Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe
-
Size
512KB
-
MD5
b4393f6913e7f8028160a1c54a31d242
-
SHA1
07b1e01004fb8b24cf70364323d232eb7230bf77
-
SHA256
58651cefd761a07c796c083f3d68163b9378aeeeff6598be32fa02dd981eed30
-
SHA512
d4501c25744b26dd295c61bab84c262538f80d7591b20ca584253a2238411e14708011843f76fc286a94fea699d628f4b301b798fa704eb186e66a2e4b1a2bf4
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Y:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5x
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" sajekjcxif.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sajekjcxif.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sajekjcxif.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sajekjcxif.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sajekjcxif.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sajekjcxif.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sajekjcxif.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" sajekjcxif.exe -
Executes dropped EXE 5 IoCs
pid Process 2332 sajekjcxif.exe 2712 jixnvfzpnmvrhhz.exe 2656 pimaeblc.exe 1268 iwczkgdyitaps.exe 2836 pimaeblc.exe -
Loads dropped DLL 5 IoCs
pid Process 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 2332 sajekjcxif.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sajekjcxif.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sajekjcxif.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sajekjcxif.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" sajekjcxif.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sajekjcxif.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sajekjcxif.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zqmtmirn = "sajekjcxif.exe" jixnvfzpnmvrhhz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iuzyblhx = "jixnvfzpnmvrhhz.exe" jixnvfzpnmvrhhz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "iwczkgdyitaps.exe" jixnvfzpnmvrhhz.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\i: pimaeblc.exe File opened (read-only) \??\j: pimaeblc.exe File opened (read-only) \??\o: pimaeblc.exe File opened (read-only) \??\h: pimaeblc.exe File opened (read-only) \??\p: pimaeblc.exe File opened (read-only) \??\w: pimaeblc.exe File opened (read-only) \??\u: pimaeblc.exe File opened (read-only) \??\o: sajekjcxif.exe File opened (read-only) \??\v: sajekjcxif.exe File opened (read-only) \??\a: pimaeblc.exe File opened (read-only) \??\l: pimaeblc.exe File opened (read-only) \??\u: pimaeblc.exe File opened (read-only) \??\i: pimaeblc.exe File opened (read-only) \??\h: sajekjcxif.exe File opened (read-only) \??\m: sajekjcxif.exe File opened (read-only) \??\w: sajekjcxif.exe File opened (read-only) \??\k: pimaeblc.exe File opened (read-only) \??\x: pimaeblc.exe File opened (read-only) \??\g: sajekjcxif.exe File opened (read-only) \??\l: sajekjcxif.exe File opened (read-only) \??\t: sajekjcxif.exe File opened (read-only) \??\e: pimaeblc.exe File opened (read-only) \??\z: pimaeblc.exe File opened (read-only) \??\g: pimaeblc.exe File opened (read-only) \??\s: sajekjcxif.exe File opened (read-only) \??\y: sajekjcxif.exe File opened (read-only) \??\s: pimaeblc.exe File opened (read-only) \??\b: pimaeblc.exe File opened (read-only) \??\m: pimaeblc.exe File opened (read-only) \??\j: sajekjcxif.exe File opened (read-only) \??\h: pimaeblc.exe File opened (read-only) \??\t: pimaeblc.exe File opened (read-only) \??\q: pimaeblc.exe File opened (read-only) \??\k: sajekjcxif.exe File opened (read-only) \??\p: sajekjcxif.exe File opened (read-only) \??\n: pimaeblc.exe File opened (read-only) \??\j: pimaeblc.exe File opened (read-only) \??\o: pimaeblc.exe File opened (read-only) \??\p: pimaeblc.exe File opened (read-only) \??\v: pimaeblc.exe File opened (read-only) \??\r: pimaeblc.exe File opened (read-only) \??\v: pimaeblc.exe File opened (read-only) \??\b: sajekjcxif.exe File opened (read-only) \??\m: pimaeblc.exe File opened (read-only) \??\l: pimaeblc.exe File opened (read-only) \??\n: pimaeblc.exe File opened (read-only) \??\s: pimaeblc.exe File opened (read-only) \??\n: sajekjcxif.exe File opened (read-only) \??\a: pimaeblc.exe File opened (read-only) \??\e: pimaeblc.exe File opened (read-only) \??\a: sajekjcxif.exe File opened (read-only) \??\x: sajekjcxif.exe File opened (read-only) \??\r: pimaeblc.exe File opened (read-only) \??\x: pimaeblc.exe File opened (read-only) \??\y: pimaeblc.exe File opened (read-only) \??\k: pimaeblc.exe File opened (read-only) \??\i: sajekjcxif.exe File opened (read-only) \??\e: sajekjcxif.exe File opened (read-only) \??\u: sajekjcxif.exe File opened (read-only) \??\q: pimaeblc.exe File opened (read-only) \??\t: pimaeblc.exe File opened (read-only) \??\g: pimaeblc.exe File opened (read-only) \??\q: sajekjcxif.exe File opened (read-only) \??\b: pimaeblc.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" sajekjcxif.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" sajekjcxif.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1264-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x00350000000165d4-5.dat autoit_exe behavioral1/files/0x0010000000012272-17.dat autoit_exe behavioral1/files/0x0008000000016c67-28.dat autoit_exe behavioral1/files/0x0007000000016cde-37.dat autoit_exe behavioral1/files/0x00050000000187a2-71.dat autoit_exe behavioral1/files/0x0006000000018b73-77.dat autoit_exe behavioral1/files/0x0006000000018bc6-83.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\iwczkgdyitaps.exe b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\iwczkgdyitaps.exe b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe File created C:\Windows\SysWOW64\jixnvfzpnmvrhhz.exe b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\pimaeblc.exe b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\jixnvfzpnmvrhhz.exe b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe File created C:\Windows\SysWOW64\pimaeblc.exe b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll sajekjcxif.exe File created C:\Windows\SysWOW64\sajekjcxif.exe b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\sajekjcxif.exe b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe pimaeblc.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe pimaeblc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal pimaeblc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe pimaeblc.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe pimaeblc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe pimaeblc.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe pimaeblc.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe pimaeblc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal pimaeblc.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe pimaeblc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal pimaeblc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe pimaeblc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal pimaeblc.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe pimaeblc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe pimaeblc.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat sajekjcxif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf sajekjcxif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs sajekjcxif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc sajekjcxif.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E08068B4FE6922DCD27DD0A78B7B9164" b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg sajekjcxif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" sajekjcxif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" sajekjcxif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2548 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 2332 sajekjcxif.exe 2332 sajekjcxif.exe 2332 sajekjcxif.exe 2332 sajekjcxif.exe 2332 sajekjcxif.exe 2712 jixnvfzpnmvrhhz.exe 2712 jixnvfzpnmvrhhz.exe 2712 jixnvfzpnmvrhhz.exe 2712 jixnvfzpnmvrhhz.exe 2712 jixnvfzpnmvrhhz.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 2656 pimaeblc.exe 2656 pimaeblc.exe 2656 pimaeblc.exe 2656 pimaeblc.exe 2836 pimaeblc.exe 2836 pimaeblc.exe 2836 pimaeblc.exe 2836 pimaeblc.exe 2712 jixnvfzpnmvrhhz.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 2712 jixnvfzpnmvrhhz.exe 2712 jixnvfzpnmvrhhz.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 2712 jixnvfzpnmvrhhz.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 2712 jixnvfzpnmvrhhz.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 2712 jixnvfzpnmvrhhz.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 2712 jixnvfzpnmvrhhz.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 2712 jixnvfzpnmvrhhz.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 2712 jixnvfzpnmvrhhz.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 2712 jixnvfzpnmvrhhz.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 2712 jixnvfzpnmvrhhz.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 2712 jixnvfzpnmvrhhz.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 2332 sajekjcxif.exe 2332 sajekjcxif.exe 2332 sajekjcxif.exe 2712 jixnvfzpnmvrhhz.exe 2712 jixnvfzpnmvrhhz.exe 2712 jixnvfzpnmvrhhz.exe 2656 pimaeblc.exe 2656 pimaeblc.exe 2656 pimaeblc.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 2836 pimaeblc.exe 2836 pimaeblc.exe 2836 pimaeblc.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 2332 sajekjcxif.exe 2332 sajekjcxif.exe 2332 sajekjcxif.exe 2712 jixnvfzpnmvrhhz.exe 2712 jixnvfzpnmvrhhz.exe 2712 jixnvfzpnmvrhhz.exe 2656 pimaeblc.exe 2656 pimaeblc.exe 2656 pimaeblc.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 1268 iwczkgdyitaps.exe 2836 pimaeblc.exe 2836 pimaeblc.exe 2836 pimaeblc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2548 WINWORD.EXE 2548 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1264 wrote to memory of 2332 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 28 PID 1264 wrote to memory of 2332 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 28 PID 1264 wrote to memory of 2332 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 28 PID 1264 wrote to memory of 2332 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 28 PID 1264 wrote to memory of 2712 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 29 PID 1264 wrote to memory of 2712 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 29 PID 1264 wrote to memory of 2712 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 29 PID 1264 wrote to memory of 2712 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 29 PID 1264 wrote to memory of 2656 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 30 PID 1264 wrote to memory of 2656 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 30 PID 1264 wrote to memory of 2656 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 30 PID 1264 wrote to memory of 2656 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 30 PID 1264 wrote to memory of 1268 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 31 PID 1264 wrote to memory of 1268 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 31 PID 1264 wrote to memory of 1268 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 31 PID 1264 wrote to memory of 1268 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2836 2332 sajekjcxif.exe 32 PID 2332 wrote to memory of 2836 2332 sajekjcxif.exe 32 PID 2332 wrote to memory of 2836 2332 sajekjcxif.exe 32 PID 2332 wrote to memory of 2836 2332 sajekjcxif.exe 32 PID 1264 wrote to memory of 2548 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 33 PID 1264 wrote to memory of 2548 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 33 PID 1264 wrote to memory of 2548 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 33 PID 1264 wrote to memory of 2548 1264 b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe 33 PID 2548 wrote to memory of 1168 2548 WINWORD.EXE 37 PID 2548 wrote to memory of 1168 2548 WINWORD.EXE 37 PID 2548 wrote to memory of 1168 2548 WINWORD.EXE 37 PID 2548 wrote to memory of 1168 2548 WINWORD.EXE 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4393f6913e7f8028160a1c54a31d242_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\sajekjcxif.exesajekjcxif.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\pimaeblc.exeC:\Windows\system32\pimaeblc.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2836
-
-
-
C:\Windows\SysWOW64\jixnvfzpnmvrhhz.exejixnvfzpnmvrhhz.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2712
-
-
C:\Windows\SysWOW64\pimaeblc.exepimaeblc.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2656
-
-
C:\Windows\SysWOW64\iwczkgdyitaps.exeiwczkgdyitaps.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1268
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1168
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD58680cac462f1567a415c13980f7d6f33
SHA1d1aaadd6fbd88002f64769fe5c939bcadb6c3b9a
SHA256c26ac8f404f7a52a136d7b9333cc4b15b7adff6f4661c496e1263ef6250aa16f
SHA51251b92aa18d432acdbc683f3b497da5dba7f0aa85ced35ee41217ff76503d0a6481f2185db90b11f2db4c7370dd11b8b449e1938ec36db21f8341a5168d740b44
-
Filesize
20KB
MD57b36e3eec05ace7512ad780b0d76413a
SHA18aee5df3f3f0944c210af8a106618f8664fa5ced
SHA2565f3620715393365cf2d4b4a2f130633f8c4a49cb411e860daf2b13d8f5be8627
SHA51296571c1c473990aed4274521a5c5bb2c5c43961f25c6d7a86fde55e81eaada96e8517fd20a22d9f2448147c9c8a9b2b723dd00fade34bf77766286832137b14e
-
Filesize
512KB
MD5bb1e6fae3972488ab5c122d6214327bb
SHA1aa7e0fdcb9bcc9692077bced1522a997d331ab6f
SHA256be3f34bd51fd294f4d5118975acab7264012144d1093a2812a1e83b6409182ac
SHA512ad4c6e6e490e0fb3d92d3423d4300f119b1969a431ed38dceeffe5e55b7b69de2177bc07ae854caeed46b882566c2ca6a747e21043e33bb6fe187d09d07126da
-
Filesize
512KB
MD5f8d1795a82cf5f7a5776a91ba9cb3541
SHA1f3d46d8228403cc0440f170683957cac930a0975
SHA2565c485c413498a23cf1e9f64453c35a631edc5dd5267138de07ba40f533870899
SHA5127ab8155fdae25ee08f96116d217c29005fef1e70ddc1de61fa00749a85ff11e4707f4376eeb85d9c96886399110b87d2bc8cd1de0aa46baad1ca6afd87789f8c
-
Filesize
512KB
MD50ebe341b2f4101c23a4f66ce01f4250f
SHA143f05e23144b944041db657371ae8ef44a8de8e8
SHA2560285de83e4da02f423c1966d7a099b7ab494f08e709b0429061bea4854b80dce
SHA5123e14a5dbffe11ac826979c0b8eccdb2fec2ef28fb13ca19f5ffbe819f92601299e21be161a603b5eee715337f76ec509bbe40f46f7f1cfb42854dd48d7c3f77b
-
Filesize
512KB
MD5315916c5a354736486e2ef384d30481d
SHA1810ae8ff94e4af52274ddeccc44a0f3a190a7a41
SHA256e7130ef2f3463723008e773cd3384e1ecce71404ada4a14c00839dc07a6e3f1f
SHA512fae02ff3831bb66600eb2461e9e3f09691747438b37e311de17354904f3051bf57dfcadb035f308ddc79a89f7d9c2e2e21bf049c2196855601c8d5859061b9d1
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5190fae6b8fb53d89e850bc2093718ff6
SHA1ec9a779a66183754f44c1f02fde909b0bdf15c36
SHA256e18f6151ebaf46e3904c27ee4c82c6ffe3cd7c91ff48922c08f9cbf2c85a22d8
SHA5125c78fb6b93f816950a059dbdf44c134e001f0e3b4362d01c4eddba6385895cf9a2bd69daf0321e69d1fb945f52ac16d01d5d2e22d4d9acc2b208a8e53b23594d
-
Filesize
512KB
MD5ede19bbd44f0263a7c8649f893c9b3c1
SHA183d6acf8c519520370245f234bb46f86d4aa6c14
SHA256f240e16cd40c1b44438802874ddccf3cba649f7829662d3f9c8b6b74bbc5073d
SHA512912d6c330b96bfb14415790dae6b54f61c3d84a187225b1b8c846ef9a0e08af4e00ef3c4616fc41a73bb4b9aec93579fd44faf893cd65dea77c74cc65c24ed64