Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:27
Static task
static1
Behavioral task
behavioral1
Sample
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe
-
Size
512KB
-
MD5
65da43850cad5e51c3c51487c2437fd7
-
SHA1
098c8253fc287c870cee0f2009a106628def9570
-
SHA256
53dc2e3f581a0eface39638520f1b3d589dedb4be74bb7f9d0c388a524204e43
-
SHA512
ce7acc30e7ff1dc5db48d0dfdad189a648d07cbef4c7886357af45881fb6669d7eadd16ff831cd99dec4d07fc42482ecc99159928ed027d8650105998623a37a
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6M:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5j
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
zgxqeufqkp.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" zgxqeufqkp.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
zgxqeufqkp.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zgxqeufqkp.exe -
Processes:
zgxqeufqkp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" zgxqeufqkp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" zgxqeufqkp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" zgxqeufqkp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" zgxqeufqkp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" zgxqeufqkp.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
zgxqeufqkp.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" zgxqeufqkp.exe -
Executes dropped EXE 5 IoCs
Processes:
zgxqeufqkp.exeoxpahigvgwcsmza.exegnzfdjrf.exemhawxifbgxknk.exegnzfdjrf.exepid process 2492 zgxqeufqkp.exe 2572 oxpahigvgwcsmza.exe 2520 gnzfdjrf.exe 2672 mhawxifbgxknk.exe 2388 gnzfdjrf.exe -
Loads dropped DLL 5 IoCs
Processes:
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exezgxqeufqkp.exepid process 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2492 zgxqeufqkp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
zgxqeufqkp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" zgxqeufqkp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" zgxqeufqkp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" zgxqeufqkp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" zgxqeufqkp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" zgxqeufqkp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" zgxqeufqkp.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
oxpahigvgwcsmza.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\jvwrvpls = "zgxqeufqkp.exe" oxpahigvgwcsmza.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\enhibbxp = "oxpahigvgwcsmza.exe" oxpahigvgwcsmza.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "mhawxifbgxknk.exe" oxpahigvgwcsmza.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
gnzfdjrf.exezgxqeufqkp.exegnzfdjrf.exedescription ioc process File opened (read-only) \??\e: gnzfdjrf.exe File opened (read-only) \??\o: gnzfdjrf.exe File opened (read-only) \??\e: zgxqeufqkp.exe File opened (read-only) \??\v: zgxqeufqkp.exe File opened (read-only) \??\q: gnzfdjrf.exe File opened (read-only) \??\k: gnzfdjrf.exe File opened (read-only) \??\l: zgxqeufqkp.exe File opened (read-only) \??\s: zgxqeufqkp.exe File opened (read-only) \??\k: gnzfdjrf.exe File opened (read-only) \??\a: gnzfdjrf.exe File opened (read-only) \??\i: zgxqeufqkp.exe File opened (read-only) \??\x: zgxqeufqkp.exe File opened (read-only) \??\r: gnzfdjrf.exe File opened (read-only) \??\i: gnzfdjrf.exe File opened (read-only) \??\y: gnzfdjrf.exe File opened (read-only) \??\h: zgxqeufqkp.exe File opened (read-only) \??\j: zgxqeufqkp.exe File opened (read-only) \??\z: zgxqeufqkp.exe File opened (read-only) \??\i: gnzfdjrf.exe File opened (read-only) \??\v: gnzfdjrf.exe File opened (read-only) \??\l: gnzfdjrf.exe File opened (read-only) \??\z: gnzfdjrf.exe File opened (read-only) \??\n: zgxqeufqkp.exe File opened (read-only) \??\o: zgxqeufqkp.exe File opened (read-only) \??\p: zgxqeufqkp.exe File opened (read-only) \??\r: zgxqeufqkp.exe File opened (read-only) \??\t: zgxqeufqkp.exe File opened (read-only) \??\g: gnzfdjrf.exe File opened (read-only) \??\o: gnzfdjrf.exe File opened (read-only) \??\x: gnzfdjrf.exe File opened (read-only) \??\m: gnzfdjrf.exe File opened (read-only) \??\w: gnzfdjrf.exe File opened (read-only) \??\k: zgxqeufqkp.exe File opened (read-only) \??\j: gnzfdjrf.exe File opened (read-only) \??\w: zgxqeufqkp.exe File opened (read-only) \??\h: gnzfdjrf.exe File opened (read-only) \??\a: gnzfdjrf.exe File opened (read-only) \??\p: gnzfdjrf.exe File opened (read-only) \??\j: gnzfdjrf.exe File opened (read-only) \??\p: gnzfdjrf.exe File opened (read-only) \??\s: gnzfdjrf.exe File opened (read-only) \??\w: gnzfdjrf.exe File opened (read-only) \??\y: gnzfdjrf.exe File opened (read-only) \??\z: gnzfdjrf.exe File opened (read-only) \??\q: gnzfdjrf.exe File opened (read-only) \??\t: gnzfdjrf.exe File opened (read-only) \??\m: zgxqeufqkp.exe File opened (read-only) \??\t: gnzfdjrf.exe File opened (read-only) \??\h: gnzfdjrf.exe File opened (read-only) \??\g: gnzfdjrf.exe File opened (read-only) \??\n: gnzfdjrf.exe File opened (read-only) \??\v: gnzfdjrf.exe File opened (read-only) \??\x: gnzfdjrf.exe File opened (read-only) \??\a: zgxqeufqkp.exe File opened (read-only) \??\q: zgxqeufqkp.exe File opened (read-only) \??\u: zgxqeufqkp.exe File opened (read-only) \??\l: gnzfdjrf.exe File opened (read-only) \??\m: gnzfdjrf.exe File opened (read-only) \??\s: gnzfdjrf.exe File opened (read-only) \??\b: zgxqeufqkp.exe File opened (read-only) \??\y: zgxqeufqkp.exe File opened (read-only) \??\b: gnzfdjrf.exe File opened (read-only) \??\n: gnzfdjrf.exe File opened (read-only) \??\u: gnzfdjrf.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
zgxqeufqkp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" zgxqeufqkp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" zgxqeufqkp.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2256-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\oxpahigvgwcsmza.exe autoit_exe \Windows\SysWOW64\zgxqeufqkp.exe autoit_exe \Windows\SysWOW64\gnzfdjrf.exe autoit_exe C:\Windows\SysWOW64\mhawxifbgxknk.exe autoit_exe C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exezgxqeufqkp.exedescription ioc process File opened for modification C:\Windows\SysWOW64\mhawxifbgxknk.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\zgxqeufqkp.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\oxpahigvgwcsmza.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File created C:\Windows\SysWOW64\gnzfdjrf.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\gnzfdjrf.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File created C:\Windows\SysWOW64\mhawxifbgxknk.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File created C:\Windows\SysWOW64\zgxqeufqkp.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File created C:\Windows\SysWOW64\oxpahigvgwcsmza.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll zgxqeufqkp.exe -
Drops file in Program Files directory 14 IoCs
Processes:
gnzfdjrf.exegnzfdjrf.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal gnzfdjrf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gnzfdjrf.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gnzfdjrf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gnzfdjrf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gnzfdjrf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal gnzfdjrf.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gnzfdjrf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gnzfdjrf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gnzfdjrf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gnzfdjrf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal gnzfdjrf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gnzfdjrf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gnzfdjrf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal gnzfdjrf.exe -
Drops file in Windows directory 5 IoCs
Processes:
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXE65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exezgxqeufqkp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32302C7F9D2182276A4277D570202DDF7D8565D9" 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78068B3FF1A22DAD109D1D58A759010" 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" zgxqeufqkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg zgxqeufqkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1845C67F1593DAB2B8BD7CE6EC9637C9" 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" zgxqeufqkp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFCFF8F4858826F9030D72E7D93BDEFE135583067356330D79F" 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 2360 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exezgxqeufqkp.exegnzfdjrf.exeoxpahigvgwcsmza.exemhawxifbgxknk.exegnzfdjrf.exepid process 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2492 zgxqeufqkp.exe 2492 zgxqeufqkp.exe 2492 zgxqeufqkp.exe 2492 zgxqeufqkp.exe 2492 zgxqeufqkp.exe 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2520 gnzfdjrf.exe 2520 gnzfdjrf.exe 2520 gnzfdjrf.exe 2520 gnzfdjrf.exe 2572 oxpahigvgwcsmza.exe 2572 oxpahigvgwcsmza.exe 2572 oxpahigvgwcsmza.exe 2572 oxpahigvgwcsmza.exe 2572 oxpahigvgwcsmza.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2388 gnzfdjrf.exe 2388 gnzfdjrf.exe 2388 gnzfdjrf.exe 2388 gnzfdjrf.exe 2572 oxpahigvgwcsmza.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2572 oxpahigvgwcsmza.exe 2572 oxpahigvgwcsmza.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2572 oxpahigvgwcsmza.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2572 oxpahigvgwcsmza.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2572 oxpahigvgwcsmza.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2572 oxpahigvgwcsmza.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2572 oxpahigvgwcsmza.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2572 oxpahigvgwcsmza.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2572 oxpahigvgwcsmza.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2572 oxpahigvgwcsmza.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2572 oxpahigvgwcsmza.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exezgxqeufqkp.exegnzfdjrf.exeoxpahigvgwcsmza.exemhawxifbgxknk.exegnzfdjrf.exepid process 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2492 zgxqeufqkp.exe 2492 zgxqeufqkp.exe 2492 zgxqeufqkp.exe 2520 gnzfdjrf.exe 2520 gnzfdjrf.exe 2520 gnzfdjrf.exe 2572 oxpahigvgwcsmza.exe 2572 oxpahigvgwcsmza.exe 2572 oxpahigvgwcsmza.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2388 gnzfdjrf.exe 2388 gnzfdjrf.exe 2388 gnzfdjrf.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exezgxqeufqkp.exegnzfdjrf.exeoxpahigvgwcsmza.exemhawxifbgxknk.exegnzfdjrf.exepid process 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 2492 zgxqeufqkp.exe 2492 zgxqeufqkp.exe 2492 zgxqeufqkp.exe 2520 gnzfdjrf.exe 2520 gnzfdjrf.exe 2520 gnzfdjrf.exe 2572 oxpahigvgwcsmza.exe 2572 oxpahigvgwcsmza.exe 2572 oxpahigvgwcsmza.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2672 mhawxifbgxknk.exe 2388 gnzfdjrf.exe 2388 gnzfdjrf.exe 2388 gnzfdjrf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 2360 WINWORD.EXE 2360 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exezgxqeufqkp.exeWINWORD.EXEdescription pid process target process PID 2256 wrote to memory of 2492 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe zgxqeufqkp.exe PID 2256 wrote to memory of 2492 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe zgxqeufqkp.exe PID 2256 wrote to memory of 2492 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe zgxqeufqkp.exe PID 2256 wrote to memory of 2492 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe zgxqeufqkp.exe PID 2256 wrote to memory of 2572 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe oxpahigvgwcsmza.exe PID 2256 wrote to memory of 2572 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe oxpahigvgwcsmza.exe PID 2256 wrote to memory of 2572 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe oxpahigvgwcsmza.exe PID 2256 wrote to memory of 2572 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe oxpahigvgwcsmza.exe PID 2256 wrote to memory of 2520 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe gnzfdjrf.exe PID 2256 wrote to memory of 2520 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe gnzfdjrf.exe PID 2256 wrote to memory of 2520 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe gnzfdjrf.exe PID 2256 wrote to memory of 2520 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe gnzfdjrf.exe PID 2256 wrote to memory of 2672 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe mhawxifbgxknk.exe PID 2256 wrote to memory of 2672 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe mhawxifbgxknk.exe PID 2256 wrote to memory of 2672 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe mhawxifbgxknk.exe PID 2256 wrote to memory of 2672 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe mhawxifbgxknk.exe PID 2492 wrote to memory of 2388 2492 zgxqeufqkp.exe gnzfdjrf.exe PID 2492 wrote to memory of 2388 2492 zgxqeufqkp.exe gnzfdjrf.exe PID 2492 wrote to memory of 2388 2492 zgxqeufqkp.exe gnzfdjrf.exe PID 2492 wrote to memory of 2388 2492 zgxqeufqkp.exe gnzfdjrf.exe PID 2256 wrote to memory of 2360 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe WINWORD.EXE PID 2256 wrote to memory of 2360 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe WINWORD.EXE PID 2256 wrote to memory of 2360 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe WINWORD.EXE PID 2256 wrote to memory of 2360 2256 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe WINWORD.EXE PID 2360 wrote to memory of 1452 2360 WINWORD.EXE splwow64.exe PID 2360 wrote to memory of 1452 2360 WINWORD.EXE splwow64.exe PID 2360 wrote to memory of 1452 2360 WINWORD.EXE splwow64.exe PID 2360 wrote to memory of 1452 2360 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\zgxqeufqkp.exezgxqeufqkp.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\gnzfdjrf.exeC:\Windows\system32\gnzfdjrf.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2388 -
C:\Windows\SysWOW64\oxpahigvgwcsmza.exeoxpahigvgwcsmza.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2572 -
C:\Windows\SysWOW64\gnzfdjrf.exegnzfdjrf.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2520 -
C:\Windows\SysWOW64\mhawxifbgxknk.exemhawxifbgxknk.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2672 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1452
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD537e7f1138f9973093eb283d120721452
SHA1b79704ec0b5c97ef6ee0eb3ade8459cc60aa09d1
SHA25665da1fe2fa8231f397b4dc66a80d2dd7ae7b144f1632d479a08191def70e9d3d
SHA512ca8386818bff547d86479c0bc721287b08a6d5f3af02337d33be2cb14a6e4d91c0d06f515f53b8145ccbec320997e67a0466f0ae96a991cb3b8071b990791302
-
Filesize
20KB
MD550440bfdec0bb2e3537972f40f09a200
SHA15ddbf5ad7ddc4510f9dfd05181e1e3ad80ed3bd4
SHA25631578ba3ed7e09f676566943446dade4ccca7ee128f31853b84ebce5ddf39cf6
SHA5121a8aa6c8f0f92c3a0e214fbfa76633f51a26ba0562c6230efeebeb24100316e1b2339a9c10226794957273c549930c585573e42dd17c7670e76ea65583a2a060
-
Filesize
512KB
MD5a2dacfa0b52c732454da1d6d5c5f21c0
SHA1b1ec0f89c4a376cdd7a805c40d0b496fc4d97f6a
SHA256ca7a2cc75b1eb726d09cd6d1a005b1f5b7e38188ae389fa1cbcfe7a3bc8dc757
SHA512181d330e2f983f72ef799cfe7f37069d0fd6aa8391942c184f03e940dc5a5f0c5280fd0e3ddc0878f73eecc4f5ca3e843fff43205162ff5203318154a3eff94e
-
Filesize
512KB
MD5cf2e63983f2adb2ceff3baa11bcb2c7f
SHA15aac23ff74ef5444acd2aad28c5c53c0ec9d60b7
SHA256e040867d81c4362e8558902d4d20d925c2ffc112d84ca62dc6557a32b9c03567
SHA512a8ab29ae1d4b2c7d81ec2a2419b1fb63f212abb1e111ad24afb8f9441fa47e80e0ebb359ccc545f58614525bacc0c4ca5ea6b7f8dd0eab81028c792960ed734a
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5289a1dc1310c40f72d6c6d589001a17d
SHA13a4095178e8c006f402d75aa7e286ea14cc66a45
SHA2563b276a9e9a22b30b679d7b6de1d778555612f4045a96d4554d90c914762dfa92
SHA51285c6eec50a6a39511b5bf09d30785f7b4321ad27827ca10c109334444d8ee798134bad04f4cdbfb8b5088a823669a07e97ddc4d20651417dabc4711453cf8434
-
Filesize
512KB
MD5f9ecbec54ec1a5257571e871167197cf
SHA1318588377b978813f3f862229b1000bca9d19958
SHA2561238da4024d003476eb6510f56ea051343efeb0c1f0e375a3fd5c3684a1eefe1
SHA51227f104c4c59ddbd93357a99bdc79bf96e23504ca91a49c8a4739ac60d90330f6c706ca247517ba91a0a13de3818c17d79ce54383e47a07849f57069ad738f30b