Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2024 23:52
Static task
static1
Behavioral task
behavioral1
Sample
c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe
-
Size
191KB
-
MD5
c7df36eb377bc1d7965c5168b261ec5d
-
SHA1
5f046f37524868a8213d9b86f83ee57ed5140598
-
SHA256
0771142a235814ff46baa6de400da78a31a7fb77fd3919e1978fad59edf03c20
-
SHA512
f3f7ea21fff12888f9451185039052f330a724707688ac8e3791f28eddf4a8b00ee5a8c0bb30c8d96749c9e9e643bff51b6ee335f8f36915722e7ba9f3540b6e
-
SSDEEP
3072:MyAaQqe90u5DdXJ745v+fxqGM1CKnXWE2J/ENGNTHO8TsgqVLZERioMCxrPY3KFC:MyAge9RVwAa0KXWlENkDTyV1ERioM0bq
Malware Config
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB31
http://cerberhhyed5frqa.adevf4.win/55E8-4626-DBD0-0042-FB31
http://cerberhhyed5frqa.fkri48.win/55E8-4626-DBD0-0042-FB31
http://cerberhhyed5frqa.xtrvb4.win/55E8-4626-DBD0-0042-FB31
http://cerberhhyed5frqa.cmfhty.win/55E8-4626-DBD0-0042-FB31
http://cerberhhyed5frqa.onion/55E8-4626-DBD0-0042-FB31
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16402) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\getmac.exe\"" c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\getmac.exe\"" getmac.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation getmac.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\getmac.lnk c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\getmac.lnk getmac.exe -
Executes dropped EXE 6 IoCs
pid Process 1164 getmac.exe 3428 getmac.exe 3080 getmac.exe 4288 getmac.exe 5180 getmac.exe 5804 getmac.exe -
Loads dropped DLL 12 IoCs
pid Process 888 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 888 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 888 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 1164 getmac.exe 1164 getmac.exe 1164 getmac.exe 3080 getmac.exe 3080 getmac.exe 3080 getmac.exe 5180 getmac.exe 5180 getmac.exe 5180 getmac.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\getmac = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\getmac.exe\"" c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\getmac = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\getmac.exe\"" c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\getmac = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\getmac.exe\"" getmac.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\getmac = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\getmac.exe\"" getmac.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpA07C.bmp" getmac.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 888 set thread context of 4692 888 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 91 PID 1164 set thread context of 3428 1164 getmac.exe 100 PID 3080 set thread context of 4288 3080 getmac.exe 106 PID 5180 set thread context of 5804 5180 getmac.exe 147 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language getmac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language getmac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language getmac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language getmac.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5092 cmd.exe 5076 PING.EXE 5868 cmd.exe 6008 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023514-50.dat nsis_installer_1 behavioral2/files/0x0007000000023514-50.dat nsis_installer_2 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 1680 taskkill.exe 5920 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Desktop c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\getmac.exe\"" c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Desktop getmac.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{19923940-1D30-C683-172B-F15FA51771E4}\\getmac.exe\"" getmac.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings getmac.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 5076 PING.EXE 6008 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe 3428 getmac.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4692 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe Token: SeDebugPrivilege 1680 taskkill.exe Token: SeDebugPrivilege 3428 getmac.exe Token: SeDebugPrivilege 4288 getmac.exe Token: 33 164 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 164 AUDIODG.EXE Token: SeDebugPrivilege 5920 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 888 wrote to memory of 4692 888 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 91 PID 888 wrote to memory of 4692 888 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 91 PID 888 wrote to memory of 4692 888 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 91 PID 888 wrote to memory of 4692 888 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 91 PID 888 wrote to memory of 4692 888 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 91 PID 888 wrote to memory of 4692 888 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 91 PID 888 wrote to memory of 4692 888 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 91 PID 888 wrote to memory of 4692 888 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 91 PID 888 wrote to memory of 4692 888 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 91 PID 4692 wrote to memory of 1164 4692 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 95 PID 4692 wrote to memory of 1164 4692 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 95 PID 4692 wrote to memory of 1164 4692 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 95 PID 4692 wrote to memory of 5092 4692 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 96 PID 4692 wrote to memory of 5092 4692 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 96 PID 4692 wrote to memory of 5092 4692 c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe 96 PID 5092 wrote to memory of 1680 5092 cmd.exe 98 PID 5092 wrote to memory of 1680 5092 cmd.exe 98 PID 5092 wrote to memory of 1680 5092 cmd.exe 98 PID 5092 wrote to memory of 5076 5092 cmd.exe 99 PID 5092 wrote to memory of 5076 5092 cmd.exe 99 PID 5092 wrote to memory of 5076 5092 cmd.exe 99 PID 1164 wrote to memory of 3428 1164 getmac.exe 100 PID 1164 wrote to memory of 3428 1164 getmac.exe 100 PID 1164 wrote to memory of 3428 1164 getmac.exe 100 PID 1164 wrote to memory of 3428 1164 getmac.exe 100 PID 1164 wrote to memory of 3428 1164 getmac.exe 100 PID 1164 wrote to memory of 3428 1164 getmac.exe 100 PID 1164 wrote to memory of 3428 1164 getmac.exe 100 PID 1164 wrote to memory of 3428 1164 getmac.exe 100 PID 1164 wrote to memory of 3428 1164 getmac.exe 100 PID 3080 wrote to memory of 4288 3080 getmac.exe 106 PID 3080 wrote to memory of 4288 3080 getmac.exe 106 PID 3080 wrote to memory of 4288 3080 getmac.exe 106 PID 3080 wrote to memory of 4288 3080 getmac.exe 106 PID 3080 wrote to memory of 4288 3080 getmac.exe 106 PID 3080 wrote to memory of 4288 3080 getmac.exe 106 PID 3080 wrote to memory of 4288 3080 getmac.exe 106 PID 3080 wrote to memory of 4288 3080 getmac.exe 106 PID 3080 wrote to memory of 4288 3080 getmac.exe 106 PID 3428 wrote to memory of 3180 3428 getmac.exe 115 PID 3428 wrote to memory of 3180 3428 getmac.exe 115 PID 3180 wrote to memory of 796 3180 msedge.exe 116 PID 3180 wrote to memory of 796 3180 msedge.exe 116 PID 3428 wrote to memory of 3696 3428 getmac.exe 117 PID 3428 wrote to memory of 3696 3428 getmac.exe 117 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118 PID 3180 wrote to memory of 4016 3180 msedge.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Local\Temp\c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe"C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe"C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe"4⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ff9c07746f8,0x7ff9c0774708,0x7ff9c07747186⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:26⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:36⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:86⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:16⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:16⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:16⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:16⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:16⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 /prefetch:86⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 /prefetch:86⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:16⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:16⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:16⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:16⤵PID:5344
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB315⤵PID:1408
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c07746f8,0x7ff9c0774708,0x7ff9c07747186⤵PID:740
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:1852
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "getmac.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5868 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "getmac.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5920
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6008
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe" > NUL3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5076
-
-
-
-
C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exeC:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exeC:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1976
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x320 0x4ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:164
-
C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exeC:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5180 -
C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exeC:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe2⤵
- Executes dropped EXE
PID:5804
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Discovery
Browser Information Discovery
1Network Service Discovery
2Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD52fc816d6d09bd2a20e5e86c9fddd5b91
SHA1c785449f0834c48ade85bb3a7a8d11fc818cc227
SHA256d4b827df3d84780d34edf5371b8f3eeee2fecf05eed2e92bf08df2018fb6f52d
SHA51299f648253b1ac374030f8b24f23302a60d9daef46cab67475ef40063cb828576789d67b51c82b2228384d132b4be1ebd70176074b58ccfd9fca90bfb38d1ed35
-
Filesize
85B
MD5a15789d5b26ad5373cdb93359eff19fe
SHA1acff0e3a25f1bfd24456c6d5679d76e7fcfc41f2
SHA256ebdedd9844f3f13c6bd226225f40d799165c3e596ff3ceb22e8b70904db9e0dc
SHA512bd197a32fad10706b2af9a07ccb7418faa7942031b2d6d1407e386c5a70c4764c5450a2cd6db0930bfcb7f81b5779c6f55a393dab32b20d2d5a26410eb21fcb0
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
5KB
MD51eb8df0569085764b9d29be046be4cb0
SHA1e9bb6cc5109a3a41a5e04a0905604d6e258ddd25
SHA256433c33e0999d1be78c58e789116f50d36723779c2ce60d539cb2fed475ce072b
SHA5129926aca7d170f7a64b5d13b8f9efab813f82889c08f1f17dc4a6395a4819592c9962bdbd9772ec9705bc9c4bda610f86d64a2b2238e27845691dc607e531f7a6
-
Filesize
6KB
MD5ada107c5f1f0163a0a2915a440414221
SHA10cb5f9a8116fa28b5282f11b9eeb3da586b629e6
SHA2566f4b5f9ffbdbfe58e95b250f4d39c72de2b973ac66f3ab9fe7ada52393078e82
SHA512e92e5225a3b0ff2d7883b4c15fe0ccd25e8f0fb1b9b2646b9eebe1d2ca46256e795fc744923b3b15ebeb034187835bb67f2a2d2e007ddfced1112c4eba59291e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5afcad7ee47655ced203a9a44d32ee2cf
SHA185e9cc5bd1e1c60d5483001d967ed7079579d2a9
SHA2569c0c5102df77cc5260bac3f464be76f0645d9d38e181beff1dbf4668242fc444
SHA512e11c7bdf6a61a7df13e1ce7b09f74aa277a9b809dafea56118403a55a783a0692499a5bc9627ec43dfd9cf4135378f10fcdf5192a22c6434d9ef48c25fb784f8
-
Filesize
11KB
MD56f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1b6ac111dfb0d1fc75ad09c56bde7830232395785
SHA256b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
SHA512a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
Filesize
1KB
MD56d5f1f192e1e5dcb3feb43b9991f60ea
SHA10e65b9f9351483ddeb91f7a7b13584558df96616
SHA25648dc83d59cc2968c4c80f453d6931a2ac36e7365003cfe6f07d86c211b973bd9
SHA51287ed46419fc99f0299ac64adfa5abab5ef5a649a41249e1888b8311904b762895d50de52d65a6184c8608451a54de4b0b18552b39ab5826eba51836cd5002eec
-
Filesize
640B
MD5c98123e95a83670c84ba0e3975ea7adf
SHA1eead94e70f84f44b479f48e7bca718da105b9d22
SHA25655a55277a99de117c73ce703de8b00da09bee122498a2b83776192b723a9cb1e
SHA512b25f4089fb985e2f830ef9ebf59e8eb298cfccb6b3fb27328f9a915be52c19277b264a17254efe771db73e795d279c82fcff7ce87c5c423fdf81adc606317868
-
Filesize
1KB
MD57682d2239c18a25040d9e78b0e139743
SHA1f63cfad85a557169207b85aa644101c89f60f299
SHA256eaf892b9c065b602c5d7e5a92349c756e2513838a51c1056f7267db428a3a0ef
SHA5129149070ccffbeb37dd54d78eabdebc54dbbcbfc047f1617ab51ef5a5e62fdff1f92fd425e264543feec079bdfe9279b1f462f8d8d6904c0676263fb6d8ec366c
-
Filesize
1KB
MD5b32ee0da29e26569bd038838f1928528
SHA18d50ef0a8ed90ea61ff3393009e795b3cea4b590
SHA256b560e11a6bb6d7585b216bf2139ab01f36636f9054d26a4179a5b6ca8080ccfc
SHA512f1ef5377936a193465117ccce25e6c4b90628a32eeca1f2a40ae5ebe170389bd41462bca9684916d8809e74da3c208a5a5902e2908982fc52bdbca6618ac6679
-
Filesize
585B
MD50b49103fe701234d0b1ea1ff208171c3
SHA1ab271e83639fb2f9d35358ff0338d1790dd76fc1
SHA2562998ad144e0794a54caeded2fd839d792bf311923a4f513124cee0f8bc6aed4e
SHA5121b31edaeb6cd7ca6803376271d00d99080412bee18764ab28004a0d3dcccdef5b9cfefbaba59e3bb9bea9bfd448b3ac0ba143bd495ab5b164b1b644338e3fa9d
-
Filesize
524B
MD5f603a2c217b5b63995d8c39730d35491
SHA1bb25bbde47ecb5f2c40db35c9bd4f6621a403337
SHA256bcda37996eadb7820490356c0f70c4f47811bea513b48de5e1566c6f365945e5
SHA512c2ff6fe9761eaaf520678989d516819349aa585d872dce806aca137ae23e934fee8a1462eed68cfd4cca15db40ddd02e9d32f9c4f9b69f46c267162cfa2ceb8e
-
Filesize
85B
MD5313a92eb9dc6f52cf9368d7bdb49f636
SHA1119974836f996a58a14584497d853e3f24b68057
SHA256cde9b6a758da6349dc02027cc178ff4dd2b51676844935d134456bc814b74bdc
SHA51215a851200cea62c693f3ceb03d56e77147aaea7d1019da66ea8cafca627a1316115a523c8f4f2aba9f4869d7e2cceb1e72bd328b7cdb7a11aa3f3f9a7b336d21
-
Filesize
485B
MD5ad8baefe636e08b8d937ee4303d37231
SHA10f58d13ae045ea62f4f64dedd7de4bdfef7e985c
SHA256b510a9f128b96f387a21d7b719fdc1d7ae81480a94620d11456699fd76271442
SHA51231b60710c0c59c882d21dd9d4eb5449c62e4f1bb75366d2b006b68f28e49f7cf63058272c0e2f8621d4bc80ccde0cc1e4cfdb503f3a513f0e2123c97524cc485
-
Filesize
39B
MD531296c038e3154364571e61b99f8579e
SHA13e1433612c2e7f61a1310ee47d6f4ce27a2e694e
SHA2564443ae9d463bf4bdde7812237ab097327ec1d23a3f4e12b319899f2cf7a0dbb0
SHA51242ae2ae55d5dbc85521cf5c4df9d510b610a62038ca6800682aa95e406b3ec9316f4c74782657f7a99e125b1a908b6ada7bb32b81a46a425f6a5de5bb88d33dc
-
Filesize
4KB
MD515b9f0e2441fd17618d7a7fc6e9311d2
SHA1446e32280d884e0fb9c8e804d8818636b0cf2cba
SHA2567516789b109fc823443cb40dde8c6d5a4d81e7598123bea4c767de1eb7d1243d
SHA5126ac1bd67b7cad14383c823680798f8cb36327a324bb99e8aa90598e1add9acab45ff371833bcca245a31018d941d059816de372966ee4312c5e875e0367c157f
-
Filesize
1KB
MD5ef627124721490d26fecd2a106eb6862
SHA13b65c37c5942591609a816424bddbe91ccccfa73
SHA256aa345a078107a81e8c52607fcdd938f944a6838d80c93a42183c4da08dc2e6c4
SHA512fe1b70078d01737ffbab3d000bf81ee5cc5fe718c5a477c888714ada6638224f538eba7ecb542d1ebab5c39b2b9a8630875e14e540af96ab5b1369124103e9d9
-
Filesize
27B
MD511f8e73ad57571383afa5eaf6bc0456a
SHA165a736dddd8e9a3f1dd6fbe999b188910b5f7931
SHA2560e6a7f1ab731ae6840eacc36b37cbe3277a991720a7c779e116ab488e0eeed4e
SHA512578665a0897a2c05eda59fb6828f4a9f440fc784059a5f97c8484f164a5fcec95274159c6ff6336f4863b942129cb884110d14c9bd507a2d12d83a4e17f596d2
-
Filesize
27B
MD5a5c7fa421ee9dc0d1d98f366aa9b4497
SHA1ced1602fad5f086ab6a35b64c08816879790162a
SHA256cd05c73a160de891afc73c2f6b313ac10551eb6d3a0b750b650367ad26b81884
SHA5129277c33f587b47482b3855bbfd3a943d890eae9b85ab6be54339fde3201154e8e45b2725d633ac1ad41ae3be3239a769f19b3474c3b21cabe2531d12a03ab968
-
Filesize
77B
MD5c5212e7e40cfb0cd10d4cfc7012a22d1
SHA126b1ae1d8c1c75ead9d379ce76c37d33d367ab1b
SHA256ac112db94e34658ccb71484b86b88904dc8687e2a09f7fd11debf436db89ed3b
SHA512188a4a28e2defd7982233e39dd98b6954a37b0def69b6b99f1333f675654de1853eb51ad719330c669bc7a9a13c475a8b0394e4ab7dcb8d6b33c5e03f323c8a3
-
Filesize
1KB
MD5faa5d7a4c895c09ba61ce4b9ad3fbf7e
SHA1a9e2324affd43dbe74421910c80e3db255890178
SHA256a979993763e02179b716d3c9447501230f6897d09e6e5fee8ce23d55b7898b3f
SHA5123b9e3a106f691c869ae8e3cfbefa130d7a6765736f541afc6eb340c1b94148f19a8ee23afefee575880bc6e5899594de007f3e1dd41ebb856a643265388c867e
-
Filesize
28KB
MD56a4ed02f66d624facceac22f19a3266a
SHA1b1a7ccf40b3433bc0ea5ac4dc38f0afcff9da81a
SHA256981c41a566327583e4335ce439004c9728e2a810a95735b990e97afd37d617c5
SHA512bf722437bee1bc0a267d3fce0fb600ca2f2e9f1d4fc2c2a4f9c9b31d865c4ba1430e12f8cfa8db187035e583404021fcab214efa67b089648564d9504b30aff8
-
Filesize
1KB
MD5ca41559acc4b1b1f63bd262a588a31b7
SHA199946001f1fde3363384a77b04fd249ff99afdcc
SHA2569f5bbe934510b03198858861e7f35085808a1c0a89ae7f9da8e3b9e9155cdb78
SHA5129a2cc46381124b848e618f29192fe28d1792ff6b2054e7a9fcd9bf1bf8482b960a04fc5d4b2098499292ebf950d1d472aaadbfbff6919db066c292780c32c92d
-
Filesize
4KB
MD5dd3b3d2e4b33573dc9314c195ec16ad2
SHA1cff1a2cf0288e3941d47e3847daf3acd2ccab328
SHA256d3866fb4241b3069a7d7bca80dcf0a4266c6bf08b1142df51c5b993abeacd0ce
SHA512f5eed963ee7fb793d2f4944878a0cffd2d88de498a7a3cf58ddcf03daf7f2cc9a634f43124812a9e994411fb5bbaa8954b5d03b6ef3bd3dfac67c2706627bacb
-
Filesize
2KB
MD5ee1ea399056a74f3e90996b198b23533
SHA11bf06bc18cd19e769a23fb1c7dde3ac82d1dc05e
SHA2560d5620c426c14276135373978f381b53dc5d0fd0b9c3ec0d07e597eb53f8c3ae
SHA512497222110bb4698ef6034b166577c53c9c06b48c26bcbe2dfcb97299fee0aed7268e3733c171a019ddafe92cbea10795cf3ae2995bfed94e2127a9e83c09a0e4
-
Filesize
108B
MD57b43d30d4ae41144de0bdf0dec1ca287
SHA1b22140ddf86afd5ec099098b5f4282c62a14246c
SHA256cde318a46a1b354eca6a1f02e7f0d8c1118abe4c032330d04f25d057d99281b4
SHA5125d8b58167c8019c0e93a8eab5a48f9a04f5ec0b9d71c87931ce7c2280c8e58d3338a2698d4519ed0c5fb60a4287c6105965a3ebcf23d527d8c78eb78d1ebf0f5
-
Filesize
4KB
MD57ef5e8f497d92a03e960c8c43cfb805c
SHA13ee56f16fafb757da51306c5a4710f096ca4cc32
SHA2565d3e3207a2a1375c110ecd8296ed77972ab5a5d517ebad6c0533a11cbb646812
SHA51283b329aeb3e893eaf422994495594aba0134044de39ae98f8966d20a50c28e100daad5e5f7bbb0dedd8983a1a9f62564cee4aa0822d684e38978db104a43b166
-
Filesize
287B
MD5c6ff2cbe837f7bb191a3dd17f855c7d4
SHA1d8a837f474a2c432d60e02d8117ea1cb2a5a873b
SHA256bc16225b3aab11c8f32020b76a330fc37eb0acff6ad21fe2f5d94fd4459288b1
SHA5120f8b53824bc8447695d72ea948e6c404fef9e3950304b8ac8da2bb39d9d6073f951e4c587fefa4cc246599c259e04ecfc5370de13623eac008e66c3cfeb58263
-
Filesize
3KB
MD5d5ac73cc778c7f4047eac63c162a1996
SHA1af275b4f656a5beda641c4fa5cbd5c9cc2622c5b
SHA2560c63d814477288aed4e20c2b898cdc8e343d1b9d4b8991f4191e998a1652940d
SHA512e2151b6c32e0d9d2ea9e64cfb74709271b4494867b029f6d7af7fb297d84a2204f66bf724785b667b5db237a6dd128af0842419c6da259bf2f90a890a431bcf5
-
Filesize
1KB
MD5a9525c72b61ca351d7adc155866f3331
SHA11acd90bbb46c2d8ede1018bb62e8fbf4b788326f
SHA25644f7115e9c4a02f1a1d712ba719094c5e68f7850bd9247dc14d381ac53ad1c19
SHA51215d2512ab113662728af610d2c9c2583043bf20b53433a2e1aa11590a3c61da6a48c0ba8bd7268abb7ca4e5bea9f54cb95bc397a004490b4efe134b2355d431a
-
Filesize
1KB
MD5f7680db2f3ca203a38412d3fbd5a7df4
SHA1f3789f83109ea8277428c5e5bbc624ba6b610ac4
SHA25665fc65d02fc9a1ce34795bc08937f592df73602e8e19376c89d689a92fe002cb
SHA5128489955f064421a07b20eb8d5a9da743aa5d860b6e475614b7523ac060e461a87320b4f49f166feebc85b03ed9fe9e330e5a3df2c5497d47134f3d396b84ef58
-
Filesize
1KB
MD5df3ab2210fccd0c5d8b4279fd4391417
SHA17dac476b07ed01ba6a971a6eaf764924cebcf339
SHA2564c4cbcb81ee87fb708e52a0f22e85b2ba8331db31f5f853387c149c975c1fa8f
SHA51204c07790f3b9d80da43b61ccc1186480b22b90f69e958a22afaffcdf2f2d2c55426cc64ec0efc3e7966cf05e2468c725e98df1b4590d1e88f541af74df3e8cb1
-
Filesize
1KB
MD531a4f57993e8039d7bc4dbd31184c397
SHA1cec7bb8a22245eb3c0277c50fcacd27d10ebe722
SHA2568af5c3a634d4ec1ca556d442ca1fe3cbc41401a4739758adf6af0a8743d0e0dd
SHA512aa09075a0b7f8717976450c11ac17cab24dcc1cc118b4521c53bdecc1ccf66f1febcae92e6b55936a60e278274f4b57408a15f090e460acf74769159aefd1822
-
Filesize
932B
MD597ff50949348e378d3f177af3ddd68c4
SHA1650b87565a7e1806eeabdddacf49840d72736791
SHA256a23a733e4d6b2bd48d9b80d60c13f34f0ba8b0bc1d00d0cf33497e0d3f47a632
SHA51225485dd166febeec416f6080daedba400f1738813269d94477e7d5630e2d3591842ec095f6561b3ba615a231d68c68b2b1bf1c1c8dee34a45a7eb991ea06d8db
-
Filesize
2KB
MD5eed8f97cfcee662001cc34f0ca382db1
SHA1631106c6b1d5b6e70e670b2f4eee3757c072f13a
SHA2568d330af6424df369cf4e383ff5dd374742cabce0fdc8473bb9e12ccb5ad7649f
SHA512b5215164ef4a5169c6e1888031f98a0048ec9b00ffb85dfdfb572190e70afb4e080c94c7a514ed8beab2e2551ace99ab9f4b3deb556d011af2982fbb4d630fc6
-
Filesize
191KB
MD5c7df36eb377bc1d7965c5168b261ec5d
SHA15f046f37524868a8213d9b86f83ee57ed5140598
SHA2560771142a235814ff46baa6de400da78a31a7fb77fd3919e1978fad59edf03c20
SHA512f3f7ea21fff12888f9451185039052f330a724707688ac8e3791f28eddf4a8b00ee5a8c0bb30c8d96749c9e9e643bff51b6ee335f8f36915722e7ba9f3540b6e
-
Filesize
12KB
MD5f16efeaecbf8c6f88a78dfb313ee8425
SHA188209e0abd22362ca85c5ec045327b7289c6d4f1
SHA25626f46f2e5b918493892493c09b0900bb393ae742913b7cde2bdca8301b3abe1f
SHA512cf9b9a4af16c284112912a0294104ec7dc53d74a373f7205d74c789c2d0ec59309a3b52f1535ea7b8e221e0e59f90eb8214450061a96f43ad73cbcb4d2ced649