Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 09:35
Static task
static1
Behavioral task
behavioral1
Sample
9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe
-
Size
195KB
-
MD5
9dba51d1d709efb322ad0babf9028c30
-
SHA1
65916448900214e4a3a130b69767edbafa1b783a
-
SHA256
ba142f897f9c3c3b677064b79a7b9e556b8a7060f7d89f98f4e95157497add29
-
SHA512
acfd650221d3fedafb4782f762f88fce7272dd5286a609aa7c22d7c741317d72983e0ca6c957144897afbefa899bed2d8cbcbdfdf1209cdfed79f346f26c07f8
-
SSDEEP
6144:WyAge9RNJSldWOANp0WGk08J6WG96HU4qWDNkz0:QJPp0WGD8J6W860tW+z0
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B
http://cerberhhyed5frqa.as13fd.win/C875-9075-E1E9-006D-FC0B
http://cerberhhyed5frqa.45kgok.win/C875-9075-E1E9-006D-FC0B
http://cerberhhyed5frqa.wewiso.win/C875-9075-E1E9-006D-FC0B
http://cerberhhyed5frqa.5kti58.win/C875-9075-E1E9-006D-FC0B
http://cerberhhyed5frqa.onion/C875-9075-E1E9-006D-FC0B
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16400) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\SearchIndexer.exe\"" SearchIndexer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\SearchIndexer.exe\"" 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation SearchIndexer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\SearchIndexer.lnk 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\SearchIndexer.lnk SearchIndexer.exe -
Executes dropped EXE 6 IoCs
pid Process 4464 SearchIndexer.exe 2140 SearchIndexer.exe 752 SearchIndexer.exe 3712 SearchIndexer.exe 4752 SearchIndexer.exe 2884 SearchIndexer.exe -
Loads dropped DLL 12 IoCs
pid Process 2716 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 2716 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 2716 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 4464 SearchIndexer.exe 4464 SearchIndexer.exe 4464 SearchIndexer.exe 752 SearchIndexer.exe 752 SearchIndexer.exe 752 SearchIndexer.exe 4752 SearchIndexer.exe 4752 SearchIndexer.exe 4752 SearchIndexer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchIndexer = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\SearchIndexer.exe\"" 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\SearchIndexer = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\SearchIndexer.exe\"" 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchIndexer = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\SearchIndexer.exe\"" SearchIndexer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\SearchIndexer = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\SearchIndexer.exe\"" SearchIndexer.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp430A.bmp" SearchIndexer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2716 set thread context of 2380 2716 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 81 PID 4464 set thread context of 2140 4464 SearchIndexer.exe 94 PID 752 set thread context of 3712 752 SearchIndexer.exe 97 PID 4752 set thread context of 2884 4752 SearchIndexer.exe 121 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023489-42.dat nsis_installer_1 behavioral2/files/0x0007000000023489-42.dat nsis_installer_2 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 1528 taskkill.exe 3632 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\SearchIndexer.exe\"" SearchIndexer.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\\SearchIndexer.exe\"" 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop SearchIndexer.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings SearchIndexer.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 408 PING.EXE 3464 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe 2140 SearchIndexer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2380 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe Token: SeDebugPrivilege 3632 taskkill.exe Token: SeDebugPrivilege 2140 SearchIndexer.exe Token: SeDebugPrivilege 3712 SearchIndexer.exe Token: 33 3344 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3344 AUDIODG.EXE Token: SeDebugPrivilege 2884 SearchIndexer.exe Token: SeDebugPrivilege 1528 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2380 2716 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 81 PID 2716 wrote to memory of 2380 2716 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 81 PID 2716 wrote to memory of 2380 2716 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 81 PID 2716 wrote to memory of 2380 2716 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 81 PID 2716 wrote to memory of 2380 2716 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 81 PID 2716 wrote to memory of 2380 2716 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 81 PID 2716 wrote to memory of 2380 2716 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 81 PID 2716 wrote to memory of 2380 2716 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 81 PID 2716 wrote to memory of 2380 2716 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 81 PID 2380 wrote to memory of 4464 2380 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 89 PID 2380 wrote to memory of 4464 2380 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 89 PID 2380 wrote to memory of 4464 2380 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 89 PID 2380 wrote to memory of 1448 2380 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 90 PID 2380 wrote to memory of 1448 2380 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 90 PID 2380 wrote to memory of 1448 2380 9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe 90 PID 1448 wrote to memory of 3632 1448 cmd.exe 92 PID 1448 wrote to memory of 3632 1448 cmd.exe 92 PID 1448 wrote to memory of 3632 1448 cmd.exe 92 PID 1448 wrote to memory of 408 1448 cmd.exe 93 PID 1448 wrote to memory of 408 1448 cmd.exe 93 PID 1448 wrote to memory of 408 1448 cmd.exe 93 PID 4464 wrote to memory of 2140 4464 SearchIndexer.exe 94 PID 4464 wrote to memory of 2140 4464 SearchIndexer.exe 94 PID 4464 wrote to memory of 2140 4464 SearchIndexer.exe 94 PID 4464 wrote to memory of 2140 4464 SearchIndexer.exe 94 PID 4464 wrote to memory of 2140 4464 SearchIndexer.exe 94 PID 4464 wrote to memory of 2140 4464 SearchIndexer.exe 94 PID 4464 wrote to memory of 2140 4464 SearchIndexer.exe 94 PID 4464 wrote to memory of 2140 4464 SearchIndexer.exe 94 PID 4464 wrote to memory of 2140 4464 SearchIndexer.exe 94 PID 752 wrote to memory of 3712 752 SearchIndexer.exe 97 PID 752 wrote to memory of 3712 752 SearchIndexer.exe 97 PID 752 wrote to memory of 3712 752 SearchIndexer.exe 97 PID 752 wrote to memory of 3712 752 SearchIndexer.exe 97 PID 752 wrote to memory of 3712 752 SearchIndexer.exe 97 PID 752 wrote to memory of 3712 752 SearchIndexer.exe 97 PID 752 wrote to memory of 3712 752 SearchIndexer.exe 97 PID 752 wrote to memory of 3712 752 SearchIndexer.exe 97 PID 752 wrote to memory of 3712 752 SearchIndexer.exe 97 PID 2140 wrote to memory of 3028 2140 SearchIndexer.exe 99 PID 2140 wrote to memory of 3028 2140 SearchIndexer.exe 99 PID 3028 wrote to memory of 5080 3028 msedge.exe 100 PID 3028 wrote to memory of 5080 3028 msedge.exe 100 PID 2140 wrote to memory of 1284 2140 SearchIndexer.exe 101 PID 2140 wrote to memory of 1284 2140 SearchIndexer.exe 101 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102 PID 3028 wrote to memory of 2584 3028 msedge.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe"C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe"C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe"4⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffbce9f46f8,0x7ffbce9f4708,0x7ffbce9f47186⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:26⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:36⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:86⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3120 /prefetch:16⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:16⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:16⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:16⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:16⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:16⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:16⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 /prefetch:86⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 /prefetch:86⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:16⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:16⤵PID:4228
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B5⤵PID:4872
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbce9f46f8,0x7ffbce9f4708,0x7ffbce9f47186⤵PID:2608
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:3392
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "SearchIndexer.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe" > NUL5⤵PID:4484
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "SearchIndexer.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- Runs ping.exe
PID:3464
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe" > NUL3⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:408
-
-
-
-
C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exeC:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exeC:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exeC:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:4752 -
C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exeC:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1468
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f0 0x2c81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5e91a8674b2fa1d5871383f81bedb35b9
SHA19cf753d9118cbd3dd9d628ee0ffa6e3d4d371616
SHA256be65619e56179e9d76adf0801e4fb8d4fcefa841895a262dedde4e6a3bb2a386
SHA512237a0755b05f3dc5d513631b8411cf70fcd8d90bc56b17bfb8f6127590d944e4171fe5fd3670991d20ae888596ab78ec659f17917990f7f4e4a0bfa0e62a86b8
-
Filesize
10KB
MD5ab417769e388e6256527b5ad2636cd1e
SHA1a65fbdeec46cc24d188280afb818b069bd27449d
SHA256b9f5c96d2ff8b012658ed2d1b153ab6d8e56623c08c65529de1541162a945621
SHA51222a04aa4dae03bd24497d9399e2ba3ff1a1ea56e2877474fa102276ad2cf27c62d6c8967da1439a873f89f48a9538b9ce7d9ac3cda0da7e20cd3ab56fe7cbbea
-
Filesize
85B
MD53ca2391c090aeefab21a670334b3912d
SHA16847c5c872612d5329665b318f868aecde909f14
SHA2563fba5d97c3be34447acf9c509a73b20c3f9386a29083afb6fa03c94f901f4e0a
SHA512a128ffe0043b3e0617c152b0104cdf09128c7e32158a95253395db01381197c8136f2e28e3e569aab5abc890648dca71aa36963594010290c75d00105748d750
-
Filesize
231B
MD59d8c4bfbd009c4d6001e2125abaa8b02
SHA1cd040558172b5fca5b200447a281843956243741
SHA256a652297987f14317100f8c5f7eb26d1bc67eb8a64f0b39b72b5fd5046a9f29b0
SHA512c4c84f43642b805a105acce9ebc9f01aa0e6ef553ea32be3f8b890fc7440f0b7d3ddf99b9336bce20ce7a3d9b9f6434a704651a8af425ffc8407ba39d5de735f
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
5KB
MD52987d0cec46527950c3d566d38a8ed3b
SHA1ddeaada3f74cab8b787cbfe819f7f20dc64fbc1a
SHA256572e0540a6715f3549c6cf4389120533347958aee08ae7f558302f6a86e4875e
SHA5123bc8862632a04bc26eefc635120334c5dfcb49af59f78ebaa9e1d90eb8792440025601dd6189475dab2f0436a82ecc7b367a857610e1f2bfaae06fbdc1e60920
-
Filesize
6KB
MD57f3c68ba80e0a647643395f491fc6253
SHA13a0b6438704b7d670a5dd11a7aa8656a8d0238a9
SHA2562b67c6aeb254f9b072292e66517e708bf6afc60559afd2cb1233844fcd166a1a
SHA5122a291807497bd3384d7ef612e766a4522596f86f5d30bfe46f3c89a39f4c4b271631cf3dc311df2c8e9b3c8ba5c200741be49d8b1423a6a7dc0dab8f995ee4e6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD55a37932f9e5ae58afb81d089ef92e3bd
SHA112b35253c0eeee858da30a90a5306923b5a20d6a
SHA2565af5e44dab298f35cb933dbdd7705c32dad1693d5d2a87197a5e76a2c3fbe2c3
SHA51295ccb4a31a713cff6c4b17172d34e7ed2ff85b1c575a81abe6723f3b45d0686d324bbcf095675a550c90f08e8598442108fe4fce9f14676c42fb6369fe1d360b
-
Filesize
11KB
MD56f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1b6ac111dfb0d1fc75ad09c56bde7830232395785
SHA256b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
SHA512a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
Filesize
97B
MD5739bc3be601fc4c312fca262597514eb
SHA1c14ae4cd4e2ce75b7ea4ed39a835bc8d207f2486
SHA256b645b5d403881ac66ce4171af4aced39c0a17237fb78443fae623b1f4367345f
SHA512c0092979146f54dd885d4b12b0f7e37285b4116aecf4a793eb524d0b33c8ed2e7a336f97ec6d2504203d51207205f192895c1850fd6dd5f30f9848d86ef4c5fd
-
Filesize
2KB
MD520a07038d866854806cde137985291be
SHA10757b25acc07c221f0d178500edff240f8b3f4a3
SHA256fa8b9c24c5b0ad36366a3feeedd6418849b329af3e9abf768247458423314bf2
SHA512d7989f2b39237547533cfc00d11768dd9585eada20d4ddcd0e55a51fabea5ed44ac080722e017b868c36607b95abd1df21082b0bb3549f05f60fe98caa12fbd3
-
Filesize
524B
MD548e0fb6b8052f1ab8b71b3f18e4c1a43
SHA182b1b0194cea753df8b9130a40c5688e30fce472
SHA2561b39315b00fd693c9d3ebe209eed643c8e18cc3ab30aa5405069de2c92d301cd
SHA5124c5d66ed0145f2705ffdd7e2132683c4a627867ff72dd2de442f24288b17bfafd6b75c391f2fe5ee6cf72660f6cc7fcfb9878f74e757ad21259b418b599365e1
-
Filesize
4KB
MD5a5cde678454ba56e36f963911bf2556c
SHA15b1f5b664a1f649ab54c626c5eb085d58e1b102f
SHA256b7b300298eee7584b59897cd77793e67ccf5faf8373ea3da7078df645fbe3a91
SHA5124a8d4fa353827e40248f89c2e7dbaa18cba2c55ba32a203a243284f834aa9aad88155306e222989e65fea16f0fe7ce36759dca9b36af84be4872904a2560a698
-
Filesize
39B
MD531296c038e3154364571e61b99f8579e
SHA13e1433612c2e7f61a1310ee47d6f4ce27a2e694e
SHA2564443ae9d463bf4bdde7812237ab097327ec1d23a3f4e12b319899f2cf7a0dbb0
SHA51242ae2ae55d5dbc85521cf5c4df9d510b610a62038ca6800682aa95e406b3ec9316f4c74782657f7a99e125b1a908b6ada7bb32b81a46a425f6a5de5bb88d33dc
-
Filesize
4KB
MD581da9f36f9b33e1454c01fbd4fe8bb8a
SHA11141725f4d2d4c9318381ebafabca24cfe609ada
SHA256acd22725de018de883eeb647690906631e10ffa4b18c56d9cc141ebd70154d8c
SHA512b511ec1c39d2ebcd0a528f70670a3ae491ad3c6d26476bd41088549ec87d51e0292696472ef812c579e2d04463435219570b453f1c0c586a4fb6da503e630b29
-
Filesize
27B
MD541dc583620885308274e1af0be12e78e
SHA19f96a25b7539ebc2a5bc0661b65a03992b63e210
SHA256f3236a2b39954dc659c25482fde3dcdc735b6b6829e3827bedb7c8c8dc72dd54
SHA512ec50aefdae3b9e276b1ca87677dbb89841a91169350eb88da1bd61b84726c8ffd19de6ab037bc0159a16bd44587f01daa3421298640c168ac2562a66170f9e3e
-
Filesize
48KB
MD5ed6a1f9c51825426eba9c9accc70e212
SHA1f49bdd25415b979fef71b227d206ad6430860f28
SHA256183fbe83a879d66e03ea757fb8c130b41e58781fa9d1b08dc3ae6a2e712e0cb6
SHA512db87e2a3347c83cf305fcbf957d0aa86421b93b7bc25c4664951ef523a7b1c693221eaa42bbc69d9d594f0545167a244364493797a84e80f507cdc994fafe32b
-
Filesize
1KB
MD522ae7ab91e881b2687c032caa0161981
SHA1359d682298cbcd9e34570b7b13124088388aa39d
SHA25681e567635f17882fb7f52cf5fe431cce43aeea7f3b29296fd27340bda0cd58a6
SHA512e01d07d1c60309beca9347e677f695819ee28b502efd422e1d5dcab9ee819b6dc3d2b75c8b7622232a1171cb851cc28b80873c3c455260973e79496ec2404580
-
Filesize
128KB
MD52fc7a60cc8016d277c0bce2ebef71ab8
SHA14085b129a87faecfaa15ef6b6b7991e770c8990d
SHA256936b79427c4e2550ebb989c7db80f39b7bfc28b24fd22ee536d13aa86d924a02
SHA512cf464c86bfe49500acb4e83fd76fc684267b61dd0010c68975d352d23900857fa1ebb480de06a62d5d350850a198e47af171ffabaec16faa31ae00b553d82d2a
-
Filesize
942B
MD5b3c15ca22e2021027f4234739b578f66
SHA1f3a1ad8bd3cdd9713e719ab9040194e5fd7ce33d
SHA2564e14f479ff7b4fe613d169f7509ab7cb077f90e5aff3d97008c1f40019016688
SHA5128a41b35641c21b07d9740aad38101475007d72d9605a2dabc17c180679e7e190e847d2a3ae21e5e24ddb77e0552bfdac4a9ebe68681ce19188c418d4f1761541
-
Filesize
301B
MD5edf1bb40465c547e373b2057117a6997
SHA1f3579744a4d76be8245b5d04ba693ab19ec520c9
SHA25611edbb41223aabf180c7c15822b5e2f6f7c5d60e591c83557e3afb08819a5d8f
SHA512fb19deaf1ed3540210e6b87d3f0e8b3e1f163911220a84cf2f805b70a135faf4f311aa898924ae2b5a7966dfdc021c37b9e0ce80b77fe6a3706c68e4ef5098c0
-
Filesize
1KB
MD52c6f5684ce8e64e2ac4d106ec6c361dd
SHA178f431b04243778cf02f29c63ec1f10e464bde6a
SHA2561d552bba9fdb2557c0a0b55c79eb322852df0e6a0bcb3b48cfbdd335f32b3552
SHA5120e53cd5e0c943e9c2014b8b778811b4aa83610347f7156ef4b5f616a13a7d29552f72087fe8a956c1c9464af224dcf113232d65e913049e8be8966aa7f2887a6
-
Filesize
867B
MD535cc513ff018f47876e85c705cbf1406
SHA1b4616a4cd9651952b354782f291b667f5ee9a232
SHA2564edd945106ec52a068241ab556a0c549c73b1bd46b2a216d6a0f82f015dec27d
SHA51280d89352840492434ddd194881f428fe4c2175bf3e13bc9fe11e4e88af187315a3180b4897bffb96bf4922ccaae9b3b9998b63d1cfb425faba30247c2b33a948
-
Filesize
524B
MD56b80535edccb2506b4253ca9c4b9df69
SHA19cefb2a388e5ce03e5b9a1f2eefa7f9560c2ac14
SHA2568e078310abf2897c7261c116eca316ab8b172be404c1188c8376b4a141802563
SHA5129dea47b9d11d1549a0a5265bad2dd0a20d1334f36b1256e3423f0fe65831262205066d30302fec2c8cefd97b60f30cb4a8e4dcfe220f7eb757022697401c3de4
-
Filesize
1013B
MD50b0b81875ffaac9b717fc9f7eb35d7b8
SHA10f5b7e8acfb0b4b0a94c8d7d543b184e7e5cdea6
SHA256e17138765b5c3649e13e933f3f0e40a05da6110e9709a279e5fd4906df710cfa
SHA512f721b4efa8e6238aba84f6ce86b37aded60a44430a00cdc96eb1132ef6abe53ec2394350ec196b7ee7254b27d857ef8c6e1925f407ce08859a8f5ff9321bcda8
-
Filesize
2KB
MD5d3fd7121b844308f5e0d98218b25f7a1
SHA157eda098a5ac50befbbaed81c9358542508d2025
SHA2563f19660f2ffcb1b75ce092e05a9d02128025f89a378cfa302a3fe406c065139b
SHA5120512e3887235754102c623ba704421c745f43d5300a8dd31cc79d1d70a537158dd5a2a25e8e0eab69dfd8cfa234a437ebfa89abafb5c31dcaf28f745a17feca5
-
Filesize
1KB
MD53c514691acb839524ed060bf0e2a2a11
SHA1b0a7bfaa6f2c2b27dc48240a3bb948ea222a76c6
SHA256cea31280b99f0c6175d51c4acfc211ac985690b1b919b46b639f32b1f61362e5
SHA51229195c4016c4650f12b67130213fcdb7d9901df188db718e135be9b0b7c8fb55f950f32b68856021a51fe004405f85d24f4a9514e5b070fc394368e67b2fe3b2
-
Filesize
1KB
MD5eca0bc75a6f145bb33aabe5108dff9a8
SHA1cca370c3ebb4b3bd2bab1f9c067574f47aee3f9e
SHA256a5aef44fc2041f030b33a7827777dcf98917642df83e242949eb5df532eca85e
SHA512b6c0b7b9780b82ce0f00a752e9942e7905c58cf9162eaaa03940772791822c5ac36cd5230c0947e2d3d6f33e6774743adf35c1b6294cf3df28615c17fce1e332
-
Filesize
1KB
MD5ce246be1354bd6501d1ccddc9d552c68
SHA16f08c8785367189bb495fc903cd8627ef90a9174
SHA2561a69e5650275cefbb8d93b2d0c02128d851de7e36ddca730a8e444b6fce467c4
SHA5122a3155391b483757e3c0c302ec34dd90efe9434318ce33b52d006e68d478f9d40108fe8774893b16a1c4bc60f026d113e6ceac8aba42f09ef92fa8fe32ff6e04
-
Filesize
887B
MD552a6ccee7b61aaebdad8b0ac25d54680
SHA14aa90440ff85fb8eb9900f4f761e1706f8a763b7
SHA25678dc9a077f420c64ac03126608e052f33a471191e55ac51625b5f8081e78c96e
SHA512becce92eaa29f38b11cf2fc3b68d6feb7d2de12dac03634685a8f2f09dbfeff518d2c540830a6565d27e9e4706154fdcfb592de655ad6cb480beb5f602167fdb
-
Filesize
1KB
MD5a057463e49cc7a282b9de9bd1f98c940
SHA117f203dd324b4dc61fc85a2848b93f0941946d4e
SHA256ca43ac52dec0ed1083c006678f4e1e0b7e6c2882e8bcc66e76bc776b7340bfe8
SHA512b18514215cc196d457629ee48c08b05078aa7b61dcd26a540ef9aa107e4231a27a80de11e068a03611c85966fcb511bf22f0ab40fc8e461cb817a1caba9c0734
-
Filesize
524B
MD5f80c22abdede870a48b813be86f1dfc4
SHA155521387353a7fe5798f2d1cea608177c175aeeb
SHA2561e3b4a0cd6a9017e8ffbb611587330845608ce2508a18d11a78ea03a3f220260
SHA512559d3c18a038302280f897c5fd912bd3aab360a8e9ce7cf3606ca49234cf9be22ba0171e35929634beb54f39cbe4d2fe0b9a838eb8e02198c966eb9d1acfd80b
-
Filesize
524B
MD51289782651c9af159c54bd25c344a26e
SHA15ff702833f8e0b9b2bc066d7de9e9d3885984135
SHA25682020a2103aa444d0b44638ee2666fa3f077af7b5dda85433607d871d103fc39
SHA512afe7c5e2df5643fec0c486c7efd9b8a440d2ac9631b70369e35b14561995ca91151c1859ef2d49e20621652cf38f024ea94898ff4c2b258380f5a92613a3df51
-
Filesize
195KB
MD59dba51d1d709efb322ad0babf9028c30
SHA165916448900214e4a3a130b69767edbafa1b783a
SHA256ba142f897f9c3c3b677064b79a7b9e556b8a7060f7d89f98f4e95157497add29
SHA512acfd650221d3fedafb4782f762f88fce7272dd5286a609aa7c22d7c741317d72983e0ca6c957144897afbefa899bed2d8cbcbdfdf1209cdfed79f346f26c07f8