Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 23:52
Static task
static1
Behavioral task
behavioral1
Sample
c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe
-
Size
191KB
-
MD5
c7df36eb377bc1d7965c5168b261ec5d
-
SHA1
5f046f37524868a8213d9b86f83ee57ed5140598
-
SHA256
0771142a235814ff46baa6de400da78a31a7fb77fd3919e1978fad59edf03c20
-
SHA512
f3f7ea21fff12888f9451185039052f330a724707688ac8e3791f28eddf4a8b00ee5a8c0bb30c8d96749c9e9e643bff51b6ee335f8f36915722e7ba9f3540b6e
-
SSDEEP
3072:MyAaQqe90u5DdXJ745v+fxqGM1CKnXWE2J/ENGNTHO8TsgqVLZERioMCxrPY3KFC:MyAge9RVwAa0KXWlENkDTyV1ERioM0bq
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.sims6n.win/83F5-2203-2253-0042-F7C4
http://cerberhhyed5frqa.adevf4.win/83F5-2203-2253-0042-F7C4
http://cerberhhyed5frqa.fkri48.win/83F5-2203-2253-0042-F7C4
http://cerberhhyed5frqa.xtrvb4.win/83F5-2203-2253-0042-F7C4
http://cerberhhyed5frqa.cmfhty.win/83F5-2203-2253-0042-F7C4
http://cerberhhyed5frqa.onion/83F5-2203-2253-0042-F7C4
Extracted
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16389) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\raserver.exe\"" raserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\raserver.exe\"" c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2696 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\raserver.lnk c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\raserver.lnk raserver.exe -
Executes dropped EXE 4 IoCs
pid Process 2920 raserver.exe 2936 raserver.exe 1336 raserver.exe 1736 raserver.exe -
Loads dropped DLL 8 IoCs
pid Process 2376 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 2376 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 1028 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 2920 raserver.exe 2920 raserver.exe 1336 raserver.exe 1336 raserver.exe 2936 raserver.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\raserver = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\raserver.exe\"" c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\raserver = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\raserver.exe\"" c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\raserver = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\raserver.exe\"" raserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\raserver = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\raserver.exe\"" raserver.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp2BA2.bmp" raserver.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2376 set thread context of 1028 2376 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 31 PID 2920 set thread context of 2936 2920 raserver.exe 38 PID 1336 set thread context of 1736 1336 raserver.exe 42 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2696 cmd.exe 2596 PING.EXE 956 cmd.exe 588 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000500000001a4b9-61.dat nsis_installer_1 behavioral1/files/0x000500000001a4b9-61.dat nsis_installer_2 -
Kills process with taskkill 2 IoCs
pid Process 2612 taskkill.exe 2264 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\raserver.exe\"" c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop raserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\raserver.exe\"" raserver.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D88A9D61-6598-11EF-BF89-E649859EC46C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000016401092b4b87648104354ea7fafc462989e6990f32dad7c94321eeb70e85ca9000000000e80000000020000200000008c35974ce1f50004c48875f37d827d7bd38cc4b74684eed7faf7c29c0f5e90372000000086bb1ac36121f7af580a92706495779593f786882b5a22b6430ca51449acd68740000000cb34068590a9f5b70fee1c141d8b5582a540baa392702dce888edf669d464e8e524a0c438e7e3cbba48057bc18bde61c34b82537e534ccc1dc98721555fbf810 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D87EB681-6598-11EF-BF89-E649859EC46C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ed419ba5f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2596 PING.EXE 588 PING.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe 2936 raserver.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1028 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe Token: SeDebugPrivilege 2612 taskkill.exe Token: SeDebugPrivilege 2936 raserver.exe Token: SeDebugPrivilege 1736 raserver.exe Token: 33 3068 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3068 AUDIODG.EXE Token: 33 3068 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3068 AUDIODG.EXE Token: SeDebugPrivilege 2264 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2412 iexplore.exe 992 iexplore.exe 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2412 iexplore.exe 2412 iexplore.exe 632 IEXPLORE.EXE 632 IEXPLORE.EXE 992 iexplore.exe 992 iexplore.exe 964 IEXPLORE.EXE 964 IEXPLORE.EXE 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1028 2376 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 31 PID 2376 wrote to memory of 1028 2376 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 31 PID 2376 wrote to memory of 1028 2376 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 31 PID 2376 wrote to memory of 1028 2376 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 31 PID 2376 wrote to memory of 1028 2376 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 31 PID 2376 wrote to memory of 1028 2376 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 31 PID 2376 wrote to memory of 1028 2376 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 31 PID 2376 wrote to memory of 1028 2376 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 31 PID 2376 wrote to memory of 1028 2376 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 31 PID 2376 wrote to memory of 1028 2376 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 31 PID 1028 wrote to memory of 2920 1028 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 32 PID 1028 wrote to memory of 2920 1028 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 32 PID 1028 wrote to memory of 2920 1028 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 32 PID 1028 wrote to memory of 2920 1028 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 32 PID 1028 wrote to memory of 2696 1028 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 33 PID 1028 wrote to memory of 2696 1028 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 33 PID 1028 wrote to memory of 2696 1028 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 33 PID 1028 wrote to memory of 2696 1028 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 33 PID 2696 wrote to memory of 2612 2696 cmd.exe 35 PID 2696 wrote to memory of 2612 2696 cmd.exe 35 PID 2696 wrote to memory of 2612 2696 cmd.exe 35 PID 2696 wrote to memory of 2612 2696 cmd.exe 35 PID 2696 wrote to memory of 2596 2696 cmd.exe 37 PID 2696 wrote to memory of 2596 2696 cmd.exe 37 PID 2696 wrote to memory of 2596 2696 cmd.exe 37 PID 2696 wrote to memory of 2596 2696 cmd.exe 37 PID 2920 wrote to memory of 2936 2920 raserver.exe 38 PID 2920 wrote to memory of 2936 2920 raserver.exe 38 PID 2920 wrote to memory of 2936 2920 raserver.exe 38 PID 2920 wrote to memory of 2936 2920 raserver.exe 38 PID 2920 wrote to memory of 2936 2920 raserver.exe 38 PID 2920 wrote to memory of 2936 2920 raserver.exe 38 PID 2920 wrote to memory of 2936 2920 raserver.exe 38 PID 2920 wrote to memory of 2936 2920 raserver.exe 38 PID 2920 wrote to memory of 2936 2920 raserver.exe 38 PID 2920 wrote to memory of 2936 2920 raserver.exe 38 PID 1556 wrote to memory of 1336 1556 taskeng.exe 41 PID 1556 wrote to memory of 1336 1556 taskeng.exe 41 PID 1556 wrote to memory of 1336 1556 taskeng.exe 41 PID 1556 wrote to memory of 1336 1556 taskeng.exe 41 PID 1336 wrote to memory of 1736 1336 raserver.exe 42 PID 1336 wrote to memory of 1736 1336 raserver.exe 42 PID 1336 wrote to memory of 1736 1336 raserver.exe 42 PID 1336 wrote to memory of 1736 1336 raserver.exe 42 PID 1336 wrote to memory of 1736 1336 raserver.exe 42 PID 1336 wrote to memory of 1736 1336 raserver.exe 42 PID 1336 wrote to memory of 1736 1336 raserver.exe 42 PID 1336 wrote to memory of 1736 1336 raserver.exe 42 PID 1336 wrote to memory of 1736 1336 raserver.exe 42 PID 1336 wrote to memory of 1736 1336 raserver.exe 42 PID 2936 wrote to memory of 2412 2936 raserver.exe 43 PID 2936 wrote to memory of 2412 2936 raserver.exe 43 PID 2936 wrote to memory of 2412 2936 raserver.exe 43 PID 2936 wrote to memory of 2412 2936 raserver.exe 43 PID 2936 wrote to memory of 2428 2936 raserver.exe 44 PID 2936 wrote to memory of 2428 2936 raserver.exe 44 PID 2936 wrote to memory of 2428 2936 raserver.exe 44 PID 2936 wrote to memory of 2428 2936 raserver.exe 44 PID 2412 wrote to memory of 632 2412 iexplore.exe 45 PID 2412 wrote to memory of 632 2412 iexplore.exe 45 PID 2412 wrote to memory of 632 2412 iexplore.exe 45 PID 2412 wrote to memory of 632 2412 iexplore.exe 45 PID 992 wrote to memory of 964 992 iexplore.exe 47 PID 992 wrote to memory of 964 992 iexplore.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Roaming\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\raserver.exe"C:\Users\Admin\AppData\Roaming\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\raserver.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Roaming\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\raserver.exe"C:\Users\Admin\AppData\Roaming\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\raserver.exe"4⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:632
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:537601 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:2428
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:2308
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "raserver.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\raserver.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:956 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "raserver.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:588
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe" > NUL3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2596
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BCCC3EFD-D5B3-48C4-875F-02B1F3885055} S-1-5-21-3450744190-3404161390-554719085-1000:PDIZKVQX\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Roaming\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\raserver.exeC:\Users\Admin\AppData\Roaming\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\raserver.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Roaming\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\raserver.exeC:\Users\Admin\AppData\Roaming\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\raserver.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:964
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:1260
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:3068
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5bb2c0d5cfdd620b7018afa185b5f7432
SHA13a2138722e18d4c529e4a6ebdb9784348a776bd6
SHA256e255aa43302ea6a07e4044439ad7b891654c63dfe593d9091117bd73631a2ef6
SHA5125f2cb107bd191b048c6358ff12da6a92204c2af29e113b7d229e31c2eddcc1bf803d55db7dbcbc5282d5307bef69802e09c5507d8c1e66b36392eb7f99d3ca85
-
Filesize
10KB
MD51d3f9429c3b6c5f0ba9581f1a10c5ba0
SHA13b96960e639c474402c160620d44bb845b78ef80
SHA2562a34a6f830b8a98c9c241851bf146a8ba4245f90adbdab5323fe9036100de640
SHA512ad119ae49a923714e1c699083d3cdd61f3dd5992bd2adcb388d7d4715e45af7be8641e3e0a7add1c65abcfa193426cf297e7c433a522cc50e2b97b82a2eb904b
-
Filesize
85B
MD5b650670a23a808a909fe5f42b6c24537
SHA14afce8a8f02590efe40b43214f76a31af0856d51
SHA2565e079afb25f97861c13fcc78eb218da76316c2cdf501d5535f28ac142d6b1b2a
SHA5123e0981aca7440aa93d75515f136d63d85f1c949067d4e4e0c919a9137e4dc2653d8de0af499527240622433cc67f58a41a9abb2fa7ca6ba39c8c16917a06e357
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d3c4098d7ab9df9df1174ffce1145ba9
SHA153457079316964aba5dfdfd8d304b18f1821793f
SHA256d3ec2084fbbffaf34dda9c155ae330d99044a05712745245ad0fa62f2ebfbd2e
SHA51253c7762ce159f14eb2164723a0d2c68bd97d4295eb7a1bef5c906fc4fb7e1ed1041a873a27145827dd73e0483806ab681af132e21bf2f7f9177f998d037b3d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53c81ca5cd2fd0be188a53b21429314bb
SHA1f5b0bbe35510ae43f3c89aa7859ce5c0d720d3da
SHA25683e63e986473882cba8115481fb563628e4abb1941c088a6d91428700a4f3280
SHA512ce38a22af7d8111f3c1510416114a1e3f17ddb10dff98869612f5dc6c31ca5bee4a99d54c3c9ecfee3b68f4cdb4624d9ea62a184514087f25b42ea43286b617f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c664e777a584d0c2020b5a8b155dad4c
SHA141cb3130475af9eed30b4b730159eb47545e9e46
SHA256e6e54c96da576c0c63321cb5c390ca4f8dea1082cd389aa8f43475d618042b5f
SHA51276bd309e963067c044b9983f1605ad3ed59cd1e936e9450c956ab0bcf4b2519fb8e00f01ecee83dc534aa7b4a0d6bd2b173e2c7387953b795f791e3660797292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD586123b5875f0c8f4d27aeac386197d1e
SHA15f6340e4786c62ad948d841bbab5397a1dcbaf24
SHA2561bc7c7422aab885570170197632834cc50bca1306cd67227caf754430ed4f6d6
SHA5121a4f44afa7110274e1c60e409775daaf1b7df391ee0b36ffe47b8237b0506ecb52b99b6c08dfdda8acb600a350e0412acb1fe14d64e1cc541b8c6a6a5ba16366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD569318ac01051f01541a5bff6ebefa00e
SHA13cfa155aaa21051e3c89af041a99c077e3ee590e
SHA256aa6cace6a5b5d263db88401725614d12258bcee0f28e45d73b375a2ecac3bd3c
SHA5128b21cb23f184cfd3674346d7596ae9e7e704c76acdf963ba13872639eb045d8cfa1a5336d66b928ac03fac20e8a3e73466913c6a60b9f2b45152120344c1d47b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD560b113d42bee89a77c7af26b97f2bd42
SHA11300b2cc3a5c7ba94a7ebb6c5f8edaef09081acb
SHA256d034734c02a03d72b8d07045510c8cb7a5669a17dec9f5c60a3f8ec506530509
SHA512c6b62e5fef281057b389b16ff40baf5082b8b53c7a4da888560cc2517f0c39794519cce28d7624bea32386ce732593890d3ffce0d2239d9ba21d1f3bb1e8f28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c1c6a722c2b2de1f78d74b9286a18f4c
SHA16dc17e48a27fee1430910f8df62343f381f0c92d
SHA256abf2d02674844c694c4405f76f42bd9f7b2264f9b470bf3c92588ae455e9a207
SHA512d41fe6da071863001840b2734b97a3215483481a45879b6ffa4afeee3cc16050dc0b78318a70b3f7b0051314d8be7706892d315b69ce203112f3a1db6fee61d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a5816fa04edd28521f25035270833fea
SHA19a0e94bdd59e6b3bca6e0306cc8053592d4963f0
SHA256adf4fd3c9e0a27f9c363cea10a435f5e5c6aef65ebc259ba952af4fa7b3a347d
SHA5128554089cfdb5c985402e073665fa7480cdb67d8e2c4be5b39af5f9ec4cc4e125a9cd3530f02f7938a71d820c9b5884963fb8462f397bb3127c22d097639a06c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51f596926a5c01ac02b96361f9be4ab33
SHA152a796bc11bc5f416259f1d6ffb35fbb0a81aa42
SHA2566cbcf912fffd2eea52dbfe3dfd426f549efbe67a1952dbfa66d64da409ab20f8
SHA51223a0f3045ddd8b8784f31e29a98fb27c64b92068231e43bca2fd0b75a749b4dc2f2f6ee21c570ba1245a52086af2d7e7874aa1aa612aac52ea304e2771d49167
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD56d5f1f192e1e5dcb3feb43b9991f60ea
SHA10e65b9f9351483ddeb91f7a7b13584558df96616
SHA25648dc83d59cc2968c4c80f453d6931a2ac36e7365003cfe6f07d86c211b973bd9
SHA51287ed46419fc99f0299ac64adfa5abab5ef5a649a41249e1888b8311904b762895d50de52d65a6184c8608451a54de4b0b18552b39ab5826eba51836cd5002eec
-
Filesize
640B
MD5c98123e95a83670c84ba0e3975ea7adf
SHA1eead94e70f84f44b479f48e7bca718da105b9d22
SHA25655a55277a99de117c73ce703de8b00da09bee122498a2b83776192b723a9cb1e
SHA512b25f4089fb985e2f830ef9ebf59e8eb298cfccb6b3fb27328f9a915be52c19277b264a17254efe771db73e795d279c82fcff7ce87c5c423fdf81adc606317868
-
Filesize
1KB
MD57682d2239c18a25040d9e78b0e139743
SHA1f63cfad85a557169207b85aa644101c89f60f299
SHA256eaf892b9c065b602c5d7e5a92349c756e2513838a51c1056f7267db428a3a0ef
SHA5129149070ccffbeb37dd54d78eabdebc54dbbcbfc047f1617ab51ef5a5e62fdff1f92fd425e264543feec079bdfe9279b1f462f8d8d6904c0676263fb6d8ec366c
-
Filesize
1KB
MD5b32ee0da29e26569bd038838f1928528
SHA18d50ef0a8ed90ea61ff3393009e795b3cea4b590
SHA256b560e11a6bb6d7585b216bf2139ab01f36636f9054d26a4179a5b6ca8080ccfc
SHA512f1ef5377936a193465117ccce25e6c4b90628a32eeca1f2a40ae5ebe170389bd41462bca9684916d8809e74da3c208a5a5902e2908982fc52bdbca6618ac6679
-
Filesize
585B
MD50b49103fe701234d0b1ea1ff208171c3
SHA1ab271e83639fb2f9d35358ff0338d1790dd76fc1
SHA2562998ad144e0794a54caeded2fd839d792bf311923a4f513124cee0f8bc6aed4e
SHA5121b31edaeb6cd7ca6803376271d00d99080412bee18764ab28004a0d3dcccdef5b9cfefbaba59e3bb9bea9bfd448b3ac0ba143bd495ab5b164b1b644338e3fa9d
-
Filesize
524B
MD5f603a2c217b5b63995d8c39730d35491
SHA1bb25bbde47ecb5f2c40db35c9bd4f6621a403337
SHA256bcda37996eadb7820490356c0f70c4f47811bea513b48de5e1566c6f365945e5
SHA512c2ff6fe9761eaaf520678989d516819349aa585d872dce806aca137ae23e934fee8a1462eed68cfd4cca15db40ddd02e9d32f9c4f9b69f46c267162cfa2ceb8e
-
Filesize
85B
MD5313a92eb9dc6f52cf9368d7bdb49f636
SHA1119974836f996a58a14584497d853e3f24b68057
SHA256cde9b6a758da6349dc02027cc178ff4dd2b51676844935d134456bc814b74bdc
SHA51215a851200cea62c693f3ceb03d56e77147aaea7d1019da66ea8cafca627a1316115a523c8f4f2aba9f4869d7e2cceb1e72bd328b7cdb7a11aa3f3f9a7b336d21
-
Filesize
485B
MD5ad8baefe636e08b8d937ee4303d37231
SHA10f58d13ae045ea62f4f64dedd7de4bdfef7e985c
SHA256b510a9f128b96f387a21d7b719fdc1d7ae81480a94620d11456699fd76271442
SHA51231b60710c0c59c882d21dd9d4eb5449c62e4f1bb75366d2b006b68f28e49f7cf63058272c0e2f8621d4bc80ccde0cc1e4cfdb503f3a513f0e2123c97524cc485
-
Filesize
39B
MD531296c038e3154364571e61b99f8579e
SHA13e1433612c2e7f61a1310ee47d6f4ce27a2e694e
SHA2564443ae9d463bf4bdde7812237ab097327ec1d23a3f4e12b319899f2cf7a0dbb0
SHA51242ae2ae55d5dbc85521cf5c4df9d510b610a62038ca6800682aa95e406b3ec9316f4c74782657f7a99e125b1a908b6ada7bb32b81a46a425f6a5de5bb88d33dc
-
Filesize
3KB
MD57cd4291588c932a60b8db4ca8d336b9c
SHA1f5716cbcae64d72dcc622418587b125b832e943d
SHA2569e51838001368de751bd0ab37da350d5d0d6f50016f6271807c0ee9be55ddf21
SHA512d4bdb75c0dfdee9d39eecbce8a7f43895fb2031fa49c16567977821065fc7d5edf737c0dc8f3a91ee4a3d22b89ae7bb6b38c15f6b0238b956e5aa95098d0d290
-
Filesize
4KB
MD515b9f0e2441fd17618d7a7fc6e9311d2
SHA1446e32280d884e0fb9c8e804d8818636b0cf2cba
SHA2567516789b109fc823443cb40dde8c6d5a4d81e7598123bea4c767de1eb7d1243d
SHA5126ac1bd67b7cad14383c823680798f8cb36327a324bb99e8aa90598e1add9acab45ff371833bcca245a31018d941d059816de372966ee4312c5e875e0367c157f
-
Filesize
1KB
MD5ef627124721490d26fecd2a106eb6862
SHA13b65c37c5942591609a816424bddbe91ccccfa73
SHA256aa345a078107a81e8c52607fcdd938f944a6838d80c93a42183c4da08dc2e6c4
SHA512fe1b70078d01737ffbab3d000bf81ee5cc5fe718c5a477c888714ada6638224f538eba7ecb542d1ebab5c39b2b9a8630875e14e540af96ab5b1369124103e9d9
-
Filesize
27B
MD511f8e73ad57571383afa5eaf6bc0456a
SHA165a736dddd8e9a3f1dd6fbe999b188910b5f7931
SHA2560e6a7f1ab731ae6840eacc36b37cbe3277a991720a7c779e116ab488e0eeed4e
SHA512578665a0897a2c05eda59fb6828f4a9f440fc784059a5f97c8484f164a5fcec95274159c6ff6336f4863b942129cb884110d14c9bd507a2d12d83a4e17f596d2
-
Filesize
27B
MD5a5c7fa421ee9dc0d1d98f366aa9b4497
SHA1ced1602fad5f086ab6a35b64c08816879790162a
SHA256cd05c73a160de891afc73c2f6b313ac10551eb6d3a0b750b650367ad26b81884
SHA5129277c33f587b47482b3855bbfd3a943d890eae9b85ab6be54339fde3201154e8e45b2725d633ac1ad41ae3be3239a769f19b3474c3b21cabe2531d12a03ab968
-
Filesize
77B
MD5c5212e7e40cfb0cd10d4cfc7012a22d1
SHA126b1ae1d8c1c75ead9d379ce76c37d33d367ab1b
SHA256ac112db94e34658ccb71484b86b88904dc8687e2a09f7fd11debf436db89ed3b
SHA512188a4a28e2defd7982233e39dd98b6954a37b0def69b6b99f1333f675654de1853eb51ad719330c669bc7a9a13c475a8b0394e4ab7dcb8d6b33c5e03f323c8a3
-
Filesize
125KB
MD50b298daf02c3cbad292d54184a9a76d0
SHA14cf348ddf9f67c7854202c60eed2d5ec1852dd53
SHA256edaa99dc77883779efafe28b50364e6bbf8aeae95b71aadfe1f2503de413c1cd
SHA51276423b8f0318740790f8bdff23b6678d6b5af8549b6c055aced53f76e73f38bc1b71dd1f3463369ba2f680acc8724d3e8e23ad2b22683e95d84b001482e37a47
-
Filesize
1KB
MD5a4abe2800a7bb6adbb29d67e2421cf62
SHA1b6a9d8371e9c5dec128a4eb33aaf31c5c3be839d
SHA2566c4cf184443929b1766a84a0b6ec7b441227702c4ca5fa16dcd7b9c79e28e2ca
SHA512e1c4e1e1810eedb6337f9e047357d9759ba887c6815e2b4c4e612f2122be9eb406270ee8471a34fe67e2abbb21d4ebd2903f6b9d93b11200adfb01c5bbed122a
-
Filesize
1KB
MD5ca41559acc4b1b1f63bd262a588a31b7
SHA199946001f1fde3363384a77b04fd249ff99afdcc
SHA2569f5bbe934510b03198858861e7f35085808a1c0a89ae7f9da8e3b9e9155cdb78
SHA5129a2cc46381124b848e618f29192fe28d1792ff6b2054e7a9fcd9bf1bf8482b960a04fc5d4b2098499292ebf950d1d472aaadbfbff6919db066c292780c32c92d
-
Filesize
4KB
MD5dd3b3d2e4b33573dc9314c195ec16ad2
SHA1cff1a2cf0288e3941d47e3847daf3acd2ccab328
SHA256d3866fb4241b3069a7d7bca80dcf0a4266c6bf08b1142df51c5b993abeacd0ce
SHA512f5eed963ee7fb793d2f4944878a0cffd2d88de498a7a3cf58ddcf03daf7f2cc9a634f43124812a9e994411fb5bbaa8954b5d03b6ef3bd3dfac67c2706627bacb
-
Filesize
2KB
MD5ee1ea399056a74f3e90996b198b23533
SHA11bf06bc18cd19e769a23fb1c7dde3ac82d1dc05e
SHA2560d5620c426c14276135373978f381b53dc5d0fd0b9c3ec0d07e597eb53f8c3ae
SHA512497222110bb4698ef6034b166577c53c9c06b48c26bcbe2dfcb97299fee0aed7268e3733c171a019ddafe92cbea10795cf3ae2995bfed94e2127a9e83c09a0e4
-
Filesize
108B
MD57b43d30d4ae41144de0bdf0dec1ca287
SHA1b22140ddf86afd5ec099098b5f4282c62a14246c
SHA256cde318a46a1b354eca6a1f02e7f0d8c1118abe4c032330d04f25d057d99281b4
SHA5125d8b58167c8019c0e93a8eab5a48f9a04f5ec0b9d71c87931ce7c2280c8e58d3338a2698d4519ed0c5fb60a4287c6105965a3ebcf23d527d8c78eb78d1ebf0f5
-
Filesize
4KB
MD57ef5e8f497d92a03e960c8c43cfb805c
SHA13ee56f16fafb757da51306c5a4710f096ca4cc32
SHA2565d3e3207a2a1375c110ecd8296ed77972ab5a5d517ebad6c0533a11cbb646812
SHA51283b329aeb3e893eaf422994495594aba0134044de39ae98f8966d20a50c28e100daad5e5f7bbb0dedd8983a1a9f62564cee4aa0822d684e38978db104a43b166
-
Filesize
287B
MD5c6ff2cbe837f7bb191a3dd17f855c7d4
SHA1d8a837f474a2c432d60e02d8117ea1cb2a5a873b
SHA256bc16225b3aab11c8f32020b76a330fc37eb0acff6ad21fe2f5d94fd4459288b1
SHA5120f8b53824bc8447695d72ea948e6c404fef9e3950304b8ac8da2bb39d9d6073f951e4c587fefa4cc246599c259e04ecfc5370de13623eac008e66c3cfeb58263
-
Filesize
3KB
MD5d5ac73cc778c7f4047eac63c162a1996
SHA1af275b4f656a5beda641c4fa5cbd5c9cc2622c5b
SHA2560c63d814477288aed4e20c2b898cdc8e343d1b9d4b8991f4191e998a1652940d
SHA512e2151b6c32e0d9d2ea9e64cfb74709271b4494867b029f6d7af7fb297d84a2204f66bf724785b667b5db237a6dd128af0842419c6da259bf2f90a890a431bcf5
-
Filesize
1KB
MD5a9525c72b61ca351d7adc155866f3331
SHA11acd90bbb46c2d8ede1018bb62e8fbf4b788326f
SHA25644f7115e9c4a02f1a1d712ba719094c5e68f7850bd9247dc14d381ac53ad1c19
SHA51215d2512ab113662728af610d2c9c2583043bf20b53433a2e1aa11590a3c61da6a48c0ba8bd7268abb7ca4e5bea9f54cb95bc397a004490b4efe134b2355d431a
-
Filesize
1KB
MD5f7680db2f3ca203a38412d3fbd5a7df4
SHA1f3789f83109ea8277428c5e5bbc624ba6b610ac4
SHA25665fc65d02fc9a1ce34795bc08937f592df73602e8e19376c89d689a92fe002cb
SHA5128489955f064421a07b20eb8d5a9da743aa5d860b6e475614b7523ac060e461a87320b4f49f166feebc85b03ed9fe9e330e5a3df2c5497d47134f3d396b84ef58
-
Filesize
1KB
MD5df3ab2210fccd0c5d8b4279fd4391417
SHA17dac476b07ed01ba6a971a6eaf764924cebcf339
SHA2564c4cbcb81ee87fb708e52a0f22e85b2ba8331db31f5f853387c149c975c1fa8f
SHA51204c07790f3b9d80da43b61ccc1186480b22b90f69e958a22afaffcdf2f2d2c55426cc64ec0efc3e7966cf05e2468c725e98df1b4590d1e88f541af74df3e8cb1
-
Filesize
1KB
MD531a4f57993e8039d7bc4dbd31184c397
SHA1cec7bb8a22245eb3c0277c50fcacd27d10ebe722
SHA2568af5c3a634d4ec1ca556d442ca1fe3cbc41401a4739758adf6af0a8743d0e0dd
SHA512aa09075a0b7f8717976450c11ac17cab24dcc1cc118b4521c53bdecc1ccf66f1febcae92e6b55936a60e278274f4b57408a15f090e460acf74769159aefd1822
-
Filesize
932B
MD597ff50949348e378d3f177af3ddd68c4
SHA1650b87565a7e1806eeabdddacf49840d72736791
SHA256a23a733e4d6b2bd48d9b80d60c13f34f0ba8b0bc1d00d0cf33497e0d3f47a632
SHA51225485dd166febeec416f6080daedba400f1738813269d94477e7d5630e2d3591842ec095f6561b3ba615a231d68c68b2b1bf1c1c8dee34a45a7eb991ea06d8db
-
Filesize
2KB
MD5eed8f97cfcee662001cc34f0ca382db1
SHA1631106c6b1d5b6e70e670b2f4eee3757c072f13a
SHA2568d330af6424df369cf4e383ff5dd374742cabce0fdc8473bb9e12ccb5ad7649f
SHA512b5215164ef4a5169c6e1888031f98a0048ec9b00ffb85dfdfb572190e70afb4e080c94c7a514ed8beab2e2551ace99ab9f4b3deb556d011af2982fbb4d630fc6
-
Filesize
11KB
MD56f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1b6ac111dfb0d1fc75ad09c56bde7830232395785
SHA256b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
SHA512a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
Filesize
28KB
MD56a4ed02f66d624facceac22f19a3266a
SHA1b1a7ccf40b3433bc0ea5ac4dc38f0afcff9da81a
SHA256981c41a566327583e4335ce439004c9728e2a810a95735b990e97afd37d617c5
SHA512bf722437bee1bc0a267d3fce0fb600ca2f2e9f1d4fc2c2a4f9c9b31d865c4ba1430e12f8cfa8db187035e583404021fcab214efa67b089648564d9504b30aff8
-
Filesize
191KB
MD5c7df36eb377bc1d7965c5168b261ec5d
SHA15f046f37524868a8213d9b86f83ee57ed5140598
SHA2560771142a235814ff46baa6de400da78a31a7fb77fd3919e1978fad59edf03c20
SHA512f3f7ea21fff12888f9451185039052f330a724707688ac8e3791f28eddf4a8b00ee5a8c0bb30c8d96749c9e9e643bff51b6ee335f8f36915722e7ba9f3540b6e