Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe
-
Size
512KB
-
MD5
930c33ff94fabe0b19a313d5c36b1243
-
SHA1
bd5bcc8905ad2c876853bf434a90a860a69e0b8e
-
SHA256
f4725b05284b9ad3b6e6be5007795dce59b504d4c6c962cfef2955fac97f952b
-
SHA512
1aaf565607effb18fdf6bdd5f1548c81dda9f0e6d29a0499d466bba55cc6c4f2a86b24a63250bbf769144071397e3a2b169ce68c65252f8545ed00218b84ef72
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5b
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" tzygrsftxh.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tzygrsftxh.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tzygrsftxh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tzygrsftxh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tzygrsftxh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tzygrsftxh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" tzygrsftxh.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" tzygrsftxh.exe -
Executes dropped EXE 5 IoCs
pid Process 2644 tzygrsftxh.exe 2704 kcuugqdtriifhcv.exe 2632 rhkvnumskbnam.exe 2884 tjuqwohf.exe 2664 tjuqwohf.exe -
Loads dropped DLL 5 IoCs
pid Process 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 2644 tzygrsftxh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" tzygrsftxh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tzygrsftxh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tzygrsftxh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tzygrsftxh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" tzygrsftxh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tzygrsftxh.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\fcnvuaze = "tzygrsftxh.exe" kcuugqdtriifhcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ykoluwja = "kcuugqdtriifhcv.exe" kcuugqdtriifhcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "rhkvnumskbnam.exe" kcuugqdtriifhcv.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\o: tjuqwohf.exe File opened (read-only) \??\x: tjuqwohf.exe File opened (read-only) \??\m: tjuqwohf.exe File opened (read-only) \??\u: tjuqwohf.exe File opened (read-only) \??\j: tzygrsftxh.exe File opened (read-only) \??\m: tzygrsftxh.exe File opened (read-only) \??\s: tjuqwohf.exe File opened (read-only) \??\a: tjuqwohf.exe File opened (read-only) \??\e: tjuqwohf.exe File opened (read-only) \??\w: tjuqwohf.exe File opened (read-only) \??\n: tzygrsftxh.exe File opened (read-only) \??\a: tjuqwohf.exe File opened (read-only) \??\y: tjuqwohf.exe File opened (read-only) \??\g: tjuqwohf.exe File opened (read-only) \??\b: tjuqwohf.exe File opened (read-only) \??\t: tjuqwohf.exe File opened (read-only) \??\v: tjuqwohf.exe File opened (read-only) \??\z: tzygrsftxh.exe File opened (read-only) \??\u: tjuqwohf.exe File opened (read-only) \??\v: tjuqwohf.exe File opened (read-only) \??\b: tjuqwohf.exe File opened (read-only) \??\l: tjuqwohf.exe File opened (read-only) \??\h: tjuqwohf.exe File opened (read-only) \??\i: tjuqwohf.exe File opened (read-only) \??\o: tjuqwohf.exe File opened (read-only) \??\i: tzygrsftxh.exe File opened (read-only) \??\k: tzygrsftxh.exe File opened (read-only) \??\r: tjuqwohf.exe File opened (read-only) \??\j: tjuqwohf.exe File opened (read-only) \??\q: tzygrsftxh.exe File opened (read-only) \??\k: tjuqwohf.exe File opened (read-only) \??\y: tzygrsftxh.exe File opened (read-only) \??\m: tjuqwohf.exe File opened (read-only) \??\q: tjuqwohf.exe File opened (read-only) \??\u: tzygrsftxh.exe File opened (read-only) \??\w: tzygrsftxh.exe File opened (read-only) \??\g: tzygrsftxh.exe File opened (read-only) \??\r: tjuqwohf.exe File opened (read-only) \??\o: tzygrsftxh.exe File opened (read-only) \??\p: tzygrsftxh.exe File opened (read-only) \??\s: tzygrsftxh.exe File opened (read-only) \??\j: tjuqwohf.exe File opened (read-only) \??\p: tjuqwohf.exe File opened (read-only) \??\q: tjuqwohf.exe File opened (read-only) \??\e: tzygrsftxh.exe File opened (read-only) \??\l: tzygrsftxh.exe File opened (read-only) \??\v: tzygrsftxh.exe File opened (read-only) \??\n: tjuqwohf.exe File opened (read-only) \??\y: tjuqwohf.exe File opened (read-only) \??\a: tzygrsftxh.exe File opened (read-only) \??\g: tjuqwohf.exe File opened (read-only) \??\i: tjuqwohf.exe File opened (read-only) \??\x: tjuqwohf.exe File opened (read-only) \??\x: tzygrsftxh.exe File opened (read-only) \??\n: tjuqwohf.exe File opened (read-only) \??\l: tjuqwohf.exe File opened (read-only) \??\b: tzygrsftxh.exe File opened (read-only) \??\t: tzygrsftxh.exe File opened (read-only) \??\t: tjuqwohf.exe File opened (read-only) \??\h: tjuqwohf.exe File opened (read-only) \??\s: tjuqwohf.exe File opened (read-only) \??\e: tjuqwohf.exe File opened (read-only) \??\w: tjuqwohf.exe File opened (read-only) \??\z: tjuqwohf.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" tzygrsftxh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" tzygrsftxh.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1960-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x0036000000016c71-5.dat autoit_exe behavioral1/files/0x000f00000001226b-17.dat autoit_exe behavioral1/files/0x0008000000016d2c-36.dat autoit_exe behavioral1/files/0x0008000000016d1b-37.dat autoit_exe behavioral1/files/0x0002000000003d1e-49.dat autoit_exe behavioral1/files/0x0002000000003d20-56.dat autoit_exe behavioral1/files/0x000500000001933a-79.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\tzygrsftxh.exe 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\tzygrsftxh.exe 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe File created C:\Windows\SysWOW64\kcuugqdtriifhcv.exe 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll tzygrsftxh.exe File opened for modification C:\Windows\SysWOW64\kcuugqdtriifhcv.exe 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe File created C:\Windows\SysWOW64\tjuqwohf.exe 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\tjuqwohf.exe 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe File created C:\Windows\SysWOW64\rhkvnumskbnam.exe 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rhkvnumskbnam.exe 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe -
Drops file in Program Files directory 28 IoCs
description ioc Process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe tjuqwohf.exe File opened for modification C:\Program Files\ExitRequest.doc.exe tjuqwohf.exe File opened for modification \??\c:\Program Files\CompareHide.doc.exe tjuqwohf.exe File opened for modification C:\Program Files\CompareHide.nal tjuqwohf.exe File opened for modification C:\Program Files\ExitRequest.nal tjuqwohf.exe File created \??\c:\Program Files\CompareHide.doc.exe tjuqwohf.exe File opened for modification C:\Program Files\CompareHide.doc.exe tjuqwohf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe tjuqwohf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal tjuqwohf.exe File opened for modification \??\c:\Program Files\CompareHide.doc.exe tjuqwohf.exe File opened for modification \??\c:\Program Files\ExitRequest.doc.exe tjuqwohf.exe File opened for modification C:\Program Files\ExitRequest.nal tjuqwohf.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe tjuqwohf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe tjuqwohf.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe tjuqwohf.exe File opened for modification \??\c:\Program Files\ExitRequest.doc.exe tjuqwohf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe tjuqwohf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal tjuqwohf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe tjuqwohf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal tjuqwohf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal tjuqwohf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe tjuqwohf.exe File opened for modification C:\Program Files\CompareHide.doc.exe tjuqwohf.exe File opened for modification C:\Program Files\CompareHide.nal tjuqwohf.exe File opened for modification C:\Program Files\ExitRequest.doc.exe tjuqwohf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe tjuqwohf.exe File created \??\c:\Program Files\ExitRequest.doc.exe tjuqwohf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe tjuqwohf.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh tzygrsftxh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" tzygrsftxh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB0B120449238E352C9BADD329DD7B9" 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" tzygrsftxh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32472D0D9D2083586D3E77D370202DDA7C8664A8" 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc tzygrsftxh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" tzygrsftxh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2232 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 2644 tzygrsftxh.exe 2644 tzygrsftxh.exe 2644 tzygrsftxh.exe 2644 tzygrsftxh.exe 2644 tzygrsftxh.exe 2704 kcuugqdtriifhcv.exe 2704 kcuugqdtriifhcv.exe 2704 kcuugqdtriifhcv.exe 2704 kcuugqdtriifhcv.exe 2704 kcuugqdtriifhcv.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2884 tjuqwohf.exe 2884 tjuqwohf.exe 2884 tjuqwohf.exe 2884 tjuqwohf.exe 2664 tjuqwohf.exe 2664 tjuqwohf.exe 2664 tjuqwohf.exe 2664 tjuqwohf.exe 2704 kcuugqdtriifhcv.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2704 kcuugqdtriifhcv.exe 2704 kcuugqdtriifhcv.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2704 kcuugqdtriifhcv.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2704 kcuugqdtriifhcv.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2704 kcuugqdtriifhcv.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2704 kcuugqdtriifhcv.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2704 kcuugqdtriifhcv.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2704 kcuugqdtriifhcv.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2704 kcuugqdtriifhcv.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2704 kcuugqdtriifhcv.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2704 kcuugqdtriifhcv.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 2644 tzygrsftxh.exe 2644 tzygrsftxh.exe 2644 tzygrsftxh.exe 2704 kcuugqdtriifhcv.exe 2704 kcuugqdtriifhcv.exe 2704 kcuugqdtriifhcv.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2884 tjuqwohf.exe 2884 tjuqwohf.exe 2884 tjuqwohf.exe 2664 tjuqwohf.exe 2664 tjuqwohf.exe 2664 tjuqwohf.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 2644 tzygrsftxh.exe 2644 tzygrsftxh.exe 2644 tzygrsftxh.exe 2704 kcuugqdtriifhcv.exe 2704 kcuugqdtriifhcv.exe 2704 kcuugqdtriifhcv.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2632 rhkvnumskbnam.exe 2884 tjuqwohf.exe 2884 tjuqwohf.exe 2884 tjuqwohf.exe 2664 tjuqwohf.exe 2664 tjuqwohf.exe 2664 tjuqwohf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2232 WINWORD.EXE 2232 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2644 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 28 PID 1960 wrote to memory of 2644 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 28 PID 1960 wrote to memory of 2644 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 28 PID 1960 wrote to memory of 2644 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 28 PID 1960 wrote to memory of 2704 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 29 PID 1960 wrote to memory of 2704 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 29 PID 1960 wrote to memory of 2704 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 29 PID 1960 wrote to memory of 2704 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 29 PID 1960 wrote to memory of 2884 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2884 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2884 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2884 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2632 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2632 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2632 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2632 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 31 PID 2644 wrote to memory of 2664 2644 tzygrsftxh.exe 32 PID 2644 wrote to memory of 2664 2644 tzygrsftxh.exe 32 PID 2644 wrote to memory of 2664 2644 tzygrsftxh.exe 32 PID 2644 wrote to memory of 2664 2644 tzygrsftxh.exe 32 PID 1960 wrote to memory of 2232 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 33 PID 1960 wrote to memory of 2232 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 33 PID 1960 wrote to memory of 2232 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 33 PID 1960 wrote to memory of 2232 1960 930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe 33 PID 2232 wrote to memory of 1012 2232 WINWORD.EXE 37 PID 2232 wrote to memory of 1012 2232 WINWORD.EXE 37 PID 2232 wrote to memory of 1012 2232 WINWORD.EXE 37 PID 2232 wrote to memory of 1012 2232 WINWORD.EXE 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\930c33ff94fabe0b19a313d5c36b1243_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\tzygrsftxh.exetzygrsftxh.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\tjuqwohf.exeC:\Windows\system32\tjuqwohf.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2664
-
-
-
C:\Windows\SysWOW64\kcuugqdtriifhcv.exekcuugqdtriifhcv.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2704
-
-
C:\Windows\SysWOW64\tjuqwohf.exetjuqwohf.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2884
-
-
C:\Windows\SysWOW64\rhkvnumskbnam.exerhkvnumskbnam.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2632
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1012
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD51ad61dab747e7777ca7a6e4d865d92a7
SHA1809709c52a6c7933b4c9556fc25a33c0a1d9c4bb
SHA25672d0eff297e3a36e0c5f96de94edc745c75e5d1af2b819217aac32700f5545f9
SHA5122cfa2a243a3ea3bf8d2bafbb14d1b3f69a42d6067d40e28eee6be19fed0c74e6e56fd948c3b962a5ad6594a3b068d01bafcf054925370d355ac24484bc8f0c58
-
Filesize
512KB
MD5033c5d256fbb7bde92c94fd089c37234
SHA18104fa27387bd678a57d018e9ddcabcdfbee8d21
SHA256ab464f90c9bcafb17ba2fe72888adeefd606f49fca5d0ce7d4a5dad8863728c7
SHA51216052838c63834597292c4850eddc3944a9b1fdee3a92c92717e609d7f764d5bef0212fdca191fcbc14de75485a383d63c193acbd94574b35c24d17fda82105d
-
Filesize
512KB
MD533fda74bcbb62bea26ba189f3c841383
SHA182725ad8b1bb25df37f5e5c691f72ccd19ff9de1
SHA256a89440f99278d743b2b298219fe04cc66377966ea35b20104aa76110741bb37e
SHA5125f3cf042d27e2c4a59b826b082a27b676a6323c745cb1922aff78371c55515d65def72dae54170c0ddd61d238d826c1c21c9810c53a3a90e7582f3382e93e8b4
-
Filesize
20KB
MD55d271298edf9a23a6fb9e0771ecc59e5
SHA1ae5d0e1636e8424533fec8d68148e0de6de55172
SHA25646d01815bb94c3795ef043cdcaeb55e583cc70b09290234865633a2b1a0f24d2
SHA512157d546e61f0316d4ed57814a28f2264ea92c082b5ddd4fecaa2d6089ab3369f21c19a7f130b59329ca234424067927cc09f92d17d794b70ca521a6e869c3afe
-
Filesize
512KB
MD5fdf9776a7c61a3e087abf2ca1a87c4de
SHA181a8f2d1bd4014b0873363842284fc8d91d72c59
SHA256f30d5e01870f4dacbd16154ba3fc065357aa73569d080e0d371a5324252212c7
SHA5127c2fa4820bd904c064d2d1fafc6c57e9602afa5dba5c46a7ce9f761554298f30a96aa6e17c2663e73d8e4ead5037efc86f75d4fb517434dba3cac76bfe458f22
-
Filesize
512KB
MD5f7a29dfbb1d21e83318ca691097bba38
SHA16a56a1047ccc467a1e725c269be9be688069af1e
SHA2567d39486b59139ed74a551f604bf95d8a7aaf4e6a5dfc03c7860330b0c9d97028
SHA512a09c839a216f9f91b9834d810f6f096bdcb8649866409b2be44a10fc41ac29d470e800c828690878add5f948d912409fcfc463108f8615a41830b24b809f35ce
-
Filesize
512KB
MD5f797d3e0335f7c3210186782d5973d28
SHA195f2d516b159dd484bab53c2be6a48c7a7b09dcc
SHA256e9e40fcbbf91f0cb927cba4bc62ea62cd6e3309da1ec261536559149fdc5a490
SHA512937ebd0d13a317b45b51d634f284cc12e4cb24b8d1bb78929233fc730b53347f472cd6208789ab9cc5e465cc560e361621854b22432a8c88df31db5fc6dc0684
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD55c06c8dfa0e1c4574fe33ff0bfc91480
SHA128ea4cf5295044abdc6f9d30330db256dc9d8453
SHA2562253b1331a065f39f786768c3a9e15059b6fd8ed45fa001d1fa0f4cc46570054
SHA51229bafeaa2c9757dca57e826db5d357c0998d71c81a81deb421d73205adfe8261ac65885a509a7edab0022076855953e9b1982a70ad005125babc72a9d11fac6c