Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 09:35
Static task
static1
Behavioral task
behavioral1
Sample
9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe
-
Size
195KB
-
MD5
9dba51d1d709efb322ad0babf9028c30
-
SHA1
65916448900214e4a3a130b69767edbafa1b783a
-
SHA256
ba142f897f9c3c3b677064b79a7b9e556b8a7060f7d89f98f4e95157497add29
-
SHA512
acfd650221d3fedafb4782f762f88fce7272dd5286a609aa7c22d7c741317d72983e0ca6c957144897afbefa899bed2d8cbcbdfdf1209cdfed79f346f26c07f8
-
SSDEEP
6144:WyAge9RNJSldWOANp0WGk08J6WG96HU4qWDNkz0:QJPp0WGD8J6W860tW+z0
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.wet4io.win/42FB-774A-6A40-006D-FE23
http://cerberhhyed5frqa.as13fd.win/42FB-774A-6A40-006D-FE23
http://cerberhhyed5frqa.45kgok.win/42FB-774A-6A40-006D-FE23
http://cerberhhyed5frqa.wewiso.win/42FB-774A-6A40-006D-FE23
http://cerberhhyed5frqa.5kti58.win/42FB-774A-6A40-006D-FE23
http://cerberhhyed5frqa.onion/42FB-774A-6A40-006D-FE23
Extracted
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16389) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C3E8D47C-9F43-BB75-694C-C844176198A5}\\dnscacheugc.exe\"" 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C3E8D47C-9F43-BB75-694C-C844176198A5}\\dnscacheugc.exe\"" dnscacheugc.exe -
Deletes itself 1 IoCs
pid Process 2456 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\dnscacheugc.lnk 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\dnscacheugc.lnk dnscacheugc.exe -
Executes dropped EXE 4 IoCs
pid Process 2460 dnscacheugc.exe 2816 dnscacheugc.exe 1296 dnscacheugc.exe 572 dnscacheugc.exe -
Loads dropped DLL 8 IoCs
pid Process 2152 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 2152 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 2636 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 2460 dnscacheugc.exe 2460 dnscacheugc.exe 1296 dnscacheugc.exe 1296 dnscacheugc.exe 2816 dnscacheugc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\dnscacheugc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C3E8D47C-9F43-BB75-694C-C844176198A5}\\dnscacheugc.exe\"" 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\dnscacheugc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C3E8D47C-9F43-BB75-694C-C844176198A5}\\dnscacheugc.exe\"" 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\dnscacheugc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C3E8D47C-9F43-BB75-694C-C844176198A5}\\dnscacheugc.exe\"" dnscacheugc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\dnscacheugc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C3E8D47C-9F43-BB75-694C-C844176198A5}\\dnscacheugc.exe\"" dnscacheugc.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dnscacheugc.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp7BB5.bmp" dnscacheugc.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2152 set thread context of 2636 2152 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 28 PID 2460 set thread context of 2816 2460 dnscacheugc.exe 35 PID 1296 set thread context of 572 1296 dnscacheugc.exe 42 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0006000000016411-52.dat nsis_installer_1 behavioral1/files/0x0006000000016411-52.dat nsis_installer_2 -
Kills process with taskkill 2 IoCs
pid Process 2992 taskkill.exe 2904 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\Desktop 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C3E8D47C-9F43-BB75-694C-C844176198A5}\\dnscacheugc.exe\"" 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\Desktop dnscacheugc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C3E8D47C-9F43-BB75-694C-C844176198A5}\\dnscacheugc.exe\"" dnscacheugc.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3BF8A411-27D6-11EF-9267-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a43d870b630db429b070e111b31e4fd000000000200000000001066000000010000200000001864a440a9a72161089e1031b9169f0a754bdf691d3deda7781452b570c4998f000000000e80000000020000200000005b6c4b67e61db747ac491d2816034bb75dcb4d99dbb46c09209ed4e14628e23c20000000ec311561569cb8a13c9a5d4facae294355273731033c7ea401b111dcbd2f54d940000000a719baa576ecac2413de9a4694a20555df71b52293add70e9dc8081f58b59a3601bcb539dd741b13e320e7e5cefbf64bfd3abb9613a8a4ebe1e7258754b2ed2e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509dc0fee2bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C094DB1-27D6-11EF-9267-5267BFD3BAD1} = "0" iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2968 PING.EXE 2004 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe 2816 dnscacheugc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2636 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe Token: SeDebugPrivilege 2992 taskkill.exe Token: SeDebugPrivilege 2816 dnscacheugc.exe Token: SeDebugPrivilege 572 dnscacheugc.exe Token: SeDebugPrivilege 2904 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1528 iexplore.exe 1528 iexplore.exe 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1528 iexplore.exe 1528 iexplore.exe 1528 iexplore.exe 1528 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2820 iexplore.exe 2820 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2636 2152 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2636 2152 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2636 2152 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2636 2152 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2636 2152 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2636 2152 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2636 2152 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2636 2152 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2636 2152 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2636 2152 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 28 PID 2636 wrote to memory of 2460 2636 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 29 PID 2636 wrote to memory of 2460 2636 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 29 PID 2636 wrote to memory of 2460 2636 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 29 PID 2636 wrote to memory of 2460 2636 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 29 PID 2636 wrote to memory of 2456 2636 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2456 2636 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2456 2636 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2456 2636 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 30 PID 2456 wrote to memory of 2992 2456 cmd.exe 32 PID 2456 wrote to memory of 2992 2456 cmd.exe 32 PID 2456 wrote to memory of 2992 2456 cmd.exe 32 PID 2456 wrote to memory of 2992 2456 cmd.exe 32 PID 2456 wrote to memory of 2968 2456 cmd.exe 34 PID 2456 wrote to memory of 2968 2456 cmd.exe 34 PID 2456 wrote to memory of 2968 2456 cmd.exe 34 PID 2456 wrote to memory of 2968 2456 cmd.exe 34 PID 2460 wrote to memory of 2816 2460 dnscacheugc.exe 35 PID 2460 wrote to memory of 2816 2460 dnscacheugc.exe 35 PID 2460 wrote to memory of 2816 2460 dnscacheugc.exe 35 PID 2460 wrote to memory of 2816 2460 dnscacheugc.exe 35 PID 2460 wrote to memory of 2816 2460 dnscacheugc.exe 35 PID 2460 wrote to memory of 2816 2460 dnscacheugc.exe 35 PID 2460 wrote to memory of 2816 2460 dnscacheugc.exe 35 PID 2460 wrote to memory of 2816 2460 dnscacheugc.exe 35 PID 2460 wrote to memory of 2816 2460 dnscacheugc.exe 35 PID 2460 wrote to memory of 2816 2460 dnscacheugc.exe 35 PID 1156 wrote to memory of 1296 1156 taskeng.exe 41 PID 1156 wrote to memory of 1296 1156 taskeng.exe 41 PID 1156 wrote to memory of 1296 1156 taskeng.exe 41 PID 1156 wrote to memory of 1296 1156 taskeng.exe 41 PID 1296 wrote to memory of 572 1296 dnscacheugc.exe 42 PID 1296 wrote to memory of 572 1296 dnscacheugc.exe 42 PID 1296 wrote to memory of 572 1296 dnscacheugc.exe 42 PID 1296 wrote to memory of 572 1296 dnscacheugc.exe 42 PID 1296 wrote to memory of 572 1296 dnscacheugc.exe 42 PID 1296 wrote to memory of 572 1296 dnscacheugc.exe 42 PID 1296 wrote to memory of 572 1296 dnscacheugc.exe 42 PID 1296 wrote to memory of 572 1296 dnscacheugc.exe 42 PID 1296 wrote to memory of 572 1296 dnscacheugc.exe 42 PID 1296 wrote to memory of 572 1296 dnscacheugc.exe 42 PID 2816 wrote to memory of 1528 2816 dnscacheugc.exe 44 PID 2816 wrote to memory of 1528 2816 dnscacheugc.exe 44 PID 2816 wrote to memory of 1528 2816 dnscacheugc.exe 44 PID 2816 wrote to memory of 1528 2816 dnscacheugc.exe 44 PID 2816 wrote to memory of 1524 2816 dnscacheugc.exe 45 PID 2816 wrote to memory of 1524 2816 dnscacheugc.exe 45 PID 2816 wrote to memory of 1524 2816 dnscacheugc.exe 45 PID 2816 wrote to memory of 1524 2816 dnscacheugc.exe 45 PID 1528 wrote to memory of 2680 1528 iexplore.exe 46 PID 1528 wrote to memory of 2680 1528 iexplore.exe 46 PID 1528 wrote to memory of 2680 1528 iexplore.exe 46 PID 1528 wrote to memory of 2680 1528 iexplore.exe 46 PID 1528 wrote to memory of 2492 1528 iexplore.exe 48 PID 1528 wrote to memory of 2492 1528 iexplore.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Roaming\{C3E8D47C-9F43-BB75-694C-C844176198A5}\dnscacheugc.exe"C:\Users\Admin\AppData\Roaming\{C3E8D47C-9F43-BB75-694C-C844176198A5}\dnscacheugc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Roaming\{C3E8D47C-9F43-BB75-694C-C844176198A5}\dnscacheugc.exe"C:\Users\Admin\AppData\Roaming\{C3E8D47C-9F43-BB75-694C-C844176198A5}\dnscacheugc.exe"4⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1528 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1528 CREDAT:537601 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:1524
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:596
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "dnscacheugc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{C3E8D47C-9F43-BB75-694C-C844176198A5}\dnscacheugc.exe" > NUL5⤵PID:2568
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "dnscacheugc.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- Runs ping.exe
PID:2004
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe" > NUL3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:2968
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A82CB12C-3851-4AC4-A6B3-0C4722553284} S-1-5-21-2297530677-1229052932-2803917579-1000:HKULBIBU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Roaming\{C3E8D47C-9F43-BB75-694C-C844176198A5}\dnscacheugc.exeC:\Users\Admin\AppData\Roaming\{C3E8D47C-9F43-BB75-694C-C844176198A5}\dnscacheugc.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Roaming\{C3E8D47C-9F43-BB75-694C-C844176198A5}\dnscacheugc.exeC:\Users\Admin\AppData\Roaming\{C3E8D47C-9F43-BB75-694C-C844176198A5}\dnscacheugc.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD59611e4cd379e188367f2877f566c34ed
SHA17d5d2ba4f0e071e496f6a4034cdc7fc9757c379a
SHA256d755aa3726273bda02491d8a502c449fd0bae04c035eb7a53d3d494a042b42ed
SHA512ebda3e39a3d4c3db48f4edd919137eeaa47ea008c9e2ba70eaa8fa610a92d8b844784eea8c7281da17b11715db5f422d8bd7a68b22a087bb191acdd3a11e1ec7
-
Filesize
10KB
MD58399bbab0b075111c6e1f89f812ab05f
SHA17540abb0160e17226f60e20bfe17524d404a30ad
SHA25608d7ce649f0b2a155ec0834da38fd69161168b5c063d4f202982d5cf18fc8e0b
SHA51221ce2f820ab9954037a3c9c628b133ee03c174205cde7af596f7fe87d8a071c6db2b8b9f329cff1e8638b6164320972bb9815f0039b18be06610bbf9e9543e81
-
Filesize
85B
MD5f65f41006403b59b606f4a7338f07244
SHA18179968da0550d6ce85decafe44d571de86516f0
SHA25640e13ad5b831651246e9c9461b81846d5fa6d5f9a4403948d5706721ca10eef8
SHA5127dd7c6aae50afd832cd5ca23763c5a24395ae14cf20fc3e5f2c7b3b162abd6f70eaf1b0207e67bb732cc8f330ed9c4c0a6fc25bdbdb09fd403f944b9ee51fb87
-
Filesize
231B
MD59d8c4bfbd009c4d6001e2125abaa8b02
SHA1cd040558172b5fca5b200447a281843956243741
SHA256a652297987f14317100f8c5f7eb26d1bc67eb8a64f0b39b72b5fd5046a9f29b0
SHA512c4c84f43642b805a105acce9ebc9f01aa0e6ef553ea32be3f8b890fc7440f0b7d3ddf99b9336bce20ce7a3d9b9f6434a704651a8af425ffc8407ba39d5de735f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f6ab01cb7a1af2e37d7c65b5f0cce7c
SHA1a908c4e7fe8cfe26457bb2e55d709d243757e6f4
SHA256336c6bd4a34ff09de078015feb91caa66b370d02c51ac3acc6a89b21a9f346dc
SHA5121eac66f612c2110ce1c13eb7f65be6182a850915ba5efc47efb1585111fa31bfb12ec924fde312d7d7b199b0a2ec0ab4221ff76817588969f630a6d18ea888fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d08af9afaa260e77583c08b37bfe7a2
SHA1d3897774ec66e6228d7ed3704b9856191303748d
SHA256cc5f920c75ce2983d8748d23c27b80f3440d71fa5092bf3289525cb503a38ccf
SHA512bc38daeb82cccbc9fee0d2a13c1b7ea328d732e34a0e704341cdf179b8c367f88be64f925b04b9dec5719214556d11453cf270eba2a56ba076376f4ffe0e092f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e377cd4d9692ae89017da7eb096ae8e
SHA17cfa8030669e5e05ba38924ad205ccb7cbf9213e
SHA256814791df9145a0a4a0c1ff9d046abf8fc551776c717bad24a68cfd21fded3b36
SHA5123231427ce6282942a42dee635f375bc546b1f6df142b9ade3fd4d1eb80d26ff2e99f5ddbf5f11e4c07f9027b8f0d9de718a7b8564e57850e632fb9f5be247c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5912d0ced786513173d3035517017a39f
SHA12ae03017b55fb8805d59f8dc822f410996fdeef4
SHA25696e2a4132f7c53280f5c532110559044a171f63d5eec21a3311a4900a8aac715
SHA51243b110d1a62a319deb66bf0d7e41da03754479926e45a8240bec0bf4198132ae95bab90456bea17a8a2904456734206d10a1596ee9745fe8a2bb7c36d189d6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a421fd60c18657b31f6d3fd6e3f4d6c
SHA1be8e8ad540c63609f02a688aab6b1d643bebb8d5
SHA256ada45f1a48f4f34710d89d7c17876b0eaa509269c925c36290853d5de08fd4b0
SHA512dec77ba6023820a7f18be7961b307ee787b80b68297642f565a87260209bed67d1646f52a4b40c9a41c08a691a087387dd675aa2d2568e9170a736020676c028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f9a8d5d1fd406449a739bcaf9fb6493
SHA1fe86ea0d8fcb3715b215d3a816e10046281eb333
SHA256ca21089b204f60c887938c637ad3dbc9a3ce927fce33ed995e5d2d261bf6990e
SHA5127e2f4639e25249285174b2dcd2b17fb610fb8ccdbb60999722f44195fbe238eddf68cfb344586b9aa4a9084a1a0f931aaf7ba3068b426c44ad76ef2656cc5c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d9f652a94dc401dcfe78b96b49b21c1
SHA108d1639979d11e923c2f5bae38f0e241e2b3d323
SHA25664025ceb9695546ed2fc30a414f2002b6295f8cab1716c1fe4feb5647b717fe4
SHA512d3732992934ada014e385831579fae043bd2d65cd12b7199bcd48e9b4e6ebd4a8613699d7ac47d5aadd0d635aaee1709bbeb8acc48d258353e6495fe0f0a52f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deda17af8b08b498168b5c48250e1527
SHA1b8579a86f6ebe94096b79db360e9ef043c9d2892
SHA256e886d71cdf437cb43edac56276c60e41763e9b4687649675bf738d92674fa2ca
SHA512a276dc967beb0114d77af7ff08c3f90dc463904d8a9be64ac0b384554a421a840e7c19ca2bf57d76b98cd07f95146d66059a314c03ebd8a400d734b3b7aca6b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce4df5682fe8206e59e3ef2d9f76d9ec
SHA124b3ebf15d7e824b40fc4e9b228587eb7b9310a7
SHA25682d52d320b88ef3acdf15f4ba30c8092b7e523c4e5a959439f28ddce032c8d22
SHA5125898d51cfd3e17c134207af36dea535e50a6bd0d73a936eb3b77467f4e42d2b1b6b3186ab5a8c18b1fea74653d40228bb58443f31e375148bc5434a46d16c068
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
97B
MD5739bc3be601fc4c312fca262597514eb
SHA1c14ae4cd4e2ce75b7ea4ed39a835bc8d207f2486
SHA256b645b5d403881ac66ce4171af4aced39c0a17237fb78443fae623b1f4367345f
SHA512c0092979146f54dd885d4b12b0f7e37285b4116aecf4a793eb524d0b33c8ed2e7a336f97ec6d2504203d51207205f192895c1850fd6dd5f30f9848d86ef4c5fd
-
Filesize
3KB
MD566c15bc65dcd0d2125578f68a1a9a5fb
SHA17c6e3c7e4f6fd160f6030d41c177de56b5813914
SHA256c8ad5c12253b5ddc84f6b5cd6e88a9359ee6a77c6b52cd363cd53582772cb525
SHA5120025ebc1fa8ceddabc979db4a25b5095fed0836d98d42212cab73f063a4b244e47c39f5e2ce3cf14ee519c42939ebeff2805d18c5a2883b687114d443e3d62bc
-
Filesize
2KB
MD520a07038d866854806cde137985291be
SHA10757b25acc07c221f0d178500edff240f8b3f4a3
SHA256fa8b9c24c5b0ad36366a3feeedd6418849b329af3e9abf768247458423314bf2
SHA512d7989f2b39237547533cfc00d11768dd9585eada20d4ddcd0e55a51fabea5ed44ac080722e017b868c36607b95abd1df21082b0bb3549f05f60fe98caa12fbd3
-
Filesize
524B
MD548e0fb6b8052f1ab8b71b3f18e4c1a43
SHA182b1b0194cea753df8b9130a40c5688e30fce472
SHA2561b39315b00fd693c9d3ebe209eed643c8e18cc3ab30aa5405069de2c92d301cd
SHA5124c5d66ed0145f2705ffdd7e2132683c4a627867ff72dd2de442f24288b17bfafd6b75c391f2fe5ee6cf72660f6cc7fcfb9878f74e757ad21259b418b599365e1
-
Filesize
4KB
MD5a5cde678454ba56e36f963911bf2556c
SHA15b1f5b664a1f649ab54c626c5eb085d58e1b102f
SHA256b7b300298eee7584b59897cd77793e67ccf5faf8373ea3da7078df645fbe3a91
SHA5124a8d4fa353827e40248f89c2e7dbaa18cba2c55ba32a203a243284f834aa9aad88155306e222989e65fea16f0fe7ce36759dca9b36af84be4872904a2560a698
-
Filesize
39B
MD531296c038e3154364571e61b99f8579e
SHA13e1433612c2e7f61a1310ee47d6f4ce27a2e694e
SHA2564443ae9d463bf4bdde7812237ab097327ec1d23a3f4e12b319899f2cf7a0dbb0
SHA51242ae2ae55d5dbc85521cf5c4df9d510b610a62038ca6800682aa95e406b3ec9316f4c74782657f7a99e125b1a908b6ada7bb32b81a46a425f6a5de5bb88d33dc
-
Filesize
4KB
MD581da9f36f9b33e1454c01fbd4fe8bb8a
SHA11141725f4d2d4c9318381ebafabca24cfe609ada
SHA256acd22725de018de883eeb647690906631e10ffa4b18c56d9cc141ebd70154d8c
SHA512b511ec1c39d2ebcd0a528f70670a3ae491ad3c6d26476bd41088549ec87d51e0292696472ef812c579e2d04463435219570b453f1c0c586a4fb6da503e630b29
-
Filesize
27B
MD541dc583620885308274e1af0be12e78e
SHA19f96a25b7539ebc2a5bc0661b65a03992b63e210
SHA256f3236a2b39954dc659c25482fde3dcdc735b6b6829e3827bedb7c8c8dc72dd54
SHA512ec50aefdae3b9e276b1ca87677dbb89841a91169350eb88da1bd61b84726c8ffd19de6ab037bc0159a16bd44587f01daa3421298640c168ac2562a66170f9e3e
-
Filesize
1KB
MD596e1bd54fe6f259ed5a3472cb925560f
SHA1f790c17107c605a8a632f9307cc272b53f061265
SHA2564d9ddeb76c4edd7941e9885b5b722fb6f5dc2f3115868d9675e011198677031e
SHA512a3d4475f4972bb418794d9304efb3384613fe97b0ba0a11f8cb2ea9b6c33d095964ed3272b57c2f8f97b49928f8c71808c2784654f2f47b9cafcd66d83bde819
-
Filesize
128KB
MD52fc7a60cc8016d277c0bce2ebef71ab8
SHA14085b129a87faecfaa15ef6b6b7991e770c8990d
SHA256936b79427c4e2550ebb989c7db80f39b7bfc28b24fd22ee536d13aa86d924a02
SHA512cf464c86bfe49500acb4e83fd76fc684267b61dd0010c68975d352d23900857fa1ebb480de06a62d5d350850a198e47af171ffabaec16faa31ae00b553d82d2a
-
Filesize
942B
MD5b3c15ca22e2021027f4234739b578f66
SHA1f3a1ad8bd3cdd9713e719ab9040194e5fd7ce33d
SHA2564e14f479ff7b4fe613d169f7509ab7cb077f90e5aff3d97008c1f40019016688
SHA5128a41b35641c21b07d9740aad38101475007d72d9605a2dabc17c180679e7e190e847d2a3ae21e5e24ddb77e0552bfdac4a9ebe68681ce19188c418d4f1761541
-
Filesize
687B
MD539b25e2484aa82c7b2ec81fcd1f7af59
SHA1ee8a02ac5ed57a01e2822d2153a129ebe928212f
SHA256fd14667ca139e7315c85f6fdb5d59fb7869a42873e710fb6465c4db238d06cfb
SHA5127e411c1ff701d39908325a128881d328405e0936efcabb34465fd21d71a8bc10fa459d6e2a57f281c05e4d22f66a2975f7866dfee019c58dc10ef2298cb6ccf9
-
Filesize
301B
MD5edf1bb40465c547e373b2057117a6997
SHA1f3579744a4d76be8245b5d04ba693ab19ec520c9
SHA25611edbb41223aabf180c7c15822b5e2f6f7c5d60e591c83557e3afb08819a5d8f
SHA512fb19deaf1ed3540210e6b87d3f0e8b3e1f163911220a84cf2f805b70a135faf4f311aa898924ae2b5a7966dfdc021c37b9e0ce80b77fe6a3706c68e4ef5098c0
-
Filesize
2KB
MD51919cb27aa32b81469031fa695695aa9
SHA110927f7237a798c773a26b4ee3b74b92ce701210
SHA2562735fcb499b355d527eebd74b22e8299d53334aa9d6480c73152292c32b04dfa
SHA51270e6caf4a84a998ad802c0d2e21501b4a827d66498835cdff614b4eea7bd0c833ac77c75b03c531b0095b852eff015f6d6f847c0343b096abd91a7361cfb154b
-
Filesize
1KB
MD52c6f5684ce8e64e2ac4d106ec6c361dd
SHA178f431b04243778cf02f29c63ec1f10e464bde6a
SHA2561d552bba9fdb2557c0a0b55c79eb322852df0e6a0bcb3b48cfbdd335f32b3552
SHA5120e53cd5e0c943e9c2014b8b778811b4aa83610347f7156ef4b5f616a13a7d29552f72087fe8a956c1c9464af224dcf113232d65e913049e8be8966aa7f2887a6
-
Filesize
1KB
MD5b8f3bcb39093d3fa4aac98300e85f9ff
SHA1e0beef56dd0c1bf1b46a926af0cba54aa2304fab
SHA2567990a4f0f6b2cb8bd5f110fca1035bdb0d9ecf0f504c28b5775e9c0a61561231
SHA5121af57b2525efa8308be083852b5ea567bf9a8cbe7484da45ac5d002b3ad1ac684cbf770d30940774af7e976ec874a6eb3ecd4c274700450c5afd2474de793ad4
-
Filesize
867B
MD535cc513ff018f47876e85c705cbf1406
SHA1b4616a4cd9651952b354782f291b667f5ee9a232
SHA2564edd945106ec52a068241ab556a0c549c73b1bd46b2a216d6a0f82f015dec27d
SHA51280d89352840492434ddd194881f428fe4c2175bf3e13bc9fe11e4e88af187315a3180b4897bffb96bf4922ccaae9b3b9998b63d1cfb425faba30247c2b33a948
-
Filesize
524B
MD56b80535edccb2506b4253ca9c4b9df69
SHA19cefb2a388e5ce03e5b9a1f2eefa7f9560c2ac14
SHA2568e078310abf2897c7261c116eca316ab8b172be404c1188c8376b4a141802563
SHA5129dea47b9d11d1549a0a5265bad2dd0a20d1334f36b1256e3423f0fe65831262205066d30302fec2c8cefd97b60f30cb4a8e4dcfe220f7eb757022697401c3de4
-
Filesize
1013B
MD50b0b81875ffaac9b717fc9f7eb35d7b8
SHA10f5b7e8acfb0b4b0a94c8d7d543b184e7e5cdea6
SHA256e17138765b5c3649e13e933f3f0e40a05da6110e9709a279e5fd4906df710cfa
SHA512f721b4efa8e6238aba84f6ce86b37aded60a44430a00cdc96eb1132ef6abe53ec2394350ec196b7ee7254b27d857ef8c6e1925f407ce08859a8f5ff9321bcda8
-
Filesize
1KB
MD53276d7c599dccd63c8c6e9d40c199370
SHA16472a23cf5a1643f10037586cf70e6263043c9c9
SHA2569dbb067cf9af604609d86c452feaac2c4692f84cf4e9e046e9a10dff174f2c4c
SHA512c149086ebde3bbec2d483f0550125dbbbd98655e386e25d2e5bb74e5533f95172c29a909e4038c18a28659ae42bf699dc2f7d6806214982359d2eae3695dbd16
-
Filesize
2KB
MD5d3fd7121b844308f5e0d98218b25f7a1
SHA157eda098a5ac50befbbaed81c9358542508d2025
SHA2563f19660f2ffcb1b75ce092e05a9d02128025f89a378cfa302a3fe406c065139b
SHA5120512e3887235754102c623ba704421c745f43d5300a8dd31cc79d1d70a537158dd5a2a25e8e0eab69dfd8cfa234a437ebfa89abafb5c31dcaf28f745a17feca5
-
Filesize
1KB
MD53c514691acb839524ed060bf0e2a2a11
SHA1b0a7bfaa6f2c2b27dc48240a3bb948ea222a76c6
SHA256cea31280b99f0c6175d51c4acfc211ac985690b1b919b46b639f32b1f61362e5
SHA51229195c4016c4650f12b67130213fcdb7d9901df188db718e135be9b0b7c8fb55f950f32b68856021a51fe004405f85d24f4a9514e5b070fc394368e67b2fe3b2
-
Filesize
1KB
MD5eca0bc75a6f145bb33aabe5108dff9a8
SHA1cca370c3ebb4b3bd2bab1f9c067574f47aee3f9e
SHA256a5aef44fc2041f030b33a7827777dcf98917642df83e242949eb5df532eca85e
SHA512b6c0b7b9780b82ce0f00a752e9942e7905c58cf9162eaaa03940772791822c5ac36cd5230c0947e2d3d6f33e6774743adf35c1b6294cf3df28615c17fce1e332
-
Filesize
1KB
MD5ce246be1354bd6501d1ccddc9d552c68
SHA16f08c8785367189bb495fc903cd8627ef90a9174
SHA2561a69e5650275cefbb8d93b2d0c02128d851de7e36ddca730a8e444b6fce467c4
SHA5122a3155391b483757e3c0c302ec34dd90efe9434318ce33b52d006e68d478f9d40108fe8774893b16a1c4bc60f026d113e6ceac8aba42f09ef92fa8fe32ff6e04
-
Filesize
887B
MD552a6ccee7b61aaebdad8b0ac25d54680
SHA14aa90440ff85fb8eb9900f4f761e1706f8a763b7
SHA25678dc9a077f420c64ac03126608e052f33a471191e55ac51625b5f8081e78c96e
SHA512becce92eaa29f38b11cf2fc3b68d6feb7d2de12dac03634685a8f2f09dbfeff518d2c540830a6565d27e9e4706154fdcfb592de655ad6cb480beb5f602167fdb
-
Filesize
1KB
MD5a057463e49cc7a282b9de9bd1f98c940
SHA117f203dd324b4dc61fc85a2848b93f0941946d4e
SHA256ca43ac52dec0ed1083c006678f4e1e0b7e6c2882e8bcc66e76bc776b7340bfe8
SHA512b18514215cc196d457629ee48c08b05078aa7b61dcd26a540ef9aa107e4231a27a80de11e068a03611c85966fcb511bf22f0ab40fc8e461cb817a1caba9c0734
-
Filesize
524B
MD5f80c22abdede870a48b813be86f1dfc4
SHA155521387353a7fe5798f2d1cea608177c175aeeb
SHA2561e3b4a0cd6a9017e8ffbb611587330845608ce2508a18d11a78ea03a3f220260
SHA512559d3c18a038302280f897c5fd912bd3aab360a8e9ce7cf3606ca49234cf9be22ba0171e35929634beb54f39cbe4d2fe0b9a838eb8e02198c966eb9d1acfd80b
-
Filesize
524B
MD51289782651c9af159c54bd25c344a26e
SHA15ff702833f8e0b9b2bc066d7de9e9d3885984135
SHA25682020a2103aa444d0b44638ee2666fa3f077af7b5dda85433607d871d103fc39
SHA512afe7c5e2df5643fec0c486c7efd9b8a440d2ac9631b70369e35b14561995ca91151c1859ef2d49e20621652cf38f024ea94898ff4c2b258380f5a92613a3df51
-
Filesize
11KB
MD56f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1b6ac111dfb0d1fc75ad09c56bde7830232395785
SHA256b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
SHA512a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
Filesize
48KB
MD5ed6a1f9c51825426eba9c9accc70e212
SHA1f49bdd25415b979fef71b227d206ad6430860f28
SHA256183fbe83a879d66e03ea757fb8c130b41e58781fa9d1b08dc3ae6a2e712e0cb6
SHA512db87e2a3347c83cf305fcbf957d0aa86421b93b7bc25c4664951ef523a7b1c693221eaa42bbc69d9d594f0545167a244364493797a84e80f507cdc994fafe32b
-
Filesize
195KB
MD59dba51d1d709efb322ad0babf9028c30
SHA165916448900214e4a3a130b69767edbafa1b783a
SHA256ba142f897f9c3c3b677064b79a7b9e556b8a7060f7d89f98f4e95157497add29
SHA512acfd650221d3fedafb4782f762f88fce7272dd5286a609aa7c22d7c741317d72983e0ca6c957144897afbefa899bed2d8cbcbdfdf1209cdfed79f346f26c07f8