Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
ProxySettings.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ProxySettings.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
env.bat
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
env.bat
Resource
win10v2004-20240802-en
General
-
Target
fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe
-
Size
209KB
-
MD5
fff2b25d6363f93276cd2f20e7e27578
-
SHA1
225fe2828be9b637da2d7621e9fae8f42f4ac4f8
-
SHA256
6480fc69756f789c08636c4cc4a3a8456f9e037245f1001a8ce47be37b56ad03
-
SHA512
4501f3fbdadf9cb737ed451e2f0003fbeace09b3830b2adab6a39483cdb41ae144b9ec924ded56e77ae96b1305b18cdfd262a6eb0563cfe0b8d706c651b93464
-
SSDEEP
6144:D/uTZqR/XgxURVls4nSYA3HK9LUGkII/3EINS:zR/XgxURVlDnmq9LgtEeS
Malware Config
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.txt
cerber
http://52uo5k3t73ypjije.0vgu64.top/5902-EB50-2BEE-0446-66A2
http://52uo5k3t73ypjije.pap44w.top/5902-EB50-2BEE-0446-66A2
http://52uo5k3t73ypjije.r21wmw.top/5902-EB50-2BEE-0446-66A2
http://52uo5k3t73ypjije.y5j7e6.top/5902-EB50-2BEE-0446-66A2
http://52uo5k3t73ypjije.onion.to/5902-EB50-2BEE-0446-66A2
http://52uo5k3t73ypjije.onion/5902-EB50-2BEE-0446-66A2
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\\TapiUnattend.exe\"" fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\\TapiUnattend.exe\"" TapiUnattend.exe -
Contacts a large (528) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation TapiUnattend.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\TapiUnattend.lnk fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\TapiUnattend.lnk TapiUnattend.exe -
Executes dropped EXE 4 IoCs
pid Process 3044 TapiUnattend.exe 3596 TapiUnattend.exe 3600 TapiUnattend.exe 3516 TapiUnattend.exe -
Loads dropped DLL 9 IoCs
pid Process 3644 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 3644 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 3644 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 3044 TapiUnattend.exe 3044 TapiUnattend.exe 3044 TapiUnattend.exe 3600 TapiUnattend.exe 3600 TapiUnattend.exe 3600 TapiUnattend.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TapiUnattend = "\"C:\\Users\\Admin\\AppData\\Roaming\\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\\TapiUnattend.exe\"" fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\TapiUnattend = "\"C:\\Users\\Admin\\AppData\\Roaming\\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\\TapiUnattend.exe\"" fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TapiUnattend = "\"C:\\Users\\Admin\\AppData\\Roaming\\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\\TapiUnattend.exe\"" TapiUnattend.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\TapiUnattend = "\"C:\\Users\\Admin\\AppData\\Roaming\\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\\TapiUnattend.exe\"" TapiUnattend.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp5087.bmp" TapiUnattend.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3644 set thread context of 1004 3644 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 84 PID 3044 set thread context of 3596 3044 TapiUnattend.exe 97 PID 3600 set thread context of 3516 3600 TapiUnattend.exe 101 -
Drops file in Program Files directory 16 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE TapiUnattend.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.vbs TapiUnattend.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.vbs TapiUnattend.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE TapiUnattend.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt TapiUnattend.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.url TapiUnattend.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.url TapiUnattend.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE TapiUnattend.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-PipelineConfig.xml TapiUnattend.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-manifest.ini TapiUnattend.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote.ini TapiUnattend.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE TapiUnattend.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE TapiUnattend.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html TapiUnattend.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.html TapiUnattend.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.txt TapiUnattend.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\scorches fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe File opened for modification C:\Windows\scorches TapiUnattend.exe File opened for modification C:\Windows\scorches TapiUnattend.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TapiUnattend.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TapiUnattend.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TapiUnattend.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4752 cmd.exe 5632 PING.EXE 4628 cmd.exe 4564 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x000700000002348c-35.dat nsis_installer_1 behavioral2/files/0x000700000002348c-35.dat nsis_installer_2 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 3516 taskkill.exe 5400 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\Desktop fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\\TapiUnattend.exe\"" fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\Desktop TapiUnattend.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\\TapiUnattend.exe\"" TapiUnattend.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings TapiUnattend.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 5632 PING.EXE 4564 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe 3596 TapiUnattend.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1004 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe Token: SeDebugPrivilege 3516 taskkill.exe Token: SeDebugPrivilege 3596 TapiUnattend.exe Token: SeDebugPrivilege 3516 TapiUnattend.exe Token: 33 468 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 468 AUDIODG.EXE Token: SeDebugPrivilege 5400 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3644 wrote to memory of 1004 3644 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 84 PID 3644 wrote to memory of 1004 3644 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 84 PID 3644 wrote to memory of 1004 3644 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 84 PID 3644 wrote to memory of 1004 3644 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 84 PID 3644 wrote to memory of 1004 3644 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 84 PID 3644 wrote to memory of 1004 3644 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 84 PID 3644 wrote to memory of 1004 3644 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 84 PID 3644 wrote to memory of 1004 3644 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 84 PID 3644 wrote to memory of 1004 3644 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 84 PID 3644 wrote to memory of 1004 3644 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 84 PID 3644 wrote to memory of 1004 3644 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 84 PID 1004 wrote to memory of 3044 1004 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 90 PID 1004 wrote to memory of 3044 1004 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 90 PID 1004 wrote to memory of 3044 1004 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 90 PID 1004 wrote to memory of 4628 1004 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 91 PID 1004 wrote to memory of 4628 1004 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 91 PID 1004 wrote to memory of 4628 1004 fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe 91 PID 4628 wrote to memory of 3516 4628 cmd.exe 93 PID 4628 wrote to memory of 3516 4628 cmd.exe 93 PID 4628 wrote to memory of 3516 4628 cmd.exe 93 PID 4628 wrote to memory of 4564 4628 cmd.exe 94 PID 4628 wrote to memory of 4564 4628 cmd.exe 94 PID 4628 wrote to memory of 4564 4628 cmd.exe 94 PID 3044 wrote to memory of 3596 3044 TapiUnattend.exe 97 PID 3044 wrote to memory of 3596 3044 TapiUnattend.exe 97 PID 3044 wrote to memory of 3596 3044 TapiUnattend.exe 97 PID 3044 wrote to memory of 3596 3044 TapiUnattend.exe 97 PID 3044 wrote to memory of 3596 3044 TapiUnattend.exe 97 PID 3044 wrote to memory of 3596 3044 TapiUnattend.exe 97 PID 3044 wrote to memory of 3596 3044 TapiUnattend.exe 97 PID 3044 wrote to memory of 3596 3044 TapiUnattend.exe 97 PID 3044 wrote to memory of 3596 3044 TapiUnattend.exe 97 PID 3044 wrote to memory of 3596 3044 TapiUnattend.exe 97 PID 3044 wrote to memory of 3596 3044 TapiUnattend.exe 97 PID 3600 wrote to memory of 3516 3600 TapiUnattend.exe 101 PID 3600 wrote to memory of 3516 3600 TapiUnattend.exe 101 PID 3600 wrote to memory of 3516 3600 TapiUnattend.exe 101 PID 3600 wrote to memory of 3516 3600 TapiUnattend.exe 101 PID 3600 wrote to memory of 3516 3600 TapiUnattend.exe 101 PID 3600 wrote to memory of 3516 3600 TapiUnattend.exe 101 PID 3600 wrote to memory of 3516 3600 TapiUnattend.exe 101 PID 3600 wrote to memory of 3516 3600 TapiUnattend.exe 101 PID 3600 wrote to memory of 3516 3600 TapiUnattend.exe 101 PID 3600 wrote to memory of 3516 3600 TapiUnattend.exe 101 PID 3600 wrote to memory of 3516 3600 TapiUnattend.exe 101 PID 3596 wrote to memory of 1364 3596 TapiUnattend.exe 102 PID 3596 wrote to memory of 1364 3596 TapiUnattend.exe 102 PID 1364 wrote to memory of 3460 1364 msedge.exe 103 PID 1364 wrote to memory of 3460 1364 msedge.exe 103 PID 3596 wrote to memory of 1400 3596 TapiUnattend.exe 104 PID 3596 wrote to memory of 1400 3596 TapiUnattend.exe 104 PID 1364 wrote to memory of 4976 1364 msedge.exe 105 PID 1364 wrote to memory of 4976 1364 msedge.exe 105 PID 1364 wrote to memory of 4976 1364 msedge.exe 105 PID 1364 wrote to memory of 4976 1364 msedge.exe 105 PID 1364 wrote to memory of 4976 1364 msedge.exe 105 PID 1364 wrote to memory of 4976 1364 msedge.exe 105 PID 1364 wrote to memory of 4976 1364 msedge.exe 105 PID 1364 wrote to memory of 4976 1364 msedge.exe 105 PID 1364 wrote to memory of 4976 1364 msedge.exe 105 PID 1364 wrote to memory of 4976 1364 msedge.exe 105 PID 1364 wrote to memory of 4976 1364 msedge.exe 105 PID 1364 wrote to memory of 4976 1364 msedge.exe 105 PID 1364 wrote to memory of 4976 1364 msedge.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Roaming\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\TapiUnattend.exe"C:\Users\Admin\AppData\Roaming\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\TapiUnattend.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Roaming\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\TapiUnattend.exe"C:\Users\Admin\AppData\Roaming\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\TapiUnattend.exe"4⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7fffdcac46f8,0x7fffdcac4708,0x7fffdcac47186⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,16543575788095766555,3522945852425175054,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:26⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,16543575788095766555,3522945852425175054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:36⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,16543575788095766555,3522945852425175054,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:86⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16543575788095766555,3522945852425175054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:16⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16543575788095766555,3522945852425175054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:16⤵PID:164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16543575788095766555,3522945852425175054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:16⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16543575788095766555,3522945852425175054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:16⤵PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16543575788095766555,3522945852425175054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:16⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,16543575788095766555,3522945852425175054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:86⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,16543575788095766555,3522945852425175054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:86⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16543575788095766555,3522945852425175054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:16⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16543575788095766555,3522945852425175054,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:16⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16543575788095766555,3522945852425175054,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:16⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16543575788095766555,3522945852425175054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:16⤵PID:5820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16543575788095766555,3522945852425175054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3784 /prefetch:16⤵PID:788
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://52uo5k3t73ypjije.0vgu64.top/5902-EB50-2BEE-0446-66A2?auto5⤵PID:5168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffdcac46f8,0x7fffdcac4708,0x7fffdcac47186⤵PID:5252
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:5304
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "TapiUnattend.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\TapiUnattend.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4752 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "TapiUnattend.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5400
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5632
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe" > NUL3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "fff2b25d6363f93276cd2f20e7e27578_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4564
-
-
-
-
C:\Users\Admin\AppData\Roaming\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\TapiUnattend.exeC:\Users\Admin\AppData\Roaming\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\TapiUnattend.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Roaming\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\TapiUnattend.exeC:\Users\Admin\AppData\Roaming\{213785FD-B748-09EE-BD5D-A1A6131C1E0C}\TapiUnattend.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1516
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x51c 0x5181⤵
- Suspicious use of AdjustPrivilegeToken
PID:468
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
6KB
MD5221de8fdd876c80db5e38896d4fe3c58
SHA1a08fb7dfcb14d083f0e216b21a2253794ad5041f
SHA256d818b9f875e6e6b11867d469c9c8891c3e1b7cd66ddb0426c0934861e4b0b043
SHA5121219d8f6bc48c4be65d8faf122d7a6a6a02fe010af43b5d9d28cedb79ec4e2cdcaf004ff81b863d1fc9ce25be5cfbdfcd4c417027e28f531523e3ce5f48d635d
-
Filesize
6KB
MD5c0c6548fd6f4b0871f9ca77c5767928e
SHA1c6f89f62a71d938335e6910457d0a36a8ee64335
SHA256ac7742647d4ae9ad708e00f969b2a7257b3d54c986175d1873a05895413f8fed
SHA512935efebf661ced3715f421a62d6b400729e54055a2b4518f23d60e803a705d3314061721ec8c73aa8a87838a845fc1803051418aca4d662e43a33e0982f19806
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b4889d619e134048b2c5c71072497adc
SHA192cbf6e2d85718be06cc550da402d0863a7f21da
SHA256f881d8ab91078cde6474b463eacc7adb8134885fe2dc3f3de3d8a82e7471d54d
SHA512f57a29596243785cc0ac73dd0662f08a05db92355ba701e6a5187c2d4f9a5e502122580d3d9f245489ebd61f132547aa6ea7f5ff86a7ecf9c6cf6d7ceaf40e8c
-
Filesize
1KB
MD568796f196b22db99a53addbea06fb015
SHA115fd11610f51aaff87fb813deb9072aef89a968f
SHA256db903b41e04034de2ee5271bd31960d155fdac9dcfee289687c911da5c328557
SHA512f4628f88e26cd383ddd75b32b4b505cf216d797cd24fc795ef82cde9a28126cb0433a6d9323dc11eaf8733b6760020ca68013d434b5ae0faadd922f71138f298
-
Filesize
524B
MD5ca6338ce720c9dc0cbb180e881c93bb8
SHA1148d708c97d0c20c2f931d64c189a15a9e1dbb4f
SHA256c4a39a0e6b140f0993c931bb7da6f2d658cae5d430d04bbdcbbfee3b673e705b
SHA5128c07330e187f5b5e25e452b15cf7cb2c2f3959dac2fba9d9ed335b7a22bd8cc63dad3df7b48212d0cbd567267193621112debde6f4733fee41346d037ec1772a
-
Filesize
2KB
MD520f118b48a744553f6a5d2075ef1f114
SHA13905c8b23e04a589b64060b1226f29955625e127
SHA256af3ea190ec3ae5330f2289aea799c3f7d87ebe9d57bc96d9646b8a59f24903b0
SHA51215743ff18c5b0ffadac1fe4b4662e29e2ed81c4da7c1050b81a6e65178a868d01fbfae6c66555d6fba10005010843efecc7ff7a6896077e664794cb713bc6314
-
Filesize
33B
MD51f3bc75daaf847977f7cf3529e4c48df
SHA1f4dc15cada37c0eb4277dfb13f054c0c4e26f381
SHA256d4368f7873c76dc461ffbcea9c96ec52db4de2e97f0c02762b78b5af1d1b4678
SHA51201fee9822070f4413f7125e94a82794861da82f5d77dec0e3a1b6db90f605fc25f07926ef0fb4792e8e910cc90b868a89a50b16d5119084fe7c8ad8fa89df87d
-
Filesize
1KB
MD5b37db354d10a73ba88288164bb13182c
SHA13649f45a56cf71a0cb551315372546700cd96a0d
SHA2569840c3e72436433614eab701e18e61f0ce0ab924a9491629463c949186dace4b
SHA5128afe3071ba61ed20c2034c7501d8953a5a7d313bf4acc1a69f50f369296ad4e34df895c039eadf97afd543b4c4dc27e2d0532705121158ceb2a186725ba76bca
-
Filesize
64KB
MD58bc69dd99430807714e08254db2b4d35
SHA17a9ecf46b2f0a2789d807c53cc422e7df33a94ed
SHA256ac96254a6832b71fa87a150a8940b4afc68126ada77a6a256d7b903ef96a57c3
SHA51285c58a8265606bc5421a5f7d00425557bba33ece80c094d1b9a8f94f14c0f511db20f8cb521af3a8d44b767ae458b461a5349175cb1268009b233b34a447605d
-
Filesize
4KB
MD5af8d5781966c6e1986ae1f468200dc9c
SHA1ce14ace59a7282e7ebc3b48a101712262c248dd4
SHA2566054571883bf20eab6213eb0c41d7778e97dafe769e18624e995ece2e67794aa
SHA5122b887d28a7bcdb4a61fc2b1bc07a195384a59a9b8cc2c4f639f2afb79b24fbacd4da61e188cd06cf6d27f3af8ff7b0119a709589bf2ea6c585316569673c0bd1
-
Filesize
36KB
MD5159cd36e2bd6b1f8caba5ee02df51ed7
SHA17fa99130376af9ab813e66a2abc3e949b27ac7f5
SHA25666348180266a0a8aacf6a87be7797adf9932f70ce0c5e461d02f7f4477940009
SHA512835f6b146edfd1b51672b3e5815cb0274a8323cf17a59236a2b838a4f3464cd774f1e57a6bb01f5e52ef75ea5fe0ccd1b41e0d351029abac7adf6ccbf8183c41
-
Filesize
1KB
MD5dcf6e7a41169fb0fc0a668500c02a897
SHA198b869d53ecc7dd7371c31b6462afee2701703ea
SHA256b9aaaf7c331d9eab50a41789a65cac92942b5452cb583a048012cbb4defa777d
SHA512c46f1dc2bf869e16693815cb1bffcf1ebe4fbc9dedfc6c09549cd06f2942efbf250ed49c7603531776f12b84a1161d5a83fffd0e5982a27e0ae7feecea3e7340
-
Filesize
762B
MD5d11e598eb6c13a60f7e90199e2494fbc
SHA183b217b64256c18466c65b82db94915263452bf5
SHA2567e092d72dd7f39541054e6f3c8de572ea385d49b9e1269f09cb7b98a185944f2
SHA5129352d14c008933ee11434129191cdaec45919fad313397b73f64b8bc5dbeaef08b10a0198829c7a47ba6c944adb6a0120100caefa5aa6c4eec30e1b7a3e328a1
-
Filesize
1KB
MD5b315d71c7feca1a5c1611675c577d2df
SHA1df93907f42140b3c6f932a2b5b40deb730dd5109
SHA256575d396d6995c2f4c9cfe493c76847df2d468a49d2a379139521bd00fa1c1abf
SHA5120a0513f58f33a27803bfdaa3e635928317d40de7488bef0b6d040d58414e60fd252f7ca348ef9d50827192f03e9e15675c5a5e3870cc8b36252671d4bbb5e680
-
Filesize
69B
MD50b30fdcd40962a14e305287fd65226d2
SHA1bf274efac3559e73a27eae2b321b24796c2b2b91
SHA2562ba947f88ea44d148e026ff20bcb43e8adb8981bb9d94b001c4a16d0fb0b98a0
SHA51267dc3efff810a26684c0579861c3091d69b92ef84b693afc30ba7625ba5932c03463822904b6c3d89d9e214e608436f0a4c3f531e449f267dd2208e2479fb454
-
Filesize
1KB
MD57bfb373d67d06ffe199f0902f93d9e7d
SHA1bd59ac1a74a77ff17a3ef258bf78103d4314904a
SHA256ae6e8895a2a328869326312221f08a1cbc7c45efe99ce66410d65d4139892140
SHA5124bb98ab5e2aa95097edddf165587778b37737bf41523fff7f82e468a1c43f8f4b6074017d107fabca5fe237fa4beeec2d40ea47516afc6d7fe7093d59fc84770
-
Filesize
11KB
MD56f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1b6ac111dfb0d1fc75ad09c56bde7830232395785
SHA256b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
SHA512a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
Filesize
1KB
MD5b422f0f3b781bcd0fde04bdb0bf286a1
SHA14a73813107b27222c8429fcb133b6fec1a186d21
SHA256d8b6e59901699bece4b3bfdfc707e7fdead4767d7589007ea4d9e37f195c387f
SHA5126b0af870d2a1804be87adfcb42c80ff2067d6cc22e3e942e708bdb8a9dd9693f43c6718444b362fb63c9f91ac50ab3087ca015cf69368b5bfa9371434059dd6e
-
Filesize
209KB
MD5fff2b25d6363f93276cd2f20e7e27578
SHA1225fe2828be9b637da2d7621e9fae8f42f4ac4f8
SHA2566480fc69756f789c08636c4cc4a3a8456f9e037245f1001a8ce47be37b56ad03
SHA5124501f3fbdadf9cb737ed451e2f0003fbeace09b3830b2adab6a39483cdb41ae144b9ec924ded56e77ae96b1305b18cdfd262a6eb0563cfe0b8d706c651b93464
-
Filesize
19KB
MD54a20ebafb5b02afafe783068684d7ede
SHA1c5cfeb099bfd826fd068496d9bec9f2fda521310
SHA2561585e0ea1806704bcaf46d6e427ce6ebcb337c3292aee2405f1041d5d423b788
SHA512a81a749a1e0878c34a43b49cb19adb1052149e2609a80741103b122f7699ca2a015feefa890eb69a7f72f2b662fd2798e9db818756981f810a973c444ee6485d
-
Filesize
10KB
MD569fca59977182975c2681c7ffe4ab159
SHA101fb726ff2bad097dac7ce7427fc4e6746b13a24
SHA256229f50e3d8f16cef5027c4de409cd2521559bba387987e67e0444bab747c23a7
SHA5121ea0d5dc2b524fc109ea11a562a5761136446d9a9a19c0eeb3f5e0b3398bc1717eecb68fcc81db410e79ff45da61fa4a8d7ac58ae8e30e7a4a9756f2e90a2491
-
Filesize
90B
MD520590f405eb25f4992c1dce2694be1b4
SHA1f9edbca5fcc60ac174fa3183c7824f343df96339
SHA25685cebfdb4766a6abca021c835b3f564b1cfde40250ebd9606092dc2d10e0c527
SHA512b13576fb2c196f16f3542fb8faea2142a8e5cc14d9b473f809c1eb7e377f6a5060d1daa2cf413dbeb7378be43f227c74ca0e53527324507e77ab9e67101a717c
-
Filesize
213B
MD51c2a24505278e661eca32666d4311ce5
SHA1d1deb57023bbe38a33f0894b6a9a7bbffbfdeeee
SHA2563f0dc6126cf33e7aa725df926a1b7d434eaf62a69f42e1b8ae4c110fd3572628
SHA512ce866f2c4b96c6c7c090f4bf1708bfebdfcd58ce65a23bdc124a13402ef4941377c7e286e6156a28bd229e422685454052382f1f532545bc2edf07be4861b36c