Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 04:00
Static task
static1
Behavioral task
behavioral1
Sample
69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe
-
Size
215KB
-
MD5
69aa03bcd10948392b001bb9ae368a92
-
SHA1
12741edebdd6accd7e309da808083a60113d8dad
-
SHA256
021cdf3bf0bbd3e078cf45cbae784ac1056bfe8e7fc5ff8c5d446b9a45c0bb63
-
SHA512
abf0752de3827af70f75ba5c74fa77b077659e55e4a3478cc2e8b8aedc945a61097b813649655ad2f76c40e982acba37832bc4820ad8d3e5a498e59dd3eeba9c
-
SSDEEP
3072:myAaQqe90u5DdXJP45JXWpZ1iFTsQJwvfLrZAPSGg2HTnZKyOr25PqU4DMKgLhfo:myAge9RNOXAZ1iFTsF91A064D205kuL1
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.xmfir0.win/709A-7000-33AB-006D-F31B
http://cerberhhyed5frqa.gkfit9.win/709A-7000-33AB-006D-F31B
http://cerberhhyed5frqa.305iot.win/709A-7000-33AB-006D-F31B
http://cerberhhyed5frqa.dkrti5.win/709A-7000-33AB-006D-F31B
http://cerberhhyed5frqa.cneo59.win/709A-7000-33AB-006D-F31B
http://cerberhhyed5frqa.onion/709A-7000-33AB-006D-F31B
Extracted
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16388) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1504 bcdedit.exe 2396 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\dnscacheugc.exe\"" 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\dnscacheugc.exe\"" dnscacheugc.exe -
Deletes itself 1 IoCs
pid Process 2444 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\dnscacheugc.lnk 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\dnscacheugc.lnk dnscacheugc.exe -
Executes dropped EXE 2 IoCs
pid Process 2968 dnscacheugc.exe 2216 dnscacheugc.exe -
Loads dropped DLL 6 IoCs
pid Process 1632 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 1632 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 2620 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 2968 dnscacheugc.exe 2968 dnscacheugc.exe 2216 dnscacheugc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\dnscacheugc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\dnscacheugc.exe\"" 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\dnscacheugc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\dnscacheugc.exe\"" 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\dnscacheugc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\dnscacheugc.exe\"" dnscacheugc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\dnscacheugc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\dnscacheugc.exe\"" dnscacheugc.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dnscacheugc.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp9EDE.bmp" dnscacheugc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1632 set thread context of 2620 1632 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 28 PID 2968 set thread context of 2216 2968 dnscacheugc.exe 35 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\monophthong dnscacheugc.exe File opened for modification C:\Windows\monophthong 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0006000000015d9b-50.dat nsis_installer_1 behavioral1/files/0x0006000000015d9b-50.dat nsis_installer_2 -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 764 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 3004 taskkill.exe 1652 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\dnscacheugc.exe\"" 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop dnscacheugc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\dnscacheugc.exe\"" dnscacheugc.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{395634B1-18B9-11EF-93CC-729E5AF85804} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000038e0a9b106d9244c922ff3c49f59dc26000000000200000000001066000000010000200000008a3082c57b14de7f07411693ff73ed0868f9b4d67f95e7175276817e7aa2442f000000000e8000000002000020000000e819cdc21072bcaf47adf4206b227bc8d41c31db341415e8bd761a2970855658200000008d97bd57a428cef0a291e7a58955263880dee0f7de29afb766711e7361704c1e40000000371114cc8ce494f05a4f973a896b7ea6bd5400ef2e2c40120557b934ca3097cc0070fdc58e595eadc18bfca3a656e0ce28be01ea4f2ec9d0a22191b6075dda61 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{394A4DD1-18B9-11EF-93CC-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50840dfcc5acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2704 PING.EXE 2728 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe 2216 dnscacheugc.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 2620 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe Token: SeDebugPrivilege 3004 taskkill.exe Token: SeDebugPrivilege 2216 dnscacheugc.exe Token: SeBackupPrivilege 2464 vssvc.exe Token: SeRestorePrivilege 2464 vssvc.exe Token: SeAuditPrivilege 2464 vssvc.exe Token: SeIncreaseQuotaPrivilege 984 wmic.exe Token: SeSecurityPrivilege 984 wmic.exe Token: SeTakeOwnershipPrivilege 984 wmic.exe Token: SeLoadDriverPrivilege 984 wmic.exe Token: SeSystemProfilePrivilege 984 wmic.exe Token: SeSystemtimePrivilege 984 wmic.exe Token: SeProfSingleProcessPrivilege 984 wmic.exe Token: SeIncBasePriorityPrivilege 984 wmic.exe Token: SeCreatePagefilePrivilege 984 wmic.exe Token: SeBackupPrivilege 984 wmic.exe Token: SeRestorePrivilege 984 wmic.exe Token: SeShutdownPrivilege 984 wmic.exe Token: SeDebugPrivilege 984 wmic.exe Token: SeSystemEnvironmentPrivilege 984 wmic.exe Token: SeRemoteShutdownPrivilege 984 wmic.exe Token: SeUndockPrivilege 984 wmic.exe Token: SeManageVolumePrivilege 984 wmic.exe Token: 33 984 wmic.exe Token: 34 984 wmic.exe Token: 35 984 wmic.exe Token: SeIncreaseQuotaPrivilege 984 wmic.exe Token: SeSecurityPrivilege 984 wmic.exe Token: SeTakeOwnershipPrivilege 984 wmic.exe Token: SeLoadDriverPrivilege 984 wmic.exe Token: SeSystemProfilePrivilege 984 wmic.exe Token: SeSystemtimePrivilege 984 wmic.exe Token: SeProfSingleProcessPrivilege 984 wmic.exe Token: SeIncBasePriorityPrivilege 984 wmic.exe Token: SeCreatePagefilePrivilege 984 wmic.exe Token: SeBackupPrivilege 984 wmic.exe Token: SeRestorePrivilege 984 wmic.exe Token: SeShutdownPrivilege 984 wmic.exe Token: SeDebugPrivilege 984 wmic.exe Token: SeSystemEnvironmentPrivilege 984 wmic.exe Token: SeRemoteShutdownPrivilege 984 wmic.exe Token: SeUndockPrivilege 984 wmic.exe Token: SeManageVolumePrivilege 984 wmic.exe Token: 33 984 wmic.exe Token: 34 984 wmic.exe Token: 35 984 wmic.exe Token: SeDebugPrivilege 1652 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 876 iexplore.exe 2512 iexplore.exe 876 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 876 iexplore.exe 876 iexplore.exe 2512 iexplore.exe 2512 iexplore.exe 876 iexplore.exe 876 iexplore.exe 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE 1036 IEXPLORE.EXE 1036 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1036 IEXPLORE.EXE 1036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2620 1632 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 28 PID 1632 wrote to memory of 2620 1632 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 28 PID 1632 wrote to memory of 2620 1632 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 28 PID 1632 wrote to memory of 2620 1632 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 28 PID 1632 wrote to memory of 2620 1632 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 28 PID 1632 wrote to memory of 2620 1632 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 28 PID 1632 wrote to memory of 2620 1632 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 28 PID 1632 wrote to memory of 2620 1632 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 28 PID 1632 wrote to memory of 2620 1632 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 28 PID 1632 wrote to memory of 2620 1632 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 28 PID 2620 wrote to memory of 2968 2620 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 29 PID 2620 wrote to memory of 2968 2620 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 29 PID 2620 wrote to memory of 2968 2620 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 29 PID 2620 wrote to memory of 2968 2620 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 29 PID 2620 wrote to memory of 2444 2620 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 30 PID 2620 wrote to memory of 2444 2620 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 30 PID 2620 wrote to memory of 2444 2620 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 30 PID 2620 wrote to memory of 2444 2620 69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe 30 PID 2444 wrote to memory of 3004 2444 cmd.exe 32 PID 2444 wrote to memory of 3004 2444 cmd.exe 32 PID 2444 wrote to memory of 3004 2444 cmd.exe 32 PID 2444 wrote to memory of 3004 2444 cmd.exe 32 PID 2444 wrote to memory of 2704 2444 cmd.exe 34 PID 2444 wrote to memory of 2704 2444 cmd.exe 34 PID 2444 wrote to memory of 2704 2444 cmd.exe 34 PID 2444 wrote to memory of 2704 2444 cmd.exe 34 PID 2968 wrote to memory of 2216 2968 dnscacheugc.exe 35 PID 2968 wrote to memory of 2216 2968 dnscacheugc.exe 35 PID 2968 wrote to memory of 2216 2968 dnscacheugc.exe 35 PID 2968 wrote to memory of 2216 2968 dnscacheugc.exe 35 PID 2968 wrote to memory of 2216 2968 dnscacheugc.exe 35 PID 2968 wrote to memory of 2216 2968 dnscacheugc.exe 35 PID 2968 wrote to memory of 2216 2968 dnscacheugc.exe 35 PID 2968 wrote to memory of 2216 2968 dnscacheugc.exe 35 PID 2968 wrote to memory of 2216 2968 dnscacheugc.exe 35 PID 2968 wrote to memory of 2216 2968 dnscacheugc.exe 35 PID 2216 wrote to memory of 764 2216 dnscacheugc.exe 36 PID 2216 wrote to memory of 764 2216 dnscacheugc.exe 36 PID 2216 wrote to memory of 764 2216 dnscacheugc.exe 36 PID 2216 wrote to memory of 764 2216 dnscacheugc.exe 36 PID 2216 wrote to memory of 984 2216 dnscacheugc.exe 40 PID 2216 wrote to memory of 984 2216 dnscacheugc.exe 40 PID 2216 wrote to memory of 984 2216 dnscacheugc.exe 40 PID 2216 wrote to memory of 984 2216 dnscacheugc.exe 40 PID 2216 wrote to memory of 1504 2216 dnscacheugc.exe 42 PID 2216 wrote to memory of 1504 2216 dnscacheugc.exe 42 PID 2216 wrote to memory of 1504 2216 dnscacheugc.exe 42 PID 2216 wrote to memory of 1504 2216 dnscacheugc.exe 42 PID 2216 wrote to memory of 2396 2216 dnscacheugc.exe 44 PID 2216 wrote to memory of 2396 2216 dnscacheugc.exe 44 PID 2216 wrote to memory of 2396 2216 dnscacheugc.exe 44 PID 2216 wrote to memory of 2396 2216 dnscacheugc.exe 44 PID 2216 wrote to memory of 876 2216 dnscacheugc.exe 51 PID 2216 wrote to memory of 876 2216 dnscacheugc.exe 51 PID 2216 wrote to memory of 876 2216 dnscacheugc.exe 51 PID 2216 wrote to memory of 876 2216 dnscacheugc.exe 51 PID 2216 wrote to memory of 2748 2216 dnscacheugc.exe 52 PID 2216 wrote to memory of 2748 2216 dnscacheugc.exe 52 PID 2216 wrote to memory of 2748 2216 dnscacheugc.exe 52 PID 2216 wrote to memory of 2748 2216 dnscacheugc.exe 52 PID 876 wrote to memory of 1816 876 iexplore.exe 54 PID 876 wrote to memory of 1816 876 iexplore.exe 54 PID 876 wrote to memory of 1816 876 iexplore.exe 54 PID 876 wrote to memory of 1816 876 iexplore.exe 54 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\dnscacheugc.exe"C:\Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\dnscacheugc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\dnscacheugc.exe"C:\Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\dnscacheugc.exe"4⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:764
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no5⤵
- Modifies boot configuration data using bcdedit
PID:1504
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures5⤵
- Modifies boot configuration data using bcdedit
PID:2396
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1816
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:537601 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1036
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:2748
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:324
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "dnscacheugc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\dnscacheugc.exe" > NUL5⤵PID:2844
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "dnscacheugc.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- Runs ping.exe
PID:2728
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe" > NUL3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:2704
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1628
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5f7a727a0b937a23695b164fc55cdd755
SHA1399542554fde6614d28c2ffa099ca08ab12e6eb8
SHA256f7fa9a1e1ad15976c0a7f44d90d4c8c99d094fe2d737a187084c08900736b43f
SHA512602739f08930367f256ab31aa7d632bb5bd3c86e6a62b472a82814d0bd9723d02a66895032ab7898b4780fc028e7db2296208b6e8abe94c7f8950beabc46dd21
-
Filesize
10KB
MD5ec672aa9bc14447c4c2d014157c132d7
SHA10b8395a921ae5ae6a2c371a6d0a30519b84b5f58
SHA256ad54e434944a3210c7a899ccae8f514aacad4d7ee529901f3dc2385c57ae8483
SHA512763abcdcc9da7a2671d36d22c94b06e05eefd1c4673279f7683e9b43f7ae818f2a593d10fb3fe8f0a178a4bfc9d0a6744a427b044b3e27c22a32a6c803306532
-
Filesize
85B
MD54d3fe293ee697032f980f6ee9824719c
SHA1a66511eb6908b95bba4daa25ab9fae4b6f95ed3e
SHA2567db89159cbfce125c435b35575f106a7088e47ccd9ac2ff8e74b52a5a8a906e6
SHA51271f998307752ec93caba490360b09decd876ab25b1c08d8ef74fba91455ef634d6635575bb446f2306165cc6c6f8f9b51a1b27e5bae1180adac3004adc634acc
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{394A4DD1-18B9-11EF-93CC-729E5AF85804}.dat
Filesize5KB
MD5ab8444bc13ff593367bb410aea39e0c8
SHA159103eeacc928db53a97c4c5060a40e018cfce2a
SHA256c49a848e67b1a9081b716b86bf2acf18cee82cd51e81825e0033ba02a176ab43
SHA512a738c8c5dcce16a7f17fd40ecae2cc24bfd22bdd900be37355c1588c74afc0144d99f6d8ff5765adc232ce4d38ecf44c7795129ef257c5e6e4832f77296a4755
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
1KB
MD5dc10893b02f9b0bd2be338d82a98ef21
SHA1f5b071ffa7894a1b2a9a3a35e1bcdc784c5ad921
SHA256de9f9eda5d26dece0b8de402cda59982710b58a7856286fd90562b101a2e84d9
SHA512c7e935d9092e8a893790870790ec464f90e6c5ae134c58d9f7244e5b520af03d785a70a6fcb351e366d0eea89871ecf88adc4667a7ab79c90050cf4e9ac106c4
-
Filesize
4KB
MD502fc9c141c7fe565396ee5479e0206e4
SHA194f8be8f0a8f5245155686c37a78b83ba51d6984
SHA256dd0a8f1fe12bdab4387ac528e12244ee68bb6d098548e31e84343e8660b9ba2d
SHA5120ca311a23f55ba2c4eefedf7a2280257113ed77c3dd7a7d6c4d04c4e1a51de6c3596c4cc8bce413f3799e3f279ae31b402ca26de24584fa97060e0a6fa24a307
-
Filesize
77B
MD5d8bf90c6c458e81d3fb17371cc1ab80e
SHA139843cd866b512e8dd4764c299068f025d2b96ff
SHA25618eba9d5e645204556fd02348e43728a82ab429ee4580fea323475d4ed021b19
SHA5121d688c68157b370ebdc3dfbdec6a11e38084b2df2f27fd706053a35ce466d841d7091ba7fe3d6cdedcf6222105ebfda225ac216d056e35086af173a1531f848d
-
Filesize
1KB
MD589de3d027493b9dbe3298a06fef9a89d
SHA13d8ac130c5dab1becabb0a17cae55c9aa42e50cd
SHA2564d1380365eaceb6082c783f733af0ec9fd99e947c1c08c84fa6ff1d370b551ea
SHA512d7699a070cc465d5d960bd3d712fe72f68b24bd6e6bca6e67b5a17fa9581bb0cb02d10bfca2c32949ef86c3156c08e8bacdb33f1bcf4b5b188f149fc52870829
-
Filesize
77B
MD5a1593e9a0d43137ed13bc8019793ba78
SHA15f84bbc68a7eb289c2a8bb28ac3cb1d99368dec3
SHA256a7be0b24e37b0c550a6ab178184064039d200f483f4272fed94c327bd54cd00c
SHA512723f6ffc3972b8c5f349dd54d8368b157198faafbc9e04318488c277039dc4a9fb337839e39623f55900c4f8de342a07d9a346545658906e90c863302f1cdee3
-
Filesize
1KB
MD5b4b79c9010a449efd53a82bdb8437628
SHA129aade81c299a3d802a39082fbc14d9bfe2ce0bb
SHA256a9cb5ed1461c5fcc8f9330d6d14a93f72e3265fa39f61e3e1e160881b17b2331
SHA5122937f907a2bf30a62c9451ec5524de88540a928e6bd87176eb7d815cbf87e830d49437c3356cfb54b6feae22a62a2874962b81b39f5b014cdf0dbdcb49e1f33b
-
Filesize
3KB
MD55f801547f79019d60fc68319b1f049b4
SHA14d525d254adbe2187b4543c5c92d5c01a61885cc
SHA25690e9fc4efe897e08e4a6182c4a077e3303ca0c132ac2199ce1a5473ba91b3205
SHA512f49a801bb62c22f95d4e52ee74fdd1dab2020839c5c10c21afbd0a9b9f1a7b6e34ba026ea5b9f504f60af3feb1e2a6c5cdfa2d926addd4b65ffdd01708f3b6d2
-
Filesize
1KB
MD5d9dbc7c4f101060a91f946ac67e90016
SHA1973cdf0f1e453352e0b92ea36eef6b11ebf0a873
SHA25656bd3fa9f17fabbc0f50cc745a56a56bf5c8228267b012f9cdbe60f5202175f9
SHA512bb5b57a4199a3e62900737d1f2ed83ea750bd0a953c293f46a44648aa479aec43a441163aba7eb52b1c92a3c4b7b49f1d9802756739673e368c30fe76fb6a9ca
-
Filesize
123KB
MD5c337e3929a8857455ab4c910ced96e11
SHA1f308027fe3786f197908e9df3f947b351ee8d147
SHA2564a0d1df4e5bb396c09e59ad6d8ae83c5d39bf8cb2468a3125725812d22395290
SHA5125b8eeb64016ad880a7a21d6392b393cf795d56d0bcd241d3bc95074c2c677c4845d73c96e3ac8dc01d27d66dee76cc47fc58c916d24838cb4017fd19dd6c21e7
-
Filesize
1KB
MD563177602d55dc84d6cd0a2a57bd23188
SHA1d51c49344136ac7fbc511bb47b686dcde30de989
SHA2569d542f61355d3acda4e6c77d252b8a5285a6abbd00bf85ee1390cad66c9275e5
SHA5121ab99e824c1e5b7a53eb216cba9734e633386ad9327769286067f637678d8269ab47c1a16acefab0cedcaaa644a0cfe4dc8e6e8c5223f43a55a6cbf41f09d572
-
Filesize
1KB
MD5330ffc5404bdbe94937baa28f35821fa
SHA1a4eefb61e6f46f9ec2d4a25ce46e597b819f53b0
SHA2562a0841616f61e28ffc46b38e515c24747553f0470d13a64c28e8aea0c32083dd
SHA512c2760924c66779bc23ae9503058263ce7b4f7f8d56c6ba19d047637e291e985aef4eea9acbe3d66f8ee71e4aecf24bd4aa290c166893c0359f3aa73143a6a080
-
Filesize
1KB
MD596fbf408fb9c1a281ae2c5179c66be7d
SHA1a7b0afef1255652d44c1245172a672b2ed38f3e6
SHA2562fd2206f1e7db86d4bc0e25982b12ac3a769c261b2791802c544201a9dc73666
SHA512c34ef857b057181bf8cf5184d22716140eafaf18d74d61018e42171a0572d0a0c2b7cf5d7085c5eeede42336fc481772008567a7a36ad56044ea135228d855fa
-
Filesize
3KB
MD545686f506c292836a118fc4a7a2e96bd
SHA12a9b4b94e850e4e5334ea79d3892447ad3d63790
SHA2560f47ae5fa16979035ab375db5952026b29505bada59ddbf311660fb6ddb36f5b
SHA5123b02dd1159fd50e88e98e2b50cbdfb932af75e287c8bc9e1511b32c46134df7c678c09fe3086ca02aa962ea75189fb52546ac74cc5cd9880900a74a6338fa07a
-
Filesize
3KB
MD520418349e7f8244ea53bc174b2ff9576
SHA1edb9087b6d85247ea0cad0060f540b0f890a80e1
SHA25635d36d6619e249e8bf4838098fd1770c78617e3019162aaca092f8fa37c82dcb
SHA512b12946ca17bb23403e106d561ae42d15695efde73eb4efb4099b57824c7ba0d2e331850022405f1d5da9502b568a217c06f259600cbbacc0d1c2b7210b31081f
-
Filesize
5KB
MD5fc9a7e0e7cfdb849ba8b5f557b0ff943
SHA1a3fdebbbb337f7e030ff7b52b28c0318fc7554d4
SHA25611095b8817f916b16620f3047f549106a266e90d2478cbfad43f4c78b9c6c728
SHA512e4835065505a2e8688ae02ce1c29655e09c47b50042f7e7c688c2223c3038f3a77d67e2e7540219ba47af7aaf8639b2921a7b71c633e9c4cb830d001568d6ac8
-
Filesize
4KB
MD5db4452b6491adb8f5dd4a318bec9f901
SHA1d0854e442a158da86b7a4113c3e765d435e02066
SHA256f4b792c5a07fc27ca2e675971d7bc2e6aaa9a28951995725e19cc0214c469a52
SHA5126442f88490703393598e50db5ee0697e69e5c623b48b87a052c603ca60fb0ae201b5e3cc2aeb32dc1ad6211fb4cffe7d069120325974f673d5783dc126593b2f
-
Filesize
1KB
MD5a7658e0175b113a4035f73895280290f
SHA1fba3b0c6343246d47cdd1208a26f7b919726e73c
SHA2566188b744520f680b71995c26c805c8f0a4890ba4fee0cf9dfd5fe9c548f73b67
SHA512acf0683711d80ee42ed7ec59b129fe33f87db4a22dd6e25f6cae1a7521736e2dec12f6cb6cb28fda154393fd15a953be39523987915d7f7d4fde74799b3cd567
-
Filesize
1KB
MD5671026e8f81a523575b346275f619ea7
SHA1974512f4dbd74248120922478d01ffba73ce44ea
SHA256ff9bd1b23341b5ef229ce7b706842db6b2f6691fc5f7df31ba49b13e0c26d3d7
SHA512bc8a89eff659242a8af09003c99bf1f469123e35612cf48215dae1f53680bad4f438764d230c6f2c9f3da21831706fa82f1b6843edb52b2cbc0fc25801b93eef
-
Filesize
1KB
MD5407e10907de3026ffa0e7115d0d2af1c
SHA13ec677a09e7944ee1a178c4b3b916b6ceaa5bf1e
SHA25610c010a50565ff237ff94c416bd350467e55a42869fd0309c1dcfb988d0dfb7f
SHA512dcada8896812c78346d3e521ae7d76716a1670b6b3293f925feec76475256c9a5145acef926179a93621610fb6659ddd607b3ce3e90611d24e237fbb37614c23
-
Filesize
1KB
MD594fda49e032aaee5149670d9595419fa
SHA162c2f1d3f71ba95fd9f5c4297ddf66d5e995a5f5
SHA2563c13443ae7fdf9322db48c3ca147d61301ce574b0c706f5369332f09d4f8dcb5
SHA5121ff03cf386edffa4dc01ab8c9554b08a4ee89ddf06ee32f6b6529a1ed3f4d32b0ed29185a7d07147777ab6070df66a7a77057f875e49390289c9b01d5e3e352d
-
Filesize
4KB
MD5a5f29347cd57197f9125353ebe79205e
SHA1b59c918c18750d03074bb3db458fc666ad1d2ac8
SHA256c5456a32ca91ef217bcb5d8952d8f4dbbf90c50d60c4c577da08d84fb32a1b4e
SHA5120e50f21c81b4a0317b4cb87c2d8b3570da1b1c69dea78098ad86cb70c3187c908ceaa822b30fca948ac7cf7c9c52ef9c4717542763fefe69640b0db46436cf3e
-
Filesize
3KB
MD56f42ca6b4105204fcd946cc2ae17d9a1
SHA17d4a234e40ef4564943ece66d46d9e1417586887
SHA2567d4b3a73836005095e230d6d34297baa68f816b71cc6b78ced7a6f60b46c829c
SHA512724726aa1b898646522140872210fb4766d5c9998eed3192f112313081377e68077536f6589d98f3300909592584bf3b65820da253feea8eeb558153900cf97a
-
Filesize
2KB
MD5b8403bed485ab2bf409901580574bae2
SHA1f1b17751d3f08b77ed8f0b1528ebefdc72081626
SHA256bc2165aecccaa1d0ec5cb14f147a19d265d944f10ca7c69b9c61709a63c5b866
SHA5122a0d9054f9ed885884122042ba065c84b833b12bdf0997ea5e8f1c1b16d422de36bde24d15910eb0a54513c31995bdeb1a8ab5ebbe479efb27e1070e72168aa8
-
Filesize
1KB
MD5bfa80b81d42af62446bff4ffdd52b09f
SHA103abf1f02aa1560b4d3823403651ed9d1645e4f4
SHA256788174400b1406f5fc1f4a0fa458efec8e8ac8c37a7b03067cb21c14a381e92a
SHA512910b09c96c2cdc15c78db94d8cf3a5a0df63c78275dbddd26e4a0df0bfdec0acc8f4506824275ed75a6450c617dea3c197f49b5ce8b0836acb113790fc90d249
-
Filesize
1KB
MD5193e264b1fe2fdfc15045e201ddf04a0
SHA1999ccc70d4c4c45c808271b751cd1dfacce9be03
SHA256ac2c14478f5cc431f4f9e57b8b8469db26cd7b94bbcbb886c6965bcec587bebf
SHA51200f2b20621ca0cf73434b7693891f77167aa658818572f046b0929e2f3cfc00ad653d3edb435a498e42ad71aa26d5fc634d61f4e9f0a1a31c8386a43d06f52a5
-
Filesize
1KB
MD5a5631e68e150cdae1d84a8deb169e553
SHA1c3b5ee1957cb364ab9388048520363c65bf12c4a
SHA2565e4b50b84279dc09ef2775df9373bf061492f302c7ce981b2987980cf87ddb11
SHA512af78a68399824f5abc1499d465c96e780f287719c159a81820a6df004de383db13518a0b95b6416ca445cbf082a45dc6eab92de8c1e8f95c7c6754ca53a97c6a
-
Filesize
689B
MD52168a573d0d45bd2f9a89b8236453d61
SHA130733f525b9d191ac4720041a49fc2d17f4c99a1
SHA2568ee173565b2e771fecf3b471a79bdf072aaa1bd9dc27582cfda2b2a322beeba8
SHA5121263589e12f587143ec1dd8ac87293a041f7d77439fcf91503e62be02e36d13e28560342deed86cf800c7bc01cd31837004d1ebe7ae53c670340040c68eb0e22
-
Filesize
1KB
MD57fa0203427f8c830ee89e253aba6a774
SHA16d29176a6adb5a1984c5a0306b9eba1521e6ae2d
SHA2563be925ddc71466effd0796939f0963f3e6ad0ceb110a39c2ac6e7ec0a9e6e298
SHA5122d1d13de10408a05986862e5975f0563554facc6e2c2cec4f0b97b965236b6f8b38b6d1c30c77d972d5b058f7fe8b49c8d6f60a6dc317035dd134901c41bd509
-
Filesize
11KB
MD56f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1b6ac111dfb0d1fc75ad09c56bde7830232395785
SHA256b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
SHA512a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
Filesize
59KB
MD54553e7c51216f3bc007ab83680479041
SHA12832749a0c8d40c1eaae54d132c8bc4fa52d567f
SHA256664c3ca4053df5a50f464fb196d8e68d2d9244c6687a26210b9db2addaa065c3
SHA512235fee1f317915c22d836a593da2f5ccc1d0ece70023c45526439d6c221faae8618545909b480f17d5923ae82b0fd44962f319ac2fac794df7df6773ef4e5bde
-
Filesize
215KB
MD569aa03bcd10948392b001bb9ae368a92
SHA112741edebdd6accd7e309da808083a60113d8dad
SHA256021cdf3bf0bbd3e078cf45cbae784ac1056bfe8e7fc5ff8c5d446b9a45c0bb63
SHA512abf0752de3827af70f75ba5c74fa77b077659e55e4a3478cc2e8b8aedc945a61097b813649655ad2f76c40e982acba37832bc4820ad8d3e5a498e59dd3eeba9c