Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe
-
Size
512KB
-
MD5
6bc7146d386e26ce3ce7519cddf3938b
-
SHA1
81866157e77f2df4840f23a2f14a38cb85574e1f
-
SHA256
ea38bfc76603bf0d69cff913671ebfce4fcebfb9574e99754dcf017427360155
-
SHA512
89b090580e532c508682ea9acfac942d2d06a90a984614ad4ad7743b7ffc995c712231c62d14424eae9d2b6fafcbacc5302e9b27438fd22762fa6ebf3e4e9b37
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj61:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5O
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" evgyhclilr.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" evgyhclilr.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" evgyhclilr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" evgyhclilr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" evgyhclilr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" evgyhclilr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" evgyhclilr.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" evgyhclilr.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 5 IoCs
pid Process 2128 evgyhclilr.exe 2352 vzycdemexuehhfv.exe 2744 vqgjloxz.exe 2740 lleeqqxiltrup.exe 2560 vqgjloxz.exe -
Loads dropped DLL 5 IoCs
pid Process 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2128 evgyhclilr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" evgyhclilr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" evgyhclilr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" evgyhclilr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" evgyhclilr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" evgyhclilr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" evgyhclilr.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oluzctsh = "evgyhclilr.exe" vzycdemexuehhfv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mvshnqqs = "vzycdemexuehhfv.exe" vzycdemexuehhfv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "lleeqqxiltrup.exe" vzycdemexuehhfv.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: vqgjloxz.exe File opened (read-only) \??\k: vqgjloxz.exe File opened (read-only) \??\j: vqgjloxz.exe File opened (read-only) \??\k: vqgjloxz.exe File opened (read-only) \??\w: evgyhclilr.exe File opened (read-only) \??\z: vqgjloxz.exe File opened (read-only) \??\n: evgyhclilr.exe File opened (read-only) \??\g: evgyhclilr.exe File opened (read-only) \??\k: evgyhclilr.exe File opened (read-only) \??\e: vqgjloxz.exe File opened (read-only) \??\t: vqgjloxz.exe File opened (read-only) \??\n: vqgjloxz.exe File opened (read-only) \??\t: vqgjloxz.exe File opened (read-only) \??\x: vqgjloxz.exe File opened (read-only) \??\l: vqgjloxz.exe File opened (read-only) \??\p: vqgjloxz.exe File opened (read-only) \??\o: vqgjloxz.exe File opened (read-only) \??\h: evgyhclilr.exe File opened (read-only) \??\i: vqgjloxz.exe File opened (read-only) \??\n: vqgjloxz.exe File opened (read-only) \??\r: vqgjloxz.exe File opened (read-only) \??\t: evgyhclilr.exe File opened (read-only) \??\w: vqgjloxz.exe File opened (read-only) \??\g: vqgjloxz.exe File opened (read-only) \??\i: vqgjloxz.exe File opened (read-only) \??\j: vqgjloxz.exe File opened (read-only) \??\z: evgyhclilr.exe File opened (read-only) \??\g: vqgjloxz.exe File opened (read-only) \??\a: evgyhclilr.exe File opened (read-only) \??\s: evgyhclilr.exe File opened (read-only) \??\u: evgyhclilr.exe File opened (read-only) \??\s: vqgjloxz.exe File opened (read-only) \??\m: vqgjloxz.exe File opened (read-only) \??\y: vqgjloxz.exe File opened (read-only) \??\a: vqgjloxz.exe File opened (read-only) \??\v: vqgjloxz.exe File opened (read-only) \??\y: vqgjloxz.exe File opened (read-only) \??\z: vqgjloxz.exe File opened (read-only) \??\b: vqgjloxz.exe File opened (read-only) \??\l: evgyhclilr.exe File opened (read-only) \??\m: evgyhclilr.exe File opened (read-only) \??\p: evgyhclilr.exe File opened (read-only) \??\q: evgyhclilr.exe File opened (read-only) \??\l: vqgjloxz.exe File opened (read-only) \??\h: vqgjloxz.exe File opened (read-only) \??\i: evgyhclilr.exe File opened (read-only) \??\r: evgyhclilr.exe File opened (read-only) \??\e: vqgjloxz.exe File opened (read-only) \??\o: vqgjloxz.exe File opened (read-only) \??\o: evgyhclilr.exe File opened (read-only) \??\m: vqgjloxz.exe File opened (read-only) \??\q: vqgjloxz.exe File opened (read-only) \??\b: vqgjloxz.exe File opened (read-only) \??\b: evgyhclilr.exe File opened (read-only) \??\e: evgyhclilr.exe File opened (read-only) \??\j: evgyhclilr.exe File opened (read-only) \??\v: evgyhclilr.exe File opened (read-only) \??\y: evgyhclilr.exe File opened (read-only) \??\p: vqgjloxz.exe File opened (read-only) \??\r: vqgjloxz.exe File opened (read-only) \??\a: vqgjloxz.exe File opened (read-only) \??\s: vqgjloxz.exe File opened (read-only) \??\u: vqgjloxz.exe File opened (read-only) \??\w: vqgjloxz.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" evgyhclilr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" evgyhclilr.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2960-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x0036000000015c7f-5.dat autoit_exe behavioral1/files/0x000e00000001226b-17.dat autoit_exe behavioral1/files/0x0008000000015cc7-28.dat autoit_exe behavioral1/files/0x0007000000015ce3-34.dat autoit_exe behavioral1/files/0x0006000000016ce7-71.dat autoit_exe behavioral1/files/0x0006000000016d1b-75.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vzycdemexuehhfv.exe 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe File created C:\Windows\SysWOW64\vqgjloxz.exe 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vqgjloxz.exe 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe File created C:\Windows\SysWOW64\lleeqqxiltrup.exe 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll evgyhclilr.exe File created C:\Windows\SysWOW64\vzycdemexuehhfv.exe 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\evgyhclilr.exe 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lleeqqxiltrup.exe 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe File created C:\Windows\SysWOW64\evgyhclilr.exe 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vqgjloxz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vqgjloxz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal vqgjloxz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal vqgjloxz.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vqgjloxz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vqgjloxz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vqgjloxz.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vqgjloxz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal vqgjloxz.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vqgjloxz.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vqgjloxz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal vqgjloxz.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vqgjloxz.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vqgjloxz.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat evgyhclilr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184DC70C14E1DAB3B8CA7FE5EC9F37CA" 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB6B02B479039E853B9BADD339DD4CC" 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" evgyhclilr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc evgyhclilr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" evgyhclilr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33462D7E9C5582566A3476D370532CD77D8265DB" 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFDFF8B485C856D9040D65F7E9DBDE4E147584366456244D6EB" 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1980 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2128 evgyhclilr.exe 2128 evgyhclilr.exe 2128 evgyhclilr.exe 2128 evgyhclilr.exe 2128 evgyhclilr.exe 2352 vzycdemexuehhfv.exe 2352 vzycdemexuehhfv.exe 2352 vzycdemexuehhfv.exe 2352 vzycdemexuehhfv.exe 2352 vzycdemexuehhfv.exe 2744 vqgjloxz.exe 2744 vqgjloxz.exe 2744 vqgjloxz.exe 2744 vqgjloxz.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2560 vqgjloxz.exe 2560 vqgjloxz.exe 2560 vqgjloxz.exe 2560 vqgjloxz.exe 2352 vzycdemexuehhfv.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2352 vzycdemexuehhfv.exe 2352 vzycdemexuehhfv.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2352 vzycdemexuehhfv.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2352 vzycdemexuehhfv.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2352 vzycdemexuehhfv.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2352 vzycdemexuehhfv.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2352 vzycdemexuehhfv.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2352 vzycdemexuehhfv.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2352 vzycdemexuehhfv.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2352 vzycdemexuehhfv.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2352 vzycdemexuehhfv.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2128 evgyhclilr.exe 2128 evgyhclilr.exe 2128 evgyhclilr.exe 2352 vzycdemexuehhfv.exe 2352 vzycdemexuehhfv.exe 2352 vzycdemexuehhfv.exe 2744 vqgjloxz.exe 2740 lleeqqxiltrup.exe 2744 vqgjloxz.exe 2744 vqgjloxz.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 2560 vqgjloxz.exe 2560 vqgjloxz.exe 2560 vqgjloxz.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 2128 evgyhclilr.exe 2128 evgyhclilr.exe 2128 evgyhclilr.exe 2352 vzycdemexuehhfv.exe 2352 vzycdemexuehhfv.exe 2352 vzycdemexuehhfv.exe 2744 vqgjloxz.exe 2740 lleeqqxiltrup.exe 2744 vqgjloxz.exe 2744 vqgjloxz.exe 2740 lleeqqxiltrup.exe 2740 lleeqqxiltrup.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1980 WINWORD.EXE 1980 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2128 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2128 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2128 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2128 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2352 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 29 PID 2960 wrote to memory of 2352 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 29 PID 2960 wrote to memory of 2352 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 29 PID 2960 wrote to memory of 2352 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 29 PID 2960 wrote to memory of 2744 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 30 PID 2960 wrote to memory of 2744 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 30 PID 2960 wrote to memory of 2744 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 30 PID 2960 wrote to memory of 2744 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 30 PID 2960 wrote to memory of 2740 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 31 PID 2960 wrote to memory of 2740 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 31 PID 2960 wrote to memory of 2740 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 31 PID 2960 wrote to memory of 2740 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 31 PID 2128 wrote to memory of 2560 2128 evgyhclilr.exe 32 PID 2128 wrote to memory of 2560 2128 evgyhclilr.exe 32 PID 2128 wrote to memory of 2560 2128 evgyhclilr.exe 32 PID 2128 wrote to memory of 2560 2128 evgyhclilr.exe 32 PID 2960 wrote to memory of 1980 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 33 PID 2960 wrote to memory of 1980 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 33 PID 2960 wrote to memory of 1980 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 33 PID 2960 wrote to memory of 1980 2960 6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe 33 PID 1980 wrote to memory of 2088 1980 WINWORD.EXE 38 PID 1980 wrote to memory of 2088 1980 WINWORD.EXE 38 PID 1980 wrote to memory of 2088 1980 WINWORD.EXE 38 PID 1980 wrote to memory of 2088 1980 WINWORD.EXE 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6bc7146d386e26ce3ce7519cddf3938b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\evgyhclilr.exeevgyhclilr.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\vqgjloxz.exeC:\Windows\system32\vqgjloxz.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2560
-
-
-
C:\Windows\SysWOW64\vzycdemexuehhfv.exevzycdemexuehhfv.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2352
-
-
C:\Windows\SysWOW64\vqgjloxz.exevqgjloxz.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2744
-
-
C:\Windows\SysWOW64\lleeqqxiltrup.exelleeqqxiltrup.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2740
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2088
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1684
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD59b9fb6971b4dd5e95ee341306872d243
SHA1954cfd5b4d738abe23574183e0a3664f102cae85
SHA25688efef9d26c1d7c3f8e193588b798180c880fa8db421dba168dfb7b0a3f978be
SHA5129f966901f881d12c682ff6cfc4d6d426e28cc183b4c67009ec1dad06c617c919e8b0b7becf9be499b31ac60aa015d0047b3fd844bc640839593220fe0af20b34
-
Filesize
512KB
MD502e93cb5a2173f44376705cafefeb330
SHA1aee623072928242f95f6c510e91941a50fe6a996
SHA2569357bc00cfed444e5beb6b59b36b741d4ae6e8a23658450c2268c392d5962c55
SHA51274ee77a0e83a4fa5bbbcdf8bfb8cb1df1d6948bbc8c0a0f3444885c1d2d7cc2683320cfa14b42d0d8e79dad18a39919e95654670b43ee1b709759efc638976b3
-
Filesize
512KB
MD51572811b4e59b977a8a8dade10f1752c
SHA1bd7bd9dc42c2393809287ead22bc14d198d7f8c4
SHA256a71eb35753509c94ce6cde1d921a166284d3206e344ca18db534afc4da8a8f2c
SHA512f12d605152744617e89ddf4dbb8c1bbde4d66228df3cc2eecafbb993ba97a5cc0adaf91e663bd32219c45df79189d9bd551d69d0c886223e04ff7dacdd3a4108
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD50883cddf8393ee66317e1d49a03fb7c1
SHA1fc7d6bcc3948742a135e9c76e2d8960ef9b4a659
SHA256b230b944f0ba29ffdcf88b82924bfc3c088d6daeed3a30baf50a4a11e5cadb31
SHA512aea22fb000d964d5988fdf9ee9af6915886abcb185e558f493f591c4f4b5477b0d68b90d325254b07c50b95081526233efa813db1d7095ba0b7acb952ade884f
-
Filesize
512KB
MD57ba2cd5be7a3b1713a7654093746b1d5
SHA12282713d6fc47d61c62710e3f741000a46af836a
SHA2566517c8822ab15740c095042bb26576d8a01dc635ccfe87d0f830a8313528900f
SHA512db0c8991a942908b6e85dee956219041ddb074f1caf6b439608a66f8918668538717e25b63b8e59aea40f9dd880cb49b4568df664167f1970373962cbc1bc38c
-
Filesize
512KB
MD54b0770f003f732a2f87f2073636fdf30
SHA1d813d6eab05a7308c79e75f015e0f2f80c9917ac
SHA256fee1e9f806db6524184da41ae791fdd6c6c1b1084bf8f4fbf059fb425d2a9dd2
SHA51277cb3768705b023fea7cace843eebe572133eb15ed90e4bfa1c42235284ad4403d10d259491ada4e2b3e6a69a9493bf6f9e09de2a0757da51c20c98a76b1bab7