BAF406}\LocalServer32\ = "\"C:\\Program Files (x86)\\SogouDownLoad\\XLDownloadCom.exe\"" XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{459CB386-4301-448D-A1DA-8751857E980B}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{35489C47-0C7C-48D8-8000-0FB159BAF406}\TypeLib\ = "{2D85F656-2970-437F-BA8A-C6F95B86EE0D}" XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B411DAF2-77C4-4478-8477-5826A4147AE9}\ProxyStubClsid32 XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0}\ = "IDownLoadBHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\ = "IGameDownload" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\SOFTWARE regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D91BAE-B37C-41C3-AE86-463E53990546}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B411DAF2-77C4-4478-8477-5826A4147AE9}\ = "PSFactoryBuffer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\TypeLib\ = "{13D91BAE-B37C-41C3-AE86-463E53990546}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B411DAF2-77C4-4478-8477-5826A4147AE9} XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\ = "DownLoadBHO Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B411DAF2-77C4-4478-8477-5826A4147AE9}\NumMethods\ = "14" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{35489C47-0C7C-48D8-8000-0FB159BAF406}\LocalServer32\ServerExecutable = "C:\\Program Files (x86)\\SogouDownLoad\\XLDownloadCom.exe" XLDownloadCom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B411DAF2-77C4-4478-8477-5826A4147AE9}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B411DAF2-77C4-4478-8477-5826A4147AE9}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID DownLoadDlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{98D5DD5D-0742-4CC1-A0AB-7251C40DB020}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{35489C47-0C7C-48D8-8000-0FB159BAF406}\Version\ = "1.0" XLDownloadCom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\ = "DownLoadBHO Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1664 DownLoadDlg.exe 1664 DownLoadDlg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2404 2360 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2404 2360 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2404 2360 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2404 2360 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2404 2360 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2404 2360 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2404 2360 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe 28 PID 2360 wrote to memory of 1664 2360 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe 29 PID 2360 wrote to memory of 1664 2360 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe 29 PID 2360 wrote to memory of 1664 2360 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe 29 PID 2360 wrote to memory of 1664 2360 1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe 29 PID 1664 wrote to memory of 1688 1664 DownLoadDlg.exe 31 PID 1664 wrote to memory of 1688 1664 DownLoadDlg.exe 31 PID 1664 wrote to memory of 1688 1664 DownLoadDlg.exe 31 PID 1664 wrote to memory of 1688 1664 DownLoadDlg.exe 31 PID 1664 wrote to memory of 1688 1664 DownLoadDlg.exe 31 PID 1664 wrote to memory of 1688 1664 DownLoadDlg.exe 31 PID 1664 wrote to memory of 1688 1664 DownLoadDlg.exe 31 PID 1688 wrote to memory of 1752 1688 ExternalApp.exe 32 PID 1688 wrote to memory of 1752 1688 ExternalApp.exe 32 PID 1688 wrote to memory of 1752 1688 ExternalApp.exe 32 PID 1688 wrote to memory of 1752 1688 ExternalApp.exe 32 PID 1688 wrote to memory of 1752 1688 ExternalApp.exe 32 PID 1688 wrote to memory of 1752 1688 ExternalApp.exe 32 PID 1688 wrote to memory of 1752 1688 ExternalApp.exe 32 PID 1688 wrote to memory of 2004 1688 ExternalApp.exe 33 PID 1688 wrote to memory of 2004 1688 ExternalApp.exe 33 PID 1688 wrote to memory of 2004 1688 ExternalApp.exe 33 PID 1688 wrote to memory of 2004 1688 ExternalApp.exe 33 PID 1688 wrote to memory of 2004 1688 ExternalApp.exe 33 PID 1688 wrote to memory of 2004 1688 ExternalApp.exe 33 PID 1688 wrote to memory of 2004 1688 ExternalApp.exe 33 PID 1688 wrote to memory of 2356 1688 ExternalApp.exe 34 PID 1688 wrote to memory of 2356 1688 ExternalApp.exe 34 PID 1688 wrote to memory of 2356 1688 ExternalApp.exe 34 PID 1688 wrote to memory of 2356 1688 ExternalApp.exe 34 PID 1688 wrote to memory of 2356 1688 ExternalApp.exe 34 PID 1688 wrote to memory of 2356 1688 ExternalApp.exe 34 PID 1688 wrote to memory of 2356 1688 ExternalApp.exe 34 PID 2356 wrote to memory of 840 2356 regsvr32.exe 35 PID 2356 wrote to memory of 840 2356 regsvr32.exe 35 PID 2356 wrote to memory of 840 2356 regsvr32.exe 35 PID 2356 wrote to memory of 840 2356 regsvr32.exe 35 PID 2356 wrote to memory of 840 2356 regsvr32.exe 35 PID 2356 wrote to memory of 840 2356 regsvr32.exe 35 PID 2356 wrote to memory of 840 2356 regsvr32.exe 35 PID 1688 wrote to memory of 2068 1688 ExternalApp.exe 36 PID 1688 wrote to memory of 2068 1688 ExternalApp.exe 36 PID 1688 wrote to memory of 2068 1688 ExternalApp.exe 36 PID 1688 wrote to memory of 2068 1688 ExternalApp.exe 36 PID 1688 wrote to memory of 2068 1688 ExternalApp.exe 36 PID 1688 wrote to memory of 2068 1688 ExternalApp.exe 36 PID 1688 wrote to memory of 2068 1688 ExternalApp.exe 36 PID 2068 wrote to memory of 616 2068 regsvr32.exe 37 PID 2068 wrote to memory of 616 2068 regsvr32.exe 37 PID 2068 wrote to memory of 616 2068 regsvr32.exe 37 PID 2068 wrote to memory of 616 2068 regsvr32.exe 37 PID 2068 wrote to memory of 616 2068 regsvr32.exe 37 PID 2068 wrote to memory of 616 2068 regsvr32.exe 37 PID 2068 wrote to memory of 616 2068 regsvr32.exe 37 PID 1688 wrote to memory of 1640 1688 ExternalApp.exe 38 PID 1688 wrote to memory of 1640 1688 ExternalApp.exe 38 PID 1688 wrote to memory of 1640 1688 ExternalApp.exe 38 PID 1688 wrote to memory of 1640 1688 ExternalApp.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1610a1baa2327aacdd625ac9cea6f2b8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\minidownload.exeC:\Users\Admin\AppData\Local\Temp\\minidownload.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:2404
-
-
C:\Program Files (x86)\SogouDownLoad\DownLoadDlg.exe"C:\Program Files (x86)\SogouDownLoad\DownLoadDlg.exe" /Install?status=true&softurl=https%3A%2F%2Fxiazai.sogou.com%2Fcomm%2Fredir%3Fsoftdown%3D1%26u%3D5M778mNuk-Kn5im16Xqufpm73IcE-aIs4gcvPL07TEJ86hRHz3mToT_ePZtTrYvi7YQ-v76q1eLZ-feXkpKDG8uqxplQrsbk%26pcid%3D562185221852419207%26fr%3Dxiazai%26source%3Dtencent%26filename%3Dediary_v30final.zip&iconurl=http%3A%2F%2Fpc3.gtimg.com%2Fsoftmgr%2Flogo%2F48%2F161020_48_1387967396.png&softname=%E7%94%B5%E5%AD%90%E6%97%A5%E8%AE%B0%E6%9C%AC&softsize=4.79MB2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\SogouDownLoad\tmp\ExternalApp.exe"C:\Program Files (x86)\SogouDownLoad\tmp\ExternalApp.exe" /Update3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SogouDownLoad\npdownload.dll"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:1752
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SogouDownLoad\IEHint.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2004
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SogouDownLoad\npdownload64.dll"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\SogouDownLoad\npdownload64.dll"5⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies data under HKEY_USERS
- Modifies registry class
PID:840
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SogouDownLoad\IEHint64.dll"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\SogouDownLoad\IEHint64.dll"5⤵
- Loads dropped DLL
- Registers COM server for autorun
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:616
-
-
-
C:\Program Files (x86)\SogouDownLoad\update\UpdateService.exe"C:\Program Files (x86)\SogouDownLoad\update\UpdateService.exe" /Install4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640
-
-
C:\Program Files (x86)\SogouDownLoad\XLDownloadCom.exe"C:\Program Files (x86)\SogouDownLoad\XLDownloadCom.exe" /Regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1140
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SogouDownLoad\XLDownloadComPS.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:1880
-
-
-
C:\Program Files (x86)\SogouDownLoad\download\MiniTPFw.exe"C:\Program Files (x86)\SogouDownLoad\download\MiniTPFw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584 -
C:\Program Files (x86)\SogouDownLoad\download\ThunderFW.exe"C:\Program Files (x86)\SogouDownLoad\download\ThunderFW.exe" MiniThunderPlatform2024-05-0504:53:37 "C:\Program Files (x86)\SogouDownLoad\download\MiniThunderPlatform.exe"4⤵
- Executes dropped EXE
PID:108
-
-
-
-
C:\Program Files (x86)\SogouDownLoad\update\UpdateService.exe"C:\Program Files (x86)\SogouDownLoad\update\UpdateService.exe" /Service1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1732
-
C:\Program Files (x86)\SogouDownLoad\XLDownloadCom.exe"C:\Program Files (x86)\SogouDownLoad\XLDownloadCom.exe" -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3048 -
C:\Program Files (x86)\SogouDownLoad\download\MiniThunderPlatform.exe"C:\Program Files (x86)\SogouDownLoad\download\MiniThunderPlatform.exe" -StartTP2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:1436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191KB
MD587d4aa3496919af493c9365619c3fd53
SHA1a883a0be2940811ef9232592c811b854f684f4b7
SHA256d4a4eb61a6ffba806c3f34fa6bb5fca32489f53138dbaf324a8b2d210afa0771
SHA512064637554b7e7e1c5699f4e4ced73dd4ca7bf87172009b121bedeb864f8e3d03a1352b6f6b9515b9a4020137e07b9981476a664eadbd27bd32acdd8a53003372
-
Filesize
786KB
MD53f1eae76cd9e2cd1d6c1fa9b3ad2df9a
SHA15066a259189ba2181969accd7f71d17f38591de7
SHA2563c987155a155ae4603760f471eaab1bbb130471fb3f47127283da9070ea23a5f
SHA5122d56933e707d622badd819405bb905037557a5a23b647bb9033d67c8719aa8cf9b56f0185bd2efccec857b7f3573689c35732af1f83998a943373cc8ca29f7c1
-
Filesize
300KB
MD56cffe36e5e3d9364a18eaf4a44ebfc23
SHA18a3bb3fa5f76a7eac5dfc4bd201a5e5203c10bcf
SHA256cd57765f8cea6a4f422862c0b8a3e1945f17292e4c14b31333ec1525e05c6025
SHA5127e145a0a79bd3d8caa89bae2ddb1187ff4de481426bb820cdf8f0206c96819d38af0ade5aad6c9e89da4e11dad6d5ab692f3d8bb25b90da2596bf49619fe325b
-
Filesize
346KB
MD530e7e39b49c8590aec85aca2664ff3e7
SHA18273c46fb4666e44ce3865012529aebb6aa95f1c
SHA2563d3f8c1a05c2b5b5362b9ee0ddc1ce653a22abf0b559acceebcc82b73dbaf79a
SHA5128d967605e4be98929cf6b508dccc217e60186da44dcb594d16e286f29b66c846dc1c4e676fab235de7f2326bcb4aae30528a535136de72f6a978a48d8a424245
-
Filesize
42KB
MD5ef217dde650c290e6f15bdbd7f55f26d
SHA187ef4ca0ac1f7dd6c50bdaa0aeeebc3d1e132dcf
SHA256a445ea86ffb20f9540d53aa12dc8f3737a9c87573241b9c5686109533b92e890
SHA512d2ae2574d2fa5455b590513066bdee9d3765bffd6b82450a5e619d01d4378013cbdcb4f0d9cec47ba7f03125098945c07cb0c6274a9a1ad0346bddd10fe022b5
-
Filesize
58KB
MD558bb62e88687791ad2ea5d8d6e3fe18b
SHA10ffb029064741d10c9cf3f629202aa97167883de
SHA256f02fa7ddab2593492b9b68e3f485e59eb755380a9235f6269705f6d219dff100
SHA512cd36b28f87be9cf718f0c44bf7c500d53186edc08889bcfa5222041ff31c5cbee509b186004480efbd99c36b2233182ae0969447f4051510e1771a73ed209da5
-
Filesize
116B
MD5ffa1443199298e2c4ff1122f1ae14b05
SHA196175a64c1f8ba142aa057e8f76e13467ecefb82
SHA2562d21ddb94831d5345bbfbe52ecd342067cf49c6eaf8c78057e1901b6c69c6574
SHA5123955846ed694c43d2d9857168e1c3fee9714ecea70c0af04b1db6d7be5b4805b92730d74bc4a74ed5464c47e4af558b8d040d0efc8ec276fcb8c50c346fe61de
-
Filesize
7KB
MD50079cdb145c388c3e4c5e2235ac97bce
SHA17a8fee29992183dd572c52a1f6ca24219f4d8cba
SHA256f4890eb5df2bb1b2921c0e561388780b4e2871998ca5aa7f4ec8bbf6ea1a715c
SHA5127387d097152a49f8c57db203d89f64f6d2f905b60f69fa90d26ee3ebcab6428865e745fca63600c724c296db85d299502b4133cacd4b7dbcd4653712a82caa46
-
Filesize
7KB
MD5382c18d88309c186f501dc3d31876461
SHA11c602b521deec4e2826e9280fed7e586351282c4
SHA25667293d69f293e3347dd6eaabf19b84d3bba0fbc00fcc19d79be354da3f105687
SHA512f82ba3616734551eef1239203cc09531280f1c9118edc1f1218c18247c13dc3455e7d783f440a919a1df47922d33ed8526deabd979fe4d12e6cef2a5707c045d
-
Filesize
567B
MD51688dc013a46d66800b0c0683ad7bb43
SHA183a57258c3197dc1fd69f7dc893555e7c502441b
SHA256e541cb9296ccf86493b878da480908dea3dcbf6437da2c3683d737d0c93cce98
SHA5128552fe4ead1c34fdfcea0fa7dde294c1fce1e88e856d99c36f30f672d1ebb9eb198eae8a69f38e14121e000c73b6e2ae79b846fcd5c2d04ec01253ab653ad5fd
-
Filesize
931B
MD5f719268e754a88159b72ee7f9d3bb1f3
SHA18c5c129749792a001e654f1c61185d2467282070
SHA2567530e65071e469580ecb2be7fef7215b0dc857a74c8fff834ad8c1c0f0b38477
SHA5126960026f90fb1257cd1840f3c0914669e6f3081c441da9d2085a312a2b8fb1877c5474936d7be65bdc23689be91a1e8d63dd910a5dd424a6fa90d33e0650233d
-
Filesize
295B
MD57d5cd717db00796e2860dcd497f51070
SHA158c1a013d5ccdbeb876bc97d935f8d3c20e55a9a
SHA256b754d70605198fcf95b7a47da63eeb1b62055c26d112849752d73ff27f6866e3
SHA5128b96628120bead20312a3224416ecaf83daa5e020f4aff2fbc41064381b8cde547881b93a88b921a48ac4dffde168a25e3b471f1e9fd054ec69c5aea0f8ee046
-
Filesize
25KB
MD5b6b31a4d23c2664b87dc8bf1fcf8ff22
SHA117f27a514ef7119080be4ae9dc691010acdc43fa
SHA2565ece2e217e6a50b2ecc6564601c1da92441c73a1a34a3c6c5d207d6726df8756
SHA5125506ed1fba0e3fa471c83240266ff329fbb23ae862955a5bac358ae506c90d4c03227a710fc548ca5510eb711b95ecce75c63323c30766e3dd081c081b5829cd
-
Filesize
646B
MD5a71d60c90ab3baeccb1e5212f47a236c
SHA11edc658717eb5eae7ceca3f75e81c971dcb83bb2
SHA256ecf2dbdf42e4d543f304857ed5bc58e91228ffcc41538a8ec3fb9c7fcefd63fd
SHA512851a0c793a21f9cb4e03687ac3e41bd1c042c276b858c81a8eba9e5abef4ebba9449a0806f2ff043077ef04ed2f5f03ffa8c301d3d07e1a8a939a9537f4112a1
-
Filesize
738B
MD5074527951050744fd058ec84b7ea6a49
SHA164ce9939dcf20a04033e2ff0b3d7789a1b1b123d
SHA2561ee798ab18501b2234f146de4898167500ce55c3d07e041ed847d0d1e89db84f
SHA5121c6eec31f0e7f68090d608394fa8325b572d960337e58dd11e2531374e4d5abb452d3104a41f8f900d49ec6abf4ac66834613339971f026d8e2bb0cb1beb9fb2
-
Filesize
657B
MD50e0ac8352cd69f396f271fa32f3ab554
SHA1ed6d306a5033707f45477df3318a53d15b47cf43
SHA256c2c34d6bf4e17b756954e409dc9b5663169d68997abd722ce1e86473b769f10c
SHA5125d2528489c21600f16f04559500be3ebe9db5a1dc7bf9abc9c1312187b4b8b7bc5966f9eb2a38e26bff26c854a6d964fa156641fed9501cf0e7befedb60fd7e0
-
Filesize
285B
MD57db33b5890d916426f77d585ab3c4fa9
SHA199a794c3a88803ae289c7ea6f0d733e22a3b799b
SHA2565585318ea9be125540f00f04b05b29da3816ef97ce837a22a2eaee2d5d462d9b
SHA5129800273f1e605b946dd553cbae650270c5bf2af7909a4836aa81907f9e30ca348a3552a1887e3357472ca1b93fa8361a17bee3fb742fb5a2d0c1b47a5a47c773
-
Filesize
8KB
MD53b4a5f925a08bd18b636880b8d557077
SHA173ed8c3697681e7999bae4fdcc62867b263182ce
SHA25648b8718ba8de855d6c937b23eb7ccc4f5482e6619de9261324c12a48ae6769dc
SHA512aa5ffd3040a6eb964ed7c70d138e3201989f78551610e22585077fa86bff58740500d6309c339a2dded56481d04f7416ca97b22548fde4661f7da39c9600644b
-
Filesize
93KB
MD55790ead7ad3ba27397aedfa3d263b867
SHA18130544c215fe5d1ec081d83461bf4a711e74882
SHA2562ecd295d295bec062cedebe177e54b9d6b19fc0a841dc5c178c654c9ccff09c0
SHA512781acedc99de4ce8d53d9b43a158c645eab1b23dfdfd6b57b3c442b11acc4a344e0d5b0067d4b78bb173abbded75fb91c410f2b5a58f71d438aa6266d048d98a
-
Filesize
10KB
MD5631f38cfac458788af482eba736e5ac3
SHA1b1d09def39ec74eff2c9e0aafe0a7c12e7650150
SHA25613e6cf03cdd65a8174cce7b0cb40c9821d2aff04a79c3374e8664fb0abb5694d
SHA5123ae47c895cd586b1dca8bdf65c58bc896b27837881cc42bb7b3d55c9a71ea9e857939a69c5146b445b64714996393d1ec9c0d95b18d18fd5cb48f02bb8a53f42
-
Filesize
263KB
MD509c16c79a0093b38ef756c58c32d75e2
SHA1d6721cc14a1dd1879a923b38fd046d6e8b0f40df
SHA256a93cce637743104e4d418eca05f238405b3e97672163d8abd1ad429045f843b6
SHA512eabb9237b5121e9755a01d4e9522513fbf5ea4594779d336fe373708933006b94d10a23a749efc623177296b1270337a63aab46d4990a0ee1f73df7ee8622f87
-
Filesize
302KB
MD58523eee6d4c49b110e6c19ecfd7e5620
SHA1434ddf9f77f904812ef4c3c2329ce057b30dfdfc
SHA256a4917bf56e25576632e808c5199c3c43eb21c866e4e6eb6747c79168f6044c57
SHA512bb916842beac0a605675dda9bf240b2f75437a61bbdd3d89fd464694167db7addb9fd6dd2fce482b9670c9c0e46eb9b3952cf538fb555ade10a9787f4081934a
-
Filesize
95B
MD5627fed3cd83a9886534b89fcd15b7d6e
SHA1d75b9ac63c593b77407ad6be6c68ddcaa9ea349a
SHA2569d0bd944bdfae900067bc5539daa091017c970ae4c4bd22c4624cd302dc62006
SHA5129d735d91b5980590e833cfd641c4772e0a7af8ac38aeeea18810d05dcdb80ce97ae932a667d4baa28f639f88932a43ae6500cb9214396b612d4540cdc6b91356
-
Filesize
133KB
MD5004dcd89684f7fc42d3c77edf80dfc92
SHA18a086552df8c17ad146518757689f9237e27b87d
SHA25667510f7dd0476f12e07901ac0344d92186dd761a52398ee1e835421382094f1b
SHA5123a60493e77a7e59147d2b75bed788062d7482d922062d63a40ba3a050013736ce28e1f6319ba3eb7faecc44de9332ff571c028ea8582270d614d9659bf2769ac
-
Filesize
2.4MB
MD5b58d945d3d2b83eb5199d60fc27d0e6a
SHA13b70e368422bab5ff123d1ef6c5779adb540ef5a
SHA256905de1f8ab574888fa9dbe7bb5a060ca1c09f710fed2c98e3c2699e595343b79
SHA512027b6ab2197451dae5224c6f3417120d3b7e1ca5cb1801e4a952cac4b832deeacd16955bb3cb3c13553317685609eac6a2202ce8d2ab85837963a5a1478eacdd
-
Filesize
154KB
MD544f5df9407679e7385a0a3a925fbc39b
SHA195681735e2b3e8d0296b39fb505a6e6644e2330b
SHA256a1779be9ef6a3ec798578c0b79a279d34316872d8509eb37f62c98b2fe6af23f
SHA512bf02965127b81da708e13b519b822903de9999b797bbd0ed6697a39e95279511c9e9044d793ef69d9a11f3d518fce1ba85250bbe58c6255f660a09bced35c63f
-
Filesize
496KB
MD50aaf56d69b9f7976df9199c43d50c46e
SHA1ff5aae9855bcc1dd22cce8b9bb658aece7c700d3
SHA2568ff183757f031c449463b8e02d30157b029cea3e9a05770a4891c24d7cb398b5
SHA5126b5b8d1be7fd78a0eaa2025c53c6760191752c3ec8a2336b1c12bec713f1c0a8b02163c8f47ab3d310033f6bac3c76ba967ff88d82f4787524f1f9f25f63c677
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f