Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe
-
Size
512KB
-
MD5
9bdb6e7a9c1c6f4547b76ee2b0c6f665
-
SHA1
14487e1f023d30de31b7b90b033e5f501c7ab69d
-
SHA256
eda405e15c812864f5f761e97a84f42403c96501b907715258702f802ed28a21
-
SHA512
fa7fae7f6c7be54b355aa3642a7d827a0dfe7791ad112bc185e9d3b9ba35cddbd5cce543a0ad859a84e6f613b95951e2122a030724ad00be7db2668ce2d0e54d
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6F:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5e
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" msieaqvfes.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" msieaqvfes.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" msieaqvfes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msieaqvfes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" msieaqvfes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" msieaqvfes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msieaqvfes.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msieaqvfes.exe -
Executes dropped EXE 5 IoCs
pid Process 2156 msieaqvfes.exe 3060 fmymdlvqkalljqf.exe 2636 ofzpabow.exe 2592 vrfwtujoyqqbc.exe 2464 ofzpabow.exe -
Loads dropped DLL 5 IoCs
pid Process 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2156 msieaqvfes.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msieaqvfes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" msieaqvfes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msieaqvfes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" msieaqvfes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" msieaqvfes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" msieaqvfes.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ikkqcusm = "msieaqvfes.exe" fmymdlvqkalljqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\okzahzms = "fmymdlvqkalljqf.exe" fmymdlvqkalljqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "vrfwtujoyqqbc.exe" fmymdlvqkalljqf.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\r: ofzpabow.exe File opened (read-only) \??\t: msieaqvfes.exe File opened (read-only) \??\y: msieaqvfes.exe File opened (read-only) \??\a: ofzpabow.exe File opened (read-only) \??\i: ofzpabow.exe File opened (read-only) \??\u: ofzpabow.exe File opened (read-only) \??\y: ofzpabow.exe File opened (read-only) \??\q: ofzpabow.exe File opened (read-only) \??\r: msieaqvfes.exe File opened (read-only) \??\b: ofzpabow.exe File opened (read-only) \??\k: ofzpabow.exe File opened (read-only) \??\o: ofzpabow.exe File opened (read-only) \??\q: ofzpabow.exe File opened (read-only) \??\t: ofzpabow.exe File opened (read-only) \??\v: ofzpabow.exe File opened (read-only) \??\w: ofzpabow.exe File opened (read-only) \??\e: msieaqvfes.exe File opened (read-only) \??\h: msieaqvfes.exe File opened (read-only) \??\l: ofzpabow.exe File opened (read-only) \??\j: msieaqvfes.exe File opened (read-only) \??\u: msieaqvfes.exe File opened (read-only) \??\m: ofzpabow.exe File opened (read-only) \??\w: ofzpabow.exe File opened (read-only) \??\j: ofzpabow.exe File opened (read-only) \??\i: msieaqvfes.exe File opened (read-only) \??\p: msieaqvfes.exe File opened (read-only) \??\w: msieaqvfes.exe File opened (read-only) \??\k: ofzpabow.exe File opened (read-only) \??\p: ofzpabow.exe File opened (read-only) \??\t: ofzpabow.exe File opened (read-only) \??\q: msieaqvfes.exe File opened (read-only) \??\j: ofzpabow.exe File opened (read-only) \??\o: ofzpabow.exe File opened (read-only) \??\x: ofzpabow.exe File opened (read-only) \??\a: msieaqvfes.exe File opened (read-only) \??\k: msieaqvfes.exe File opened (read-only) \??\z: msieaqvfes.exe File opened (read-only) \??\n: ofzpabow.exe File opened (read-only) \??\p: ofzpabow.exe File opened (read-only) \??\z: ofzpabow.exe File opened (read-only) \??\m: ofzpabow.exe File opened (read-only) \??\m: msieaqvfes.exe File opened (read-only) \??\s: msieaqvfes.exe File opened (read-only) \??\x: msieaqvfes.exe File opened (read-only) \??\x: ofzpabow.exe File opened (read-only) \??\b: ofzpabow.exe File opened (read-only) \??\s: ofzpabow.exe File opened (read-only) \??\v: ofzpabow.exe File opened (read-only) \??\y: ofzpabow.exe File opened (read-only) \??\l: msieaqvfes.exe File opened (read-only) \??\s: ofzpabow.exe File opened (read-only) \??\i: ofzpabow.exe File opened (read-only) \??\h: ofzpabow.exe File opened (read-only) \??\g: msieaqvfes.exe File opened (read-only) \??\o: msieaqvfes.exe File opened (read-only) \??\v: msieaqvfes.exe File opened (read-only) \??\g: ofzpabow.exe File opened (read-only) \??\h: ofzpabow.exe File opened (read-only) \??\l: ofzpabow.exe File opened (read-only) \??\g: ofzpabow.exe File opened (read-only) \??\b: msieaqvfes.exe File opened (read-only) \??\r: ofzpabow.exe File opened (read-only) \??\n: msieaqvfes.exe File opened (read-only) \??\e: ofzpabow.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" msieaqvfes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" msieaqvfes.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2844-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x003400000001471d-5.dat autoit_exe behavioral1/files/0x000c0000000144e4-17.dat autoit_exe behavioral1/files/0x0007000000014b27-30.dat autoit_exe behavioral1/files/0x0007000000014b63-33.dat autoit_exe behavioral1/files/0x0006000000015fe9-75.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\msieaqvfes.exe 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\fmymdlvqkalljqf.exe 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msieaqvfes.exe 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe File created C:\Windows\SysWOW64\fmymdlvqkalljqf.exe 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe File created C:\Windows\SysWOW64\ofzpabow.exe 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ofzpabow.exe 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe File created C:\Windows\SysWOW64\vrfwtujoyqqbc.exe 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vrfwtujoyqqbc.exe 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll msieaqvfes.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal ofzpabow.exe File opened for modification C:\Program Files\UndoPublish.nal ofzpabow.exe File opened for modification C:\Program Files\UndoPublish.nal ofzpabow.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal ofzpabow.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ofzpabow.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ofzpabow.exe File opened for modification C:\Program Files\UndoPublish.doc.exe ofzpabow.exe File opened for modification \??\c:\Program Files\UndoPublish.doc.exe ofzpabow.exe File opened for modification \??\c:\Program Files\UndoPublish.doc.exe ofzpabow.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ofzpabow.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ofzpabow.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal ofzpabow.exe File created \??\c:\Program Files\UndoPublish.doc.exe ofzpabow.exe File opened for modification C:\Program Files\UndoPublish.doc.exe ofzpabow.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ofzpabow.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal ofzpabow.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ofzpabow.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ofzpabow.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ofzpabow.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ofzpabow.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ofzpabow.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" msieaqvfes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" msieaqvfes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8CFCFC4826826F903CD65B7DE6BDE2E640584666466345D7EE" 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7816BC5FE6F22D9D273D1D28B7A9167" 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" msieaqvfes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184FC67A1491DAC5B8CC7F97ED9337CA" 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "334E2D7B9C2083236A4677D177202CD87DF465DA" 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf msieaqvfes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" msieaqvfes.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2552 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2156 msieaqvfes.exe 2156 msieaqvfes.exe 2156 msieaqvfes.exe 2156 msieaqvfes.exe 2156 msieaqvfes.exe 3060 fmymdlvqkalljqf.exe 3060 fmymdlvqkalljqf.exe 3060 fmymdlvqkalljqf.exe 3060 fmymdlvqkalljqf.exe 3060 fmymdlvqkalljqf.exe 2636 ofzpabow.exe 2636 ofzpabow.exe 2636 ofzpabow.exe 2636 ofzpabow.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 2464 ofzpabow.exe 2464 ofzpabow.exe 2464 ofzpabow.exe 2464 ofzpabow.exe 3060 fmymdlvqkalljqf.exe 3060 fmymdlvqkalljqf.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 3060 fmymdlvqkalljqf.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 3060 fmymdlvqkalljqf.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 3060 fmymdlvqkalljqf.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 3060 fmymdlvqkalljqf.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 3060 fmymdlvqkalljqf.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 3060 fmymdlvqkalljqf.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 3060 fmymdlvqkalljqf.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 3060 fmymdlvqkalljqf.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 3060 fmymdlvqkalljqf.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 3060 fmymdlvqkalljqf.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2156 msieaqvfes.exe 2156 msieaqvfes.exe 2156 msieaqvfes.exe 3060 fmymdlvqkalljqf.exe 3060 fmymdlvqkalljqf.exe 3060 fmymdlvqkalljqf.exe 2636 ofzpabow.exe 2636 ofzpabow.exe 2636 ofzpabow.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 2464 ofzpabow.exe 2464 ofzpabow.exe 2464 ofzpabow.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 2156 msieaqvfes.exe 2156 msieaqvfes.exe 2156 msieaqvfes.exe 3060 fmymdlvqkalljqf.exe 3060 fmymdlvqkalljqf.exe 3060 fmymdlvqkalljqf.exe 2636 ofzpabow.exe 2636 ofzpabow.exe 2636 ofzpabow.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 2592 vrfwtujoyqqbc.exe 2464 ofzpabow.exe 2464 ofzpabow.exe 2464 ofzpabow.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2552 WINWORD.EXE 2552 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2156 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 28 PID 2844 wrote to memory of 2156 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 28 PID 2844 wrote to memory of 2156 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 28 PID 2844 wrote to memory of 2156 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 28 PID 2844 wrote to memory of 3060 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 29 PID 2844 wrote to memory of 3060 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 29 PID 2844 wrote to memory of 3060 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 29 PID 2844 wrote to memory of 3060 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 29 PID 2844 wrote to memory of 2636 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2636 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2636 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2636 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2592 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 31 PID 2844 wrote to memory of 2592 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 31 PID 2844 wrote to memory of 2592 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 31 PID 2844 wrote to memory of 2592 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 31 PID 2156 wrote to memory of 2464 2156 msieaqvfes.exe 32 PID 2156 wrote to memory of 2464 2156 msieaqvfes.exe 32 PID 2156 wrote to memory of 2464 2156 msieaqvfes.exe 32 PID 2156 wrote to memory of 2464 2156 msieaqvfes.exe 32 PID 2844 wrote to memory of 2552 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 33 PID 2844 wrote to memory of 2552 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 33 PID 2844 wrote to memory of 2552 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 33 PID 2844 wrote to memory of 2552 2844 9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe 33 PID 2552 wrote to memory of 1448 2552 WINWORD.EXE 36 PID 2552 wrote to memory of 1448 2552 WINWORD.EXE 36 PID 2552 wrote to memory of 1448 2552 WINWORD.EXE 36 PID 2552 wrote to memory of 1448 2552 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9bdb6e7a9c1c6f4547b76ee2b0c6f665_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\msieaqvfes.exemsieaqvfes.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\ofzpabow.exeC:\Windows\system32\ofzpabow.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2464
-
-
-
C:\Windows\SysWOW64\fmymdlvqkalljqf.exefmymdlvqkalljqf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3060
-
-
C:\Windows\SysWOW64\ofzpabow.exeofzpabow.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2636
-
-
C:\Windows\SysWOW64\vrfwtujoyqqbc.exevrfwtujoyqqbc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2592
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1448
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5f5751ef2413651c7b2bd02d7727d7a0a
SHA13a4bb034da893204ebb58ee9ada841727781e4cc
SHA256bac4c8deaf582df519b06634fa29978083acdc15c5899093753ebb3e5669d83d
SHA5122d17ac3cadbf545800cccb8698374fb78cd63feaa384ca36377168c807991a1265a5e898e1384fb1bc5ebc25bf7c9eabc8489cdd89b0b5d4e44a86796a35d314
-
Filesize
20KB
MD5a88acbd4148f917b518a4570963700c3
SHA105fe20af0f2f37e553602b3e2e2d6b548e0044da
SHA2569eb9b41036ab87c6841d7f7d4bf2b8ffbdbdd445a6e0b1b9e88a2d4086ceb5cd
SHA512de9e665c2da930966e3df4a252b88e23c4c5a1c335bfcc089f00fdba311a7317784805a02e1daf04e2df6d6759c8a1396308fc761a0c035bd9d49776e8ffb47e
-
Filesize
512KB
MD5d5b2d2d65e1f3ff6cba71e3e3ecd24ba
SHA1fee9f430a4944c9418a23298182bc1cf787a3612
SHA25620cfc653b3e834e90e8bffa2f0f716330c0a85490014f05e30f685d379da3575
SHA512bdf73a969c5012eb362548c70db985b115fc1119ba45e8f032378d9a3bd2dab9fd1e883b680e87b0adb266eab0e4520551509dea4efcd986e369dc7db576cbc0
-
Filesize
512KB
MD5ed865b50543b9347b8b95786028c9e8a
SHA197627d5bb371f008006003bad30f93f57aca4d08
SHA256918ead655761c7f22068c635f768f4f678cbf1e39d10cb681f63bc1a86907bdf
SHA512035867709cb79f04de4192f62e9aa8ccad2380e4fbaa48ff61d8247af488e67021942377c75e960d0ca8d54d86b67f7a0acf8234408b335476f86bb097311207
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5a2d09f62ef0cc092715daa31e0ca700c
SHA174a2d0d2ed36304740bab26ac093eb3bc827f71a
SHA2564fb69d0bc10d841b645a2c05f206091e0aadbdfc2c62114a9502fd010bf0d415
SHA5125d7674d3875e24b124d550f23c3c5f4276e9abe1d1219841b034d6c23ee2b8b09bc12b86b1b853f042daaf815049d47233424299533178fbb2b7f6886ed7d082
-
Filesize
512KB
MD5db612a23731d015e325aa4bccdfd5830
SHA17cf579b959ce2c25dcc90dca3058c9e0b73f4b69
SHA2567ccb1629bde8e00d037d78a78b990dfb622121f04b4f2aff2b01d32583bc6951
SHA512b5777b3bbab37fbd17275c83dcf4e96b991b3d4736f617c107b684cdb1e17c14b8d2094d0ae71381c484d92d0bd066a9665a2ca9a54fc848c8f7a8415f0eec99