Overview
overview
10Static
static
3c24367dcd1...18.exe
windows7-x64
10c24367dcd1...18.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Perl.dll
windows7-x64
3Perl.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 04:15
Static task
static1
Behavioral task
behavioral1
Sample
c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Perl.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Perl.dll
Resource
win10v2004-20240802-en
General
-
Target
c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe
-
Size
258KB
-
MD5
c24367dcd19f9d4a3f36fbd3cd1d8c11
-
SHA1
332541a2416b70cf23fbd02b82bf2c807dbcb3d7
-
SHA256
3e478bb8de1bbbd2744d7c467220ba0373ce3f636eff55cab6c0c3b27ecd30a1
-
SHA512
a4a8c48b49910c71619578ad9e58998bd236dffb396d29733c58078b659042f03729989fe4fa537078b6aa33b4025b4711e6f0e55cf3c0996911f70b86791411
-
SSDEEP
6144:BwHysO+NnMZ2INVorOnii05dapobD/OLJoMyk6zM:qO+NFYRYQyGNTykIM
Malware Config
Extracted
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html
Extracted
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt
http://52uo5k3t73ypjije.o8hpwj.top/57B8-B9D2-88F9-0046-1470
http://52uo5k3t73ypjije.uwckha.top/57B8-B9D2-88F9-0046-1470
http://52uo5k3t73ypjije.5tb8hy.bid/57B8-B9D2-88F9-0046-1470
http://52uo5k3t73ypjije.hhc366.top/57B8-B9D2-88F9-0046-1470
http://52uo5k3t73ypjije.onion.to/57B8-B9D2-88F9-0046-1470
http://52uo5k3t73ypjije.onion/57B8-B9D2-88F9-0046-1470
Signatures
-
Cerber 2 IoCs
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
description ioc Process Mutant opened shell.{1553E568-EC87-A5B8-6EFF-417FF3E4FB14} c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe Mutant created shell.{1553E568-EC87-A5B8-6EFF-417FF3E4FB14} dccw.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dccw.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1984 bcdedit.exe 4972 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\dccw.exe\"" c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\dccw.exe\"" dccw.exe -
Contacts a large (529) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation dccw.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\dccw.lnk c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\dccw.lnk dccw.exe -
Executes dropped EXE 2 IoCs
pid Process 2348 dccw.exe 4432 dccw.exe -
Loads dropped DLL 6 IoCs
pid Process 4780 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 4780 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 4780 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 2348 dccw.exe 2348 dccw.exe 2348 dccw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dccw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\dccw.exe\"" c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\dccw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\dccw.exe\"" c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dccw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\dccw.exe\"" dccw.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\dccw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\dccw.exe\"" dccw.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp37EE.bmp" dccw.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4780 set thread context of 4996 4780 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 91 PID 2348 set thread context of 4432 2348 dccw.exe 101 -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.vbs dccw.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.url dccw.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE dccw.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.url dccw.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.vbs dccw.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html dccw.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt dccw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-PipelineConfig.xml dccw.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE dccw.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE dccw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote.ini dccw.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE dccw.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE dccw.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.html dccw.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.txt dccw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-manifest.ini dccw.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe File opened for modification C:\Windows\ dccw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dccw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dccw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4036 cmd.exe 3908 PING.EXE 512 cmd.exe 3576 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x00070000000234cb-30.dat nsis_installer_1 behavioral2/files/0x00070000000234cb-30.dat nsis_installer_2 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3080 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 2524 taskkill.exe 3124 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\dccw.exe\"" c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop dccw.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\\dccw.exe\"" dccw.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings dccw.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3908 PING.EXE 3576 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe 4432 dccw.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 4996 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe Token: SeDebugPrivilege 2524 taskkill.exe Token: SeDebugPrivilege 4432 dccw.exe Token: SeBackupPrivilege 2740 vssvc.exe Token: SeRestorePrivilege 2740 vssvc.exe Token: SeAuditPrivilege 2740 vssvc.exe Token: SeIncreaseQuotaPrivilege 3692 wmic.exe Token: SeSecurityPrivilege 3692 wmic.exe Token: SeTakeOwnershipPrivilege 3692 wmic.exe Token: SeLoadDriverPrivilege 3692 wmic.exe Token: SeSystemProfilePrivilege 3692 wmic.exe Token: SeSystemtimePrivilege 3692 wmic.exe Token: SeProfSingleProcessPrivilege 3692 wmic.exe Token: SeIncBasePriorityPrivilege 3692 wmic.exe Token: SeCreatePagefilePrivilege 3692 wmic.exe Token: SeBackupPrivilege 3692 wmic.exe Token: SeRestorePrivilege 3692 wmic.exe Token: SeShutdownPrivilege 3692 wmic.exe Token: SeDebugPrivilege 3692 wmic.exe Token: SeSystemEnvironmentPrivilege 3692 wmic.exe Token: SeRemoteShutdownPrivilege 3692 wmic.exe Token: SeUndockPrivilege 3692 wmic.exe Token: SeManageVolumePrivilege 3692 wmic.exe Token: 33 3692 wmic.exe Token: 34 3692 wmic.exe Token: 35 3692 wmic.exe Token: 36 3692 wmic.exe Token: SeIncreaseQuotaPrivilege 3692 wmic.exe Token: SeSecurityPrivilege 3692 wmic.exe Token: SeTakeOwnershipPrivilege 3692 wmic.exe Token: SeLoadDriverPrivilege 3692 wmic.exe Token: SeSystemProfilePrivilege 3692 wmic.exe Token: SeSystemtimePrivilege 3692 wmic.exe Token: SeProfSingleProcessPrivilege 3692 wmic.exe Token: SeIncBasePriorityPrivilege 3692 wmic.exe Token: SeCreatePagefilePrivilege 3692 wmic.exe Token: SeBackupPrivilege 3692 wmic.exe Token: SeRestorePrivilege 3692 wmic.exe Token: SeShutdownPrivilege 3692 wmic.exe Token: SeDebugPrivilege 3692 wmic.exe Token: SeSystemEnvironmentPrivilege 3692 wmic.exe Token: SeRemoteShutdownPrivilege 3692 wmic.exe Token: SeUndockPrivilege 3692 wmic.exe Token: SeManageVolumePrivilege 3692 wmic.exe Token: 33 3692 wmic.exe Token: 34 3692 wmic.exe Token: 35 3692 wmic.exe Token: 36 3692 wmic.exe Token: SeDebugPrivilege 3124 taskkill.exe Token: 33 2796 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2796 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4780 wrote to memory of 4996 4780 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 91 PID 4780 wrote to memory of 4996 4780 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 91 PID 4780 wrote to memory of 4996 4780 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 91 PID 4780 wrote to memory of 4996 4780 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 91 PID 4780 wrote to memory of 4996 4780 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 91 PID 4780 wrote to memory of 4996 4780 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 91 PID 4780 wrote to memory of 4996 4780 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 91 PID 4780 wrote to memory of 4996 4780 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 91 PID 4780 wrote to memory of 4996 4780 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 91 PID 4780 wrote to memory of 4996 4780 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 91 PID 4780 wrote to memory of 4996 4780 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 91 PID 4996 wrote to memory of 2348 4996 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 95 PID 4996 wrote to memory of 2348 4996 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 95 PID 4996 wrote to memory of 2348 4996 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 95 PID 4996 wrote to memory of 4036 4996 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 96 PID 4996 wrote to memory of 4036 4996 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 96 PID 4996 wrote to memory of 4036 4996 c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe 96 PID 4036 wrote to memory of 2524 4036 cmd.exe 98 PID 4036 wrote to memory of 2524 4036 cmd.exe 98 PID 4036 wrote to memory of 2524 4036 cmd.exe 98 PID 4036 wrote to memory of 3908 4036 cmd.exe 99 PID 4036 wrote to memory of 3908 4036 cmd.exe 99 PID 4036 wrote to memory of 3908 4036 cmd.exe 99 PID 2348 wrote to memory of 4432 2348 dccw.exe 101 PID 2348 wrote to memory of 4432 2348 dccw.exe 101 PID 2348 wrote to memory of 4432 2348 dccw.exe 101 PID 2348 wrote to memory of 4432 2348 dccw.exe 101 PID 2348 wrote to memory of 4432 2348 dccw.exe 101 PID 2348 wrote to memory of 4432 2348 dccw.exe 101 PID 2348 wrote to memory of 4432 2348 dccw.exe 101 PID 2348 wrote to memory of 4432 2348 dccw.exe 101 PID 2348 wrote to memory of 4432 2348 dccw.exe 101 PID 2348 wrote to memory of 4432 2348 dccw.exe 101 PID 2348 wrote to memory of 4432 2348 dccw.exe 101 PID 4432 wrote to memory of 3080 4432 dccw.exe 104 PID 4432 wrote to memory of 3080 4432 dccw.exe 104 PID 4432 wrote to memory of 3692 4432 dccw.exe 108 PID 4432 wrote to memory of 3692 4432 dccw.exe 108 PID 4432 wrote to memory of 1984 4432 dccw.exe 110 PID 4432 wrote to memory of 1984 4432 dccw.exe 110 PID 4432 wrote to memory of 4972 4432 dccw.exe 112 PID 4432 wrote to memory of 4972 4432 dccw.exe 112 PID 4432 wrote to memory of 1504 4432 dccw.exe 123 PID 4432 wrote to memory of 1504 4432 dccw.exe 123 PID 1504 wrote to memory of 3504 1504 msedge.exe 124 PID 1504 wrote to memory of 3504 1504 msedge.exe 124 PID 4432 wrote to memory of 2992 4432 dccw.exe 125 PID 4432 wrote to memory of 2992 4432 dccw.exe 125 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 PID 1504 wrote to memory of 3416 1504 msedge.exe 126 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe"2⤵
- Cerber
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Roaming\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\dccw.exe"C:\Users\Admin\AppData\Roaming\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\dccw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Roaming\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\dccw.exe"C:\Users\Admin\AppData\Roaming\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\dccw.exe"4⤵
- Cerber
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:3080
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no5⤵
- Modifies boot configuration data using bcdedit
PID:1984
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures5⤵
- Modifies boot configuration data using bcdedit
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd768e46f8,0x7ffd768e4708,0x7ffd768e47186⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,8766163152717808598,13297075501076001581,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:26⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,8766163152717808598,13297075501076001581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:36⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,8766163152717808598,13297075501076001581,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:86⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8766163152717808598,13297075501076001581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:16⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8766163152717808598,13297075501076001581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:16⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8766163152717808598,13297075501076001581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:16⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8766163152717808598,13297075501076001581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:16⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8766163152717808598,13297075501076001581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2784 /prefetch:16⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,8766163152717808598,13297075501076001581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:86⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,8766163152717808598,13297075501076001581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:86⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8766163152717808598,13297075501076001581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4480 /prefetch:16⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8766163152717808598,13297075501076001581,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:16⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8766163152717808598,13297075501076001581,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:16⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8766163152717808598,13297075501076001581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:16⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8766163152717808598,13297075501076001581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1784 /prefetch:16⤵PID:6056
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://52uo5k3t73ypjije.o8hpwj.top/57B8-B9D2-88F9-0046-1470?auto5⤵PID:1904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xdc,0x100,0x104,0x80,0x108,0x7ffd768e46f8,0x7ffd768e4708,0x7ffd768e47186⤵PID:3560
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:3368
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /f /im "dccw.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{38207363-0580-FD50-AFB0-C8F2C04C7B40}\dccw.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:512 -
C:\Windows\system32\taskkill.exetaskkill /f /im "dccw.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3576
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /f /im "c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe" > NUL3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "c24367dcd19f9d4a3f36fbd3cd1d8c11_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3908
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b8 0x4901⤵
- Suspicious use of AdjustPrivilegeToken
PID:2796
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
4Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html
Filesize19KB
MD57876ec066dd5861f7117342b8ff25584
SHA11e84970aa735742e656e9fa27079105fb4f684db
SHA2563eefc6b168fbaff9be264f10ca78777184b205c5eae4d62c705473c570e597ed
SHA512b98f4665649d4df8be31fc8cc4ed4751669d07060c2dac4c10c873d0bd81afe56f59ef1d23c85eae84b47889131078f8744076f6de48cc68b40e4e243722168c
-
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt
Filesize10KB
MD51032d32af0d3a757610fb9d2dc3a3e7f
SHA1dff7e5a2907fb0daab9fbfceda52a6fed49b4eb5
SHA25648b8b82a8df550f0ebba5ab80e10fcd892ce104b3f48006359a05ebf5a57db68
SHA51267e13cd3aedabe53b5a7682375da403c1662e3ec63b9c10297c432c957e1084605a00b7e32a54d19d8fa00b7704e540819ec205736b85e87b53a06381b1f1920
-
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.url
Filesize90B
MD57d566c1e92ec1163f5f0decfc37bcb27
SHA1de5b412b3754820737cfdffae7db8bad1a3387bd
SHA256266c6fa7ff4c65fea7b262e946b2dd88f6ea8fe01c504345312b2a5254a657d3
SHA5125b2c24b464115143ce06b191b754031d6ba36162725bcdd33e51338b5b305aa14d659153278f8518490ee9f9a3438bab3c63e9fada90a6599d9431a4dd32ca46
-
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.vbs
Filesize252B
MD518d46f5d8ebd3c7d6df0c7a8fd1bd64d
SHA1aeb8407457434aabce2a4c2f95fe305c5303f929
SHA256ceb35b75d397b07c84dfab3a28189e9431bdf80ec99ab65f9ccf01986bd4a8e9
SHA51235fc759be0dee77eb9e39350873c24d9693cf6f370f171814e2ce6250ea814fea8a0887442ebae9077d6e9ff81ae7034faa0afcb080401a7d4ac384d2ba42d65
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
5KB
MD5ecfc125af4a300175a454c85476f7caa
SHA19c1ce96568fae61321b1b223b709acba7d70d009
SHA256bb91e113305e2366e9c0b2f94fdafb7ec95bfc2f538b57f2f0282ab7d1c34485
SHA51259a290570e6bd2ac4bdbfbc193b1a2e6326d510d3dd52d8b313a520a9fc3ed1c78ed37dc5c553ac84be05fc0f923403b2769082eb01a7e3e36aba42c7fd251d9
-
Filesize
6KB
MD58147d809aa3957a9b3aead7ce077c61e
SHA1038a16488f27783f1d0d1b4b30e4523f71562e3d
SHA256f76a8412ac35ff0880814315da70f2e364dad44dffd2a74b886164b56c101de1
SHA512399a75fc6fac8cb3166c60de5e1af78c9b24fa08f0c7bcf89abb6f93040e5b512a9b3e0db0af257b825833eff64787f11b66fb9e9f5aaf158ff24de8390e1e88
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58a1beff72149420d2a67ee6f5a5cb085
SHA17602dd544d8dd1d4ed1d86ae3be5c25d52aab9bf
SHA2561f5619095f7f2d2619ab5a8716304fa6988bcfc8af72bec3743182840c1cd514
SHA512b1eb0778ee6c67fd614b0ed7c0789d9c9fc864e8df0e0f1e3e7002144f4062e364c59090ceaa5fda4d89420fa0c59e2cc90947e9ce143ca744e65b692b793e1c
-
Filesize
311B
MD59105750f17d90587cfdb3073e3db4b41
SHA168299e57ccb94050710511c9fba7f144af55038d
SHA256325bea9d40295cd711d613b7dcb0958e04a537f751b177573a9c40303a4879f9
SHA51207fcd8e2811bc7d8a481694d32a8d220a03ec99dfd8b9f55de99ff8327d392c6afbd821358b5087e29120b5a6d706f258c723585d3c69a26c1b0c385722256de
-
Filesize
11KB
MD56f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1b6ac111dfb0d1fc75ad09c56bde7830232395785
SHA256b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
SHA512a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
Filesize
3KB
MD56b6888981cf28ad6060bf74a6310d40c
SHA15eab9777cfcf3be44dd621eb3a7abf482df3e7f3
SHA256d429f4b6cda0bc7014c10f05cb4d9a520cbabc6b297c4e8cd792b2b5e854d987
SHA51264c6d6ea608e1c5d0c3a952caf5816a16d31212e1bb9e62b76710b4e9dd751023f3d8c58333c73cf79c7aff0fafb1143290b0666a7e20b798c3e52a563a61655
-
Filesize
2KB
MD51b5c9ac81d0db16bdef65bb8ed4401a1
SHA1b45a09049cdabcdaa104e284bb457aabf9e02909
SHA25679f8f465d0ad808a0c2bc0bd79cad80d1f2ec0e92df2a7b9d79d764bb0308535
SHA512c2d6146fad4289a9f6b502872f102dbe7678bab74f744810845ed80d137620b3ea45b8141f2600cc557df27f3e79523df6ce8bc9fc2947798f2171034149076c
-
Filesize
3KB
MD5c22dce2c95e3fbc8ac2f569b7fb8474a
SHA19e5b1c407424004fa5c0c1d96af96a9b0e10353e
SHA256423cad4eca8206b5b3ef851278a749e5246042e32759abe6b2026d14ed2ba6d6
SHA512f516531af2f75cb949ef6fbd2bd18e12aa07f94e2b7cb1398d0b13033f84c91f32ca28dc76c6e8caa8191c7b115a3cf59fddc241bfb3e244ae50247c6eee69f1
-
Filesize
207KB
MD52fcb0be151595ca64a870aa356c0db8c
SHA1e9ecdf81188a5fc3800fbe4b2856c04cbb838def
SHA25658c63bb36f82c489fee50f4f460fb0467abf158200d512c0b007b8111a53b00d
SHA512bbaa13b73a94c1c4c421e99e148aaadc2f01e2b2e5fe49f1bd8c36ddca7592b31660a3e6daac045dc6d92a93028b4b21ea87f7290ee353adb28d43188ad01690
-
Filesize
1KB
MD527e50efcbb4721aa1066d9eef0179cda
SHA1cc5ef6c7719268b61ee884c57c164b1325702309
SHA25637aa025bb5ef92eca0d19bc44b2b88aaef1225359f05c4eae5d550598b378391
SHA5124c00be8d0b0d1a1e9eeda49608bb71f1a117e6d2169b5ead97a22f799592e4796b17a1ebd7304bba135134e243a9df04e18c4a4faeb3836f5eccd7b2fe113245
-
Filesize
72KB
MD59b35870798ea01e8e943091ec7a0bb80
SHA166650be447dceabd4ba938ccf1a9663f2eb99a91
SHA256663aa24d2ef5cc3a0f0b8e8e575643c59a37b4c0fd7d7b2cf5217f14c9eb7309
SHA512b9f297a2cc255a7aac51ff2b1e45f6985359968bfe88b8e7201f7ecb5b16bfd97323042a29ad87e149c7994d9e16b034ebe1b044bffc6e2a98ebef2997656279
-
Filesize
258KB
MD5c24367dcd19f9d4a3f36fbd3cd1d8c11
SHA1332541a2416b70cf23fbd02b82bf2c807dbcb3d7
SHA2563e478bb8de1bbbd2744d7c467220ba0373ce3f636eff55cab6c0c3b27ecd30a1
SHA512a4a8c48b49910c71619578ad9e58998bd236dffb396d29733c58078b659042f03729989fe4fa537078b6aa33b4025b4711e6f0e55cf3c0996911f70b86791411