Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe
-
Size
225KB
-
MD5
c98816fc2c87a9999388c5ec2d3be78c
-
SHA1
a7e21c65435b3be3f0226c72cd076c7d83e18f63
-
SHA256
4cfbf1fbc5335ad8ddcccc3f3deb1066872e30f0c0f01f9f3d633af15fab8c67
-
SHA512
ee6ce5e35ca3e1fdc0dea35d38e112c47edd281607bf8db459af52415cde9b310725d8e5cffe5d3ef27324c0096a929156f7d60163abcfbc233d0d7038cbb918
-
SSDEEP
3072:kgxI+xKQaIWoXJ+G45vrva2iqcPLicO4v+JAbpe6+vA8iOLNOnFddnbyyTnDmsYd:kg1KQjoGw2DPx5bSiOJOnFf3TnDm1qk3
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.xmfir0.win/4429-9121-CAF7-0063-7D29
http://cerberhhyed5frqa.gkfit9.win/4429-9121-CAF7-0063-7D29
http://cerberhhyed5frqa.305iot.win/4429-9121-CAF7-0063-7D29
http://cerberhhyed5frqa.dkrti5.win/4429-9121-CAF7-0063-7D29
http://cerberhhyed5frqa.cneo59.win/4429-9121-CAF7-0063-7D29
http://cerberhhyed5frqa.onion/4429-9121-CAF7-0063-7D29
Extracted
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16389) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2156 bcdedit.exe 1600 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\forfiles.exe\"" c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\forfiles.exe\"" forfiles.exe -
Deletes itself 1 IoCs
pid Process 264 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\forfiles.lnk forfiles.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\forfiles.lnk c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2072 forfiles.exe 2272 forfiles.exe -
Loads dropped DLL 5 IoCs
pid Process 2092 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 2092 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 2652 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 2072 forfiles.exe 2072 forfiles.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\forfiles = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\forfiles.exe\"" c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\forfiles = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\forfiles.exe\"" c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\forfiles = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\forfiles.exe\"" forfiles.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\forfiles = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\forfiles.exe\"" forfiles.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA forfiles.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpCB3B.bmp" forfiles.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2092 set thread context of 2652 2092 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 30 PID 2072 set thread context of 2272 2072 forfiles.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2600 PING.EXE 264 cmd.exe 1968 PING.EXE 2152 cmd.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000500000001a4ac-79.dat nsis_installer_1 behavioral1/files/0x000500000001a4ac-79.dat nsis_installer_2 -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2448 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 1732 taskkill.exe 1164 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\forfiles.exe\"" c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop forfiles.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\\forfiles.exe\"" forfiles.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 900efc624efada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0555121-6641-11EF-B161-F296DB73ED53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000001af7603f07515a93fba61f398ecab3e573a0bcf686784fdde251a3a220758990000000000e8000000002000020000000de577c87cae6c431531bdbbd3caf5f656f71261ed5545725d6f2dff897c324cb200000009ec593d8183531439c19e6ea4fb1bc714edf1aeda450f2caab706f8be41618ed400000000079bb2c711e15eac57473226d60ab48fae24fc02667e8e6bc4ad73bd2758d417940a35a9fe515edf4b63ca53f3b19c53c212276601454b5d5b3915544b11e56 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0496A41-6641-11EF-B161-F296DB73ED53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1968 PING.EXE 2600 PING.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe 2272 forfiles.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 2652 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe Token: SeDebugPrivilege 1164 taskkill.exe Token: SeDebugPrivilege 2272 forfiles.exe Token: SeBackupPrivilege 952 vssvc.exe Token: SeRestorePrivilege 952 vssvc.exe Token: SeAuditPrivilege 952 vssvc.exe Token: SeIncreaseQuotaPrivilege 812 wmic.exe Token: SeSecurityPrivilege 812 wmic.exe Token: SeTakeOwnershipPrivilege 812 wmic.exe Token: SeLoadDriverPrivilege 812 wmic.exe Token: SeSystemProfilePrivilege 812 wmic.exe Token: SeSystemtimePrivilege 812 wmic.exe Token: SeProfSingleProcessPrivilege 812 wmic.exe Token: SeIncBasePriorityPrivilege 812 wmic.exe Token: SeCreatePagefilePrivilege 812 wmic.exe Token: SeBackupPrivilege 812 wmic.exe Token: SeRestorePrivilege 812 wmic.exe Token: SeShutdownPrivilege 812 wmic.exe Token: SeDebugPrivilege 812 wmic.exe Token: SeSystemEnvironmentPrivilege 812 wmic.exe Token: SeRemoteShutdownPrivilege 812 wmic.exe Token: SeUndockPrivilege 812 wmic.exe Token: SeManageVolumePrivilege 812 wmic.exe Token: 33 812 wmic.exe Token: 34 812 wmic.exe Token: 35 812 wmic.exe Token: SeIncreaseQuotaPrivilege 812 wmic.exe Token: SeSecurityPrivilege 812 wmic.exe Token: SeTakeOwnershipPrivilege 812 wmic.exe Token: SeLoadDriverPrivilege 812 wmic.exe Token: SeSystemProfilePrivilege 812 wmic.exe Token: SeSystemtimePrivilege 812 wmic.exe Token: SeProfSingleProcessPrivilege 812 wmic.exe Token: SeIncBasePriorityPrivilege 812 wmic.exe Token: SeCreatePagefilePrivilege 812 wmic.exe Token: SeBackupPrivilege 812 wmic.exe Token: SeRestorePrivilege 812 wmic.exe Token: SeShutdownPrivilege 812 wmic.exe Token: SeDebugPrivilege 812 wmic.exe Token: SeSystemEnvironmentPrivilege 812 wmic.exe Token: SeRemoteShutdownPrivilege 812 wmic.exe Token: SeUndockPrivilege 812 wmic.exe Token: SeManageVolumePrivilege 812 wmic.exe Token: 33 812 wmic.exe Token: 34 812 wmic.exe Token: 35 812 wmic.exe Token: 33 2856 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2856 AUDIODG.EXE Token: 33 2856 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2856 AUDIODG.EXE Token: SeDebugPrivilege 1732 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 600 iexplore.exe 600 iexplore.exe 1584 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 600 iexplore.exe 600 iexplore.exe 600 iexplore.exe 600 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 1584 iexplore.exe 1584 iexplore.exe 316 IEXPLORE.EXE 316 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2652 2092 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2652 2092 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2652 2092 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2652 2092 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2652 2092 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2652 2092 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2652 2092 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2652 2092 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2652 2092 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2652 2092 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 30 PID 2652 wrote to memory of 2072 2652 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2072 2652 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2072 2652 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2072 2652 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 31 PID 2652 wrote to memory of 264 2652 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 32 PID 2652 wrote to memory of 264 2652 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 32 PID 2652 wrote to memory of 264 2652 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 32 PID 2652 wrote to memory of 264 2652 c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe 32 PID 264 wrote to memory of 1164 264 cmd.exe 34 PID 264 wrote to memory of 1164 264 cmd.exe 34 PID 264 wrote to memory of 1164 264 cmd.exe 34 PID 264 wrote to memory of 1164 264 cmd.exe 34 PID 264 wrote to memory of 1968 264 cmd.exe 36 PID 264 wrote to memory of 1968 264 cmd.exe 36 PID 264 wrote to memory of 1968 264 cmd.exe 36 PID 264 wrote to memory of 1968 264 cmd.exe 36 PID 2072 wrote to memory of 2272 2072 forfiles.exe 37 PID 2072 wrote to memory of 2272 2072 forfiles.exe 37 PID 2072 wrote to memory of 2272 2072 forfiles.exe 37 PID 2072 wrote to memory of 2272 2072 forfiles.exe 37 PID 2072 wrote to memory of 2272 2072 forfiles.exe 37 PID 2072 wrote to memory of 2272 2072 forfiles.exe 37 PID 2072 wrote to memory of 2272 2072 forfiles.exe 37 PID 2072 wrote to memory of 2272 2072 forfiles.exe 37 PID 2072 wrote to memory of 2272 2072 forfiles.exe 37 PID 2072 wrote to memory of 2272 2072 forfiles.exe 37 PID 2272 wrote to memory of 2448 2272 forfiles.exe 39 PID 2272 wrote to memory of 2448 2272 forfiles.exe 39 PID 2272 wrote to memory of 2448 2272 forfiles.exe 39 PID 2272 wrote to memory of 2448 2272 forfiles.exe 39 PID 2272 wrote to memory of 812 2272 forfiles.exe 43 PID 2272 wrote to memory of 812 2272 forfiles.exe 43 PID 2272 wrote to memory of 812 2272 forfiles.exe 43 PID 2272 wrote to memory of 812 2272 forfiles.exe 43 PID 2272 wrote to memory of 2156 2272 forfiles.exe 45 PID 2272 wrote to memory of 2156 2272 forfiles.exe 45 PID 2272 wrote to memory of 2156 2272 forfiles.exe 45 PID 2272 wrote to memory of 2156 2272 forfiles.exe 45 PID 2272 wrote to memory of 1600 2272 forfiles.exe 47 PID 2272 wrote to memory of 1600 2272 forfiles.exe 47 PID 2272 wrote to memory of 1600 2272 forfiles.exe 47 PID 2272 wrote to memory of 1600 2272 forfiles.exe 47 PID 2272 wrote to memory of 600 2272 forfiles.exe 50 PID 2272 wrote to memory of 600 2272 forfiles.exe 50 PID 2272 wrote to memory of 600 2272 forfiles.exe 50 PID 2272 wrote to memory of 600 2272 forfiles.exe 50 PID 2272 wrote to memory of 1352 2272 forfiles.exe 51 PID 2272 wrote to memory of 1352 2272 forfiles.exe 51 PID 2272 wrote to memory of 1352 2272 forfiles.exe 51 PID 2272 wrote to memory of 1352 2272 forfiles.exe 51 PID 600 wrote to memory of 2064 600 iexplore.exe 52 PID 600 wrote to memory of 2064 600 iexplore.exe 52 PID 600 wrote to memory of 2064 600 iexplore.exe 52 PID 600 wrote to memory of 2064 600 iexplore.exe 52 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Roaming\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\forfiles.exe"C:\Users\Admin\AppData\Roaming\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\forfiles.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Roaming\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\forfiles.exe"C:\Users\Admin\AppData\Roaming\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\forfiles.exe"4⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:2448
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no5⤵
- Modifies boot configuration data using bcdedit
PID:2156
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures5⤵
- Modifies boot configuration data using bcdedit
PID:1600
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:600 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:1352
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:2708
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "forfiles.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{FC0DC950-DB7F-2E42-0A56-A49E2AA3B419}\forfiles.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2152 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "forfiles.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2600
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe" > NUL3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "c98816fc2c87a9999388c5ec2d3be78c_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1968
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:952
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1584 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:316
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:1512
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4941⤵
- Suspicious use of AdjustPrivilegeToken
PID:2856
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD53c1c448dae1047b6bbff9e7fd21a9d7b
SHA17c487c34ad2f9cac28a475c28334c99672195d48
SHA256b0357b6819882cbcd3f4ae350c486792bf25c46b8756bbf96d27c2b689346623
SHA51202147e3df30896d3cd12cfa065bd3ef79d4843902119cc34ecd2153816838a0b96de0dc8dc250ef6c58be73bcdc8e70cb41318e5e8dada9cb81e3657c9094f64
-
Filesize
85B
MD54229ac4f03fcaecfe94b02f556f04fab
SHA17360b31217dcc5d13d49b56c2091278352927baa
SHA256e78584066e1c67fed30e4455c0ada2d77884c8856334c885eadd0e966b4bda14
SHA512cab5402e1c74b86ecd3afdf35c8c9e6dc2d6c0da48e69c6c58d7ee9f88ed19a4500aabdc1081f373999006b41790fb0f66d05a7f1732a7c37ffcf6e5e0950de6
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\# DECRYPT MY FILES #.html
Filesize12KB
MD5c424dce7927b0d62a9e3b9a042bac52d
SHA1718c462718bbf634b9dcfa365b7698df5e5dcd6c
SHA256de9172ea7ac6a145372f2afe0aab488a981a1eaf92148798f68a110634736bc6
SHA5128b73ce37d3a06a1f3d59e39c0f0d0fbe30f0615c6e6a208e9fbef0a48b8ec020a3a9bbba579ab6823773139c13a15014b048a4bb4f238aad578c1f9d2612acf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD558a4b2362340eb62cc35062a5b87d465
SHA1613e227d96224b02fa825c7add2f8aa6ae2c8c2c
SHA2564825f62692bb0252b3c72b4a02693d4d42c0475b7a8012abd46b070e8b56dc92
SHA512e248ca55f521fdc5002f6bf4c7d0431d14c1cb6f336c7a733849d3e625044198432014291441eca5bdce3d6df61e9f54dbbcd736af5298f20e2b1c213c0b3862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50d36a452bfc49890836650345cbdb593
SHA1393726ff9392c085e849ef48e0a2403c144027a4
SHA25621dff215864adf8f2e5f146d131acac647f94e1f0c213d18446806a108312037
SHA512888d2132df02f9040a0d7c01c8dcd02fc8159907abd7b3f00fb12afbdefea7266ddbe3d608a9fa45cdffbaeba9af850aa88f3cf7adb94c5deece51f79e09dc6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a29ee9b2dacae13e9fa389e45fb580f8
SHA1314ba6e30205debffc284b28693fe2a7330c1c95
SHA2562272e447aff5af0ae9b1e99835d176681fe881483bc866b795bef550fbad36ee
SHA512756353ed138409b1a7a8cdb40f4e604384e138236091d0fa1d980d03bb4445e0936454088958eaa5874d274e0f26b153dea8d1ecba3975f4eb8fff859a551310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c2d32302cc7ed06ba4282ad809f5488d
SHA138621e292b0d252aa6afb448db73ed02a288770f
SHA25675e4dc03d3b9b1ca4ed18f5d9bac21a6efb6d5d2495957d1000ab75698c6243b
SHA5121efe8f3b47f72c7da67fa16046bd6f6f29745c5568e302d8c9c56bbe6e862a235bebdbad51c374920edd87c20ac4ca7f57a8dadaef82c3b2a07249909268e470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e638917022af67b9f6ef102b2db986ac
SHA131f47a3f1c3552ce9d157345f0eff14718e3a642
SHA256ca6c19881ae9052be23537f7d1bdbdcbb9825f4080ecb5edf2ac9b2802022d60
SHA512b7683e3a36022a48ffcd7759e2ec891f4fe81a41f4b1b3b21fb458fc7e8055d64d3db408efa5334c8060924f3b1306e91a0965cfb1ea955938e3f20c5cba5b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5582927b539069aee86531bd7bc5afb4f
SHA1055583b2009ef535b2be83707147231aa17cd419
SHA25611335577cc30030bbf9e77a8e40aa1c5236bb9df615f9375986c1f827a134eed
SHA512a798805219116a95ef9945806e8e8d65a90f3b59402f0db6f5df59b2762779dca624a430f5e8bbbe838753016e25a8013f0edf829b36fe32e949cb8068ab2f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59fe275cc0b3971e9ea0bbb47d6f7bcc9
SHA102b604d22f52ffb852a93be673f9aa1e60325b63
SHA256b21df0a9dbe9d757dcd1553c9d2da5dd3ab844b256459e557cf041c9327d888d
SHA5128c950dc6b74bcf8cf2373a34f7dd39375fbf7eaf1bbb485d66fd9d6956001d153e11ee2cc840ac4e188468b3292d07f312c81bb0ca4072bee8197c93dad1b49f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ec363d1440f6cde31cd1fab70d71adb7
SHA16ad81fb2a4cc92968aefb33b763590b034ad96f0
SHA25604992b11f4bd1671c53bf778a67c836562f53aff1ef1497413d6ce7244ccf023
SHA5121a65f72dca44ae06cd64c674784ffa5e1e8f41b0db0fe872ace23a63bca18dcc77ccfc2984dbae18d8d48f740ccc64f0e41ae66154cce87a98fb9374b8b07094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5012bbd1d8f76b748680a7831dc0cbd3f
SHA1b41d4706e404e6ac9d4d282586dc45ceaf836781
SHA256350be62339e933fa818cfa451fcb24293f63d8d21a7ef8d0ca7d0cac6bf567fa
SHA51213ee1b69d9430c40e694a2b4490f8cbac6890b4c4bde347401c12e6f1d35fd4f7e9213867cc52437f50b800962613509022ecd93a577c3f63c0c86bfd09fc859
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD50f17a4a7e0b94887ddc5ca15e577b009
SHA1b7df762961ad982fb8c6f9c136e5db39e770d02b
SHA256210f3ae380bf9369068716d12f52992aa5a48627b2851d97c05e7e8e68c16d68
SHA5126be260fdd52faf89933d64f8bc35742105d033127a4846b18dc0d0760ffcca09e7314c566442c58f5eb3a3b6223404c9a706704067e959d373f57a3b2668825a
-
Filesize
1KB
MD5670a196f9dde1a619cec121493f9932d
SHA139f7ce520b3caa5aac76c02d55027111fe0aff0c
SHA256907275144601233158275428fc3f886d3c501f939d62b296e352dcae40bb53f9
SHA5120a6161273580489972bab1db9edd6a1ec50fe4c7f5da8d25eb4aea3fe70aece59c9bafb69c8159e0fa1f8db66af7a72b4ae859f0d0a85187ad2d0f9d1def25c8
-
Filesize
1KB
MD5d8c682c040480b4686c6aeb37c3cc4a3
SHA12955fe2bf895f27c9aef4ea99743f11eda89faee
SHA2562568da29e3cc0bbdc6b724ee8d5aaefa7140253249ddff47489ed25b772bcd4d
SHA512afdf82601184fd0946c81687d5a6484158cc80caf0f5dca8a4a7a24777325882c6a3e057c824eec24a703f0b2c751506d7b28c4523a65b89dd4a62a58560167d
-
Filesize
1KB
MD5adc7f6317f2379c810438dd53b615e46
SHA1d12a66f67d47482f67b468128556138712ae93f1
SHA25666a1be2f2ea8233a06b3d7d7bcd3795d04948f361f510329553001331a1d1f65
SHA512bf7f3cbb0b068b7ba1a68bf3b02110e7b097154961a9c94aac8b41572be293d0640e69d07c8598fc97ba2a467cb1604b628c2fb5ad7b7d0d3cf0800bb6c3d2fc
-
Filesize
1KB
MD5897f8680fab96ea633aa6d392a8df65b
SHA154872ae7b4a1a7713bfbf9d2670fb1393bdd1865
SHA256609a25df951b3808156ffa8bdbe60d152f44d92f30196c68f96f1ae794c0df7b
SHA512a959ccfab610120796e149a18392465bc73ae3d28ae2b7fef9dd4ffefa0c291c9fd664b97cdec0f5dd81567f3167c82a6d89dfe34110deea00621d25caff33d1
-
Filesize
1KB
MD5c9f1a1c859507bfe6c9011cd9829ad4a
SHA17c12f66365fce199914023885ffc869c643223a1
SHA2562d71383fe5086e7e2d9589d131962381dfdadfcc564bfbd1f1c3d6e739ab47c7
SHA512600342479c2de4aa875517a52bb42db859721abbee2f3c48c8824fe48c597458b71181c70e60c9465ad699f0a143e653db93655a48f75b4af4f7942bd0be1fbd
-
Filesize
1KB
MD5808f650d45deb39aec6a3c65c39356f4
SHA15a625362d8556f9cb5ac84df5169f0f226ed387b
SHA256b146ba884b66b56eea10b2092715e5e5deba84dd682b2f0b579e0371cb055bf2
SHA51288362ec263747a646dd4fa34a11004f989b37847a656cc64e87e62a63cce49716a70087992e087fdcbbdb5bc3016e8b78d3458606dc9336054f64779d6ccc149
-
Filesize
3KB
MD5523676e02eeb6efa86ac4d5cffde5a65
SHA12507758e737be7a6ed429bda65f97087d309a92b
SHA25683f1bb3a64a0ec92d90cf83e326fbb459f4f501f4f1334adbbbc659c2afda687
SHA512666064d41eb08b7f8bce911c1728931b892ec6e3ca25e22ce17f7411039ac7a7c971de9a429f8a041e417c7e9a10f80896672349df81e02c09047a6f151746a8
-
Filesize
77B
MD5d7a8d88e7d5b134d92542787e019e123
SHA1ad633d30aa9f0bf314bba5f004060fc90a14a16d
SHA256859d70658cc7502f214d9abd669c4e730e798210c372fd7020ceae470ac7756c
SHA512194e553ecc8ffd376c029670ced1f2480509b072d2adebd6af22fa69945f3fafb58a3385d5a09451c85f03d891049b8123c0cd3907bce944cb4784606679ffa2
-
Filesize
1KB
MD5158a547eb81d452e11fcc2e2e1652905
SHA1b820430cd25878f8279f3dfb274ab827b7c6d3cb
SHA25617d47e1cf07b5d65c664a3cdbbba663623f487394bde29682d0bbaa33931a12a
SHA512f26ec1826ee5ad0c785ea6b6ec963bc4a5794cf2de6f62b2f65d62a6e8df536fd5ccdeed86388ca211af0e36ef503cb42516320aec89c49d05b8d94d81b37830
-
Filesize
816B
MD592c4a315a4935330f79159c91933cddc
SHA1099996c95e43fbe849eba8d8bbd461f9989dcee8
SHA256106c8167a1df22b4908ccccd98f4afab763ebebe287e4be144af7061be66c899
SHA512fa9cf4ebe3a8b032b2dcfe1ecf04a22a67b923545d926822dc145cf98bc1d4a5615722784d69112d9ee976daa064ac754a89dec028f192c41a71208e298d0907
-
Filesize
524B
MD5d29eb91cf4abb3c8cbc19e559eb993ad
SHA12fe46d50db022efad91ac5c9b98d8bca9fcd3626
SHA25652566a6955776419971be3da95029cd3209a77533e459f3ba06ee3e0a7114dca
SHA5128d756afc68bf2a0a03d5c99810aa90ee746b73b953e94c87b15e4262b36824d694cd8ecc787defbc5c233b8e442e010435c8f6e662f75b1a67597804f971e8db
-
Filesize
524B
MD56c55602d113c4ae021a2f9d39e31b91c
SHA10ead8715297d1fa05cf511f41e284b4620fdb1e8
SHA25682e20ebd46ee61262bb8b8053704ef164d53adcf325bdef1cbd285de7f5df470
SHA5128cc1a4f4ebee4c5bfb7059d7f10470343ff16269b41f8c7fb2a6ebb75ce55ca8faaeb4c465365deac9af6c5cfc84055114fad5b8a0ca9bca8ce4f0507263e4fc
-
Filesize
93B
MD51d53889d180f80681c4fb6cb9efbb553
SHA1af1803c04a3c84b7392de65905bd5055d7eb1337
SHA256a0d20babce8ff6af57e38323e9a0ea1768b5b9bdf9fe59086c3337e771e29066
SHA51228c5e50cc70caf29d5a8fe723d9a6c49bb8c83b81f2ae13959f801dc262c06a3c0ee8e57c0f21420740a9d73e9dbccd12a86071fe3f9d75c4c5618b343e222a4
-
Filesize
112B
MD5279a2aea35c02e3bfa03458920b09185
SHA1c99130fd7897b8555a7172fa4933977c35818f9d
SHA2560f5bf6d6da96e5ef6a580a4b578b488fca84e62f004874fadef444d4c351723d
SHA5123f2a8e0e969c5fb913fe88134ef4a0b64feae82f82d015ab70191822dcc5de57116260f3f643f45ec0357c6a76fb188d89ceaed9147ac2433190cef467d67c06
-
Filesize
27B
MD5aea56e4cc048a9d3ff31445372d346a1
SHA129ac5ffe91a926df97e1a3e04a0c76a22a6f5c8b
SHA256500ebdba5c37298efc86410f21dda65d2c0e59771605cd647694879de03533fa
SHA51215d93c0e845eeaa4d010077a0032c4dc765f71895089b3c04a2bd6315373e43ca473e65caefa8927a973a664093d585c58295ed7ad708cb20f9b8452de317920
-
Filesize
1KB
MD5322af158f3fa4faf052e1154f3ccc059
SHA1d3eb0cc79074a873115328175ec994539336f14d
SHA256aba242239d56b8401efe911cc34a1d78130c46c90658655c45f9e390f576c667
SHA51231f3f8d7aea9aea5e3deae4b508ac3feff0a48bca32925fc9ccccf39a6786e4d6822fba0903306ff9349f0df20925d7dd5a59031ccfdff528270a266d97de82d
-
Filesize
3KB
MD5e60b8b9dc8e97d97862cc4bace00e705
SHA1cf147d9776bdb2cbd743bca965d9d7f2ea4a3e6b
SHA256a6fb8e79295f57f0c12230a5a23976f28d838a22428d9a2e0163e6400e0e7cd2
SHA512d08623d7f6c791738285aeb9e61b3271a11c4830589e5725fbff79a52f24e4ba812066d415a9933f427bd586445f59c8a13b58009298de7835f79393a0215214
-
Filesize
1KB
MD5370c70320cdcba10bcfb8afd5267888c
SHA1fe7d143794554dad4776c43066581d4fe094e6c8
SHA256b0ec9d1769d4dd4aba3ab79593972e1326e8008798d39fcff8857283efca836d
SHA512f5e44b869969619f0aac46054d10d1b75c915b4363cdb74ce3616867f48644e3f5508520b412b43e31a82767dcb925598a4653f7cfb3cf0e11f18ec6ed9ce39a
-
Filesize
1KB
MD54ab850cbbc8203dd0272494ccc005144
SHA13713848ecbb70b421956290a24cf5b966d9d6dec
SHA25661b9afd95c0598c0cd16099a19d5d2b3dd1b3ce3441ad00f55be5dc40441e910
SHA51289aa963cc1a79d48b48088c9d6963e0b19a2d8f528ade67e5bb69fd9c084147f46ed220cb6573da1b10416951ba22f8cafa7fe0b181b09644dee03c67274f67a
-
Filesize
1KB
MD52fc983127c4e54d2a2f004b3fcd4aeb7
SHA1d32a9b0592ce32b65c12284a2900b6c9f65b4755
SHA2569502cd0cf4bcf5427242c3d38d24585749cdd5f6b931d03d3897e4a59e855fca
SHA512fbada65474fc42cbb93e88856f2f752eded10ede2b769099e044e742e0ad829c8c5e0420ce67cd08a3013cc08119539401e69f7e3eeb87e6395c1d84fb46c965
-
Filesize
1KB
MD5f341233b35df61978a142487b89c6f4b
SHA15bb6c709ead39c4642dd9d5666a4cab1cabd25df
SHA2566e70478b7b9618d1615e1bf96667dba878142ce57749c30f467c18dd5f9688c7
SHA5122a608c9b31d603686fd109b4bb75d8fe6d3d212fdcc8d02349fd2b83278db0836a7e45d886727d7df20c3eda1b8f2265809c214efd5970082b680ac95dd862ef
-
Filesize
3KB
MD5227fb8e068d500dc6ccbd62cc1682bc1
SHA116f3901b9b4c74fbb6f8f9cc71748196eae09f51
SHA2561b0b09e8f1108de72f11263b1b7f3932ccf9b38d7c3bfb47a1e697ef58ea93e5
SHA512b17dbef4878998037ed65f75bccaaeea63ed7cff13c7c088c78c8248317e5b05a641cadd2148a634fe8e2a04951a6d54970ea1d234c7a0dd97ae57ba5b2cb905
-
Filesize
3KB
MD5bd8078dcc074aaebdc63ba53082e75c2
SHA1a3887f75154e5de9921871a82fe3d6e33b7b5ba7
SHA2569e35270e3510c195a64635292dfcc6dc508e93dcb5715c3e30cf3ec15af6951e
SHA5129a0b6c67c52ba0a0c9175a62680e9e35793676e4e06dfc6b5bafbff3b50474c94c5434e700d19eff4c46ee84ef0a424e850a3e7fd78d6f62d1d19912a8a38e66
-
Filesize
1KB
MD56bd4db7937c0a36cffafcba31dbc8194
SHA1ba3be76059ba7ec43bb731d7d7b7c179294cd400
SHA2568a2cebf633a67d1d8facdc122851204aa996f0edbae727e4d30a1db9cfed0e9a
SHA512b57bf52958ea12e5dd1cd662a08710b232e717f00c449108c94c3084e93e55678dafcac881be872d2961db492e11cc9655e0d213ec92eda20396e477eec4b103
-
Filesize
4KB
MD521ddceeb0c385676eb35365c4ff1d24d
SHA19cbcd87590720bf2ce80304d0b298fbb44cb61e3
SHA25682a9d562fac82452d5a767c2d0355e2e8f2d8550b62091522ab3985f6ec7ed0f
SHA51215e115831e4ba38e8d73044cf50de8f8777faba3d1d099dc5eaba7af53ff87cb7c752f708b25aee35e1a416cac9debcf4f94e85d45a58ab109ac45d435c22840
-
Filesize
3KB
MD5823c348a508c32bc7d16d568126c34fb
SHA12b2f4bf49a7d8454474bf185e26b2c48cf43e461
SHA2564f84fda6a4dc46d8577474025df6fead475e5ce750de8177ce51031b82b7221a
SHA512c80ad925af22645a6ee1766036ff1841350387683db6210fff36c6f5fe321855e77aa50c765a3be4319b8a66032a14bb98655c31184ccc2dcf217a4e12df2842
-
Filesize
1KB
MD5f98f487b9e0e5fc13d4c45e18fedb542
SHA12556be67db0db9a24e260d0b7e57e13964acc335
SHA256592ae6664b9cd8f4064bf0c746f876dc2032f7d04ee28ff365b93f242b75ff4a
SHA51219fed31f734ece9fa29f5b8876b8bac9fd1f9e189794e53864bd2cb2b7a8870575f1ec63d4e73d25fed99bb11e5dbc8cda90bd2ed19441caa1467ec115ab9e52
-
Filesize
3KB
MD59b66aceb64df2b3528071d542f5a82fc
SHA105a1c663a5712195e67c1c62668cd16184399f5b
SHA256249f23414c801c82e236c9f08b81fbcd5deae75094445923c9db1aa2d440f5bd
SHA512241cf6534a6f1e37037f0428fd5870494a1c7f5fcc1bac9db13c1157c5ac2a3efcd6d02886b1d4e928105db568a7d9811bc7c116c3b99cca25fd9b2d242dc2ec
-
Filesize
2KB
MD55b6d410767b3f51805b65bd53047ddff
SHA17eae072adbc3b102a3e06873f643e5e11674d936
SHA256c665dbded35fd10240134d7199cba83e69eedeb893fdffa73235e5f3ceaacaa3
SHA51245a409739c6f7ef6444d0fd80134941a20806b7248336b5bc76f757107fd0637f292b2827c0b90c26c1bc5ee4fb6658a1a1d6c2a23b55b8b8bd550a2671c04f4
-
Filesize
3KB
MD5303e1ead3ea7b758e3218a578a71ab1b
SHA1b3a9876baa923259429ca0613ae33c4b86038383
SHA256f35357168c00b5416b8bf46e1eb18d94f1947003aa9aed9695ec2a6db820533b
SHA51242109fea02b2ca806057ccd5c3d79c79a825cd5f7c80fee9d02d4f78f21737bd190952fe69ae217032d050de068d019a87315355287aa7806aa91075da1af329
-
Filesize
518B
MD5af3843294c005bd5a56edecd08f33086
SHA1f49f365144848964d4ffa237d38165ebe3ce2e84
SHA2564520e164751237fe580545bb70006d05a2c11a896e2cd4a5f57136a0b22afa50
SHA512466cc22447cd2b8f3b4bebb36c3338b6fa91c52747e1759d85e5df604d237a698847132860ccdcb5e87cd2ca37c45e225d5dc88ec2f74e93c267fb303f9048bb
-
Filesize
11KB
MD56f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1b6ac111dfb0d1fc75ad09c56bde7830232395785
SHA256b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
SHA512a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
Filesize
48KB
MD5327bfc5b6f9166937a1b5b2a272135f4
SHA13e309a22c86200155457df21b1b796a2b5d5cc85
SHA256f191f88ceb7434a68388fcc65c0d8bf630c21fb25eb1462839bade6ba8b16f6d
SHA5123fe712c7d828875b73ec92e3750746854c39d2fbbd48dee62a32a673ece60dc1a46e4f3a94cb4d7dd69ee0b9670c135cc72153704321a0ef9838657117db7486
-
Filesize
225KB
MD5c98816fc2c87a9999388c5ec2d3be78c
SHA1a7e21c65435b3be3f0226c72cd076c7d83e18f63
SHA2564cfbf1fbc5335ad8ddcccc3f3deb1066872e30f0c0f01f9f3d633af15fab8c67
SHA512ee6ce5e35ca3e1fdc0dea35d38e112c47edd281607bf8db459af52415cde9b310725d8e5cffe5d3ef27324c0096a929156f7d60163abcfbc233d0d7038cbb918