Overview
overview
10Static
static
38283c1cc0d...18.exe
windows7-x64
108283c1cc0d...18.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Perl.dll
windows7-x64
3Perl.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 08:50
Static task
static1
Behavioral task
behavioral1
Sample
8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Perl.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
Perl.dll
Resource
win10v2004-20241007-en
General
-
Target
8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe
-
Size
258KB
-
MD5
8283c1cc0db9501e05206c0542fe9447
-
SHA1
fa800fdf2fc3bc8c015d7f20e04a54b9f95f39f5
-
SHA256
b592240b55c4c0fcf3733ba808523025ec245302d7ebc897bbc6824596de90a7
-
SHA512
133edc6a33503896adcc86381f1bed32646b734e246b22843a524c489bd6a63c38e696aa14b814c744d817385146ad214a78963a80c6cb3d9a7783099ae6791a
-
SSDEEP
6144:BwHysO+NnMZ2INVorOnii05dapobD/OLJoMyk6zk:qO+NFYRYQyGNTykIk
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.txt
http://52uo5k3t73ypjije.5tb8hy.bid/332E-61FF-9E83-0046-1571
http://52uo5k3t73ypjije.y12acl.bid/332E-61FF-9E83-0046-1571
http://52uo5k3t73ypjije.hhc366.top/332E-61FF-9E83-0046-1571
http://52uo5k3t73ypjije.gg4dgp.bid/332E-61FF-9E83-0046-1571
http://52uo5k3t73ypjije.onion.to/332E-61FF-9E83-0046-1571
http://52uo5k3t73ypjije.onion/332E-61FF-9E83-0046-1571
Extracted
C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.html
Signatures
-
Cerber 2 IoCs
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
description ioc Process Mutant created shell.{1E706B6E-DFEC-A3EB-5992-A024EF5CBE75} efsui.exe Mutant opened shell.{1E706B6E-DFEC-A3EB-5992-A024EF5CBE75} 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe -
Cerber family
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" efsui.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 3516 bcdedit.exe 4596 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\efsui.exe\"" 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\efsui.exe\"" efsui.exe -
Contacts a large (530) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation efsui.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\efsui.lnk 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\efsui.lnk efsui.exe -
Executes dropped EXE 2 IoCs
pid Process 1660 efsui.exe 2720 efsui.exe -
Loads dropped DLL 6 IoCs
pid Process 1584 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 1584 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 1584 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 1660 efsui.exe 1660 efsui.exe 1660 efsui.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\efsui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\efsui.exe\"" efsui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\efsui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\efsui.exe\"" efsui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\efsui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\efsui.exe\"" 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\efsui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\efsui.exe\"" 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp8A35.bmp" efsui.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1584 set thread context of 1880 1584 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 91 PID 1660 set thread context of 2720 1660 efsui.exe 102 -
Drops file in Program Files directory 16 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE efsui.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-PipelineConfig.xml efsui.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.txt efsui.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-manifest.ini efsui.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote.ini efsui.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE efsui.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.vbs efsui.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE efsui.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.vbs efsui.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt efsui.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE efsui.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.html efsui.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html efsui.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.url efsui.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE efsui.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\# DECRYPT MY FILES #.url efsui.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe File opened for modification C:\Windows\ efsui.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efsui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efsui.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5028 PING.EXE 2616 cmd.exe 1152 PING.EXE 4248 cmd.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023cbf-30.dat nsis_installer_1 behavioral2/files/0x0007000000023cbf-30.dat nsis_installer_2 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4024 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 4472 taskkill.exe 4352 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\efsui.exe\"" 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop efsui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\\efsui.exe\"" efsui.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings efsui.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1152 PING.EXE 5028 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe 2720 efsui.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 1880 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Token: SeDebugPrivilege 4352 taskkill.exe Token: SeDebugPrivilege 2720 efsui.exe Token: SeBackupPrivilege 2596 vssvc.exe Token: SeRestorePrivilege 2596 vssvc.exe Token: SeAuditPrivilege 2596 vssvc.exe Token: SeIncreaseQuotaPrivilege 3584 wmic.exe Token: SeSecurityPrivilege 3584 wmic.exe Token: SeTakeOwnershipPrivilege 3584 wmic.exe Token: SeLoadDriverPrivilege 3584 wmic.exe Token: SeSystemProfilePrivilege 3584 wmic.exe Token: SeSystemtimePrivilege 3584 wmic.exe Token: SeProfSingleProcessPrivilege 3584 wmic.exe Token: SeIncBasePriorityPrivilege 3584 wmic.exe Token: SeCreatePagefilePrivilege 3584 wmic.exe Token: SeBackupPrivilege 3584 wmic.exe Token: SeRestorePrivilege 3584 wmic.exe Token: SeShutdownPrivilege 3584 wmic.exe Token: SeDebugPrivilege 3584 wmic.exe Token: SeSystemEnvironmentPrivilege 3584 wmic.exe Token: SeRemoteShutdownPrivilege 3584 wmic.exe Token: SeUndockPrivilege 3584 wmic.exe Token: SeManageVolumePrivilege 3584 wmic.exe Token: 33 3584 wmic.exe Token: 34 3584 wmic.exe Token: 35 3584 wmic.exe Token: 36 3584 wmic.exe Token: SeIncreaseQuotaPrivilege 3584 wmic.exe Token: SeSecurityPrivilege 3584 wmic.exe Token: SeTakeOwnershipPrivilege 3584 wmic.exe Token: SeLoadDriverPrivilege 3584 wmic.exe Token: SeSystemProfilePrivilege 3584 wmic.exe Token: SeSystemtimePrivilege 3584 wmic.exe Token: SeProfSingleProcessPrivilege 3584 wmic.exe Token: SeIncBasePriorityPrivilege 3584 wmic.exe Token: SeCreatePagefilePrivilege 3584 wmic.exe Token: SeBackupPrivilege 3584 wmic.exe Token: SeRestorePrivilege 3584 wmic.exe Token: SeShutdownPrivilege 3584 wmic.exe Token: SeDebugPrivilege 3584 wmic.exe Token: SeSystemEnvironmentPrivilege 3584 wmic.exe Token: SeRemoteShutdownPrivilege 3584 wmic.exe Token: SeUndockPrivilege 3584 wmic.exe Token: SeManageVolumePrivilege 3584 wmic.exe Token: 33 3584 wmic.exe Token: 34 3584 wmic.exe Token: 35 3584 wmic.exe Token: 36 3584 wmic.exe Token: SeDebugPrivilege 4472 taskkill.exe Token: 33 3624 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3624 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1584 wrote to memory of 1880 1584 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 91 PID 1584 wrote to memory of 1880 1584 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 91 PID 1584 wrote to memory of 1880 1584 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 91 PID 1584 wrote to memory of 1880 1584 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 91 PID 1584 wrote to memory of 1880 1584 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 91 PID 1584 wrote to memory of 1880 1584 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 91 PID 1584 wrote to memory of 1880 1584 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 91 PID 1584 wrote to memory of 1880 1584 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 91 PID 1584 wrote to memory of 1880 1584 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 91 PID 1584 wrote to memory of 1880 1584 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 91 PID 1584 wrote to memory of 1880 1584 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 91 PID 1880 wrote to memory of 1660 1880 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 95 PID 1880 wrote to memory of 1660 1880 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 95 PID 1880 wrote to memory of 1660 1880 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 95 PID 1880 wrote to memory of 2616 1880 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 96 PID 1880 wrote to memory of 2616 1880 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 96 PID 1880 wrote to memory of 2616 1880 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 96 PID 2616 wrote to memory of 4352 2616 cmd.exe 98 PID 2616 wrote to memory of 4352 2616 cmd.exe 98 PID 2616 wrote to memory of 4352 2616 cmd.exe 98 PID 2616 wrote to memory of 1152 2616 cmd.exe 99 PID 2616 wrote to memory of 1152 2616 cmd.exe 99 PID 2616 wrote to memory of 1152 2616 cmd.exe 99 PID 1660 wrote to memory of 2720 1660 efsui.exe 102 PID 1660 wrote to memory of 2720 1660 efsui.exe 102 PID 1660 wrote to memory of 2720 1660 efsui.exe 102 PID 1660 wrote to memory of 2720 1660 efsui.exe 102 PID 1660 wrote to memory of 2720 1660 efsui.exe 102 PID 1660 wrote to memory of 2720 1660 efsui.exe 102 PID 1660 wrote to memory of 2720 1660 efsui.exe 102 PID 1660 wrote to memory of 2720 1660 efsui.exe 102 PID 1660 wrote to memory of 2720 1660 efsui.exe 102 PID 1660 wrote to memory of 2720 1660 efsui.exe 102 PID 1660 wrote to memory of 2720 1660 efsui.exe 102 PID 2720 wrote to memory of 4024 2720 efsui.exe 104 PID 2720 wrote to memory of 4024 2720 efsui.exe 104 PID 2720 wrote to memory of 3584 2720 efsui.exe 108 PID 2720 wrote to memory of 3584 2720 efsui.exe 108 PID 2720 wrote to memory of 3516 2720 efsui.exe 110 PID 2720 wrote to memory of 3516 2720 efsui.exe 110 PID 2720 wrote to memory of 4596 2720 efsui.exe 112 PID 2720 wrote to memory of 4596 2720 efsui.exe 112 PID 2720 wrote to memory of 4460 2720 efsui.exe 123 PID 2720 wrote to memory of 4460 2720 efsui.exe 123 PID 4460 wrote to memory of 2452 4460 msedge.exe 124 PID 4460 wrote to memory of 2452 4460 msedge.exe 124 PID 2720 wrote to memory of 2820 2720 efsui.exe 125 PID 2720 wrote to memory of 2820 2720 efsui.exe 125 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 PID 4460 wrote to memory of 2640 4460 msedge.exe 126 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe"2⤵
- Cerber
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Roaming\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\efsui.exe"C:\Users\Admin\AppData\Roaming\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\efsui.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Roaming\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\efsui.exe"C:\Users\Admin\AppData\Roaming\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\efsui.exe"4⤵
- Cerber
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:4024
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no5⤵
- Modifies boot configuration data using bcdedit
PID:3516
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures5⤵
- Modifies boot configuration data using bcdedit
PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8174146f8,0x7ff817414708,0x7ff8174147186⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,458708243950291901,1651730047241756244,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:26⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,458708243950291901,1651730047241756244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:36⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,458708243950291901,1651730047241756244,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:86⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,458708243950291901,1651730047241756244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:16⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,458708243950291901,1651730047241756244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:16⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,458708243950291901,1651730047241756244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:16⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,458708243950291901,1651730047241756244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:16⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,458708243950291901,1651730047241756244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:16⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,458708243950291901,1651730047241756244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:86⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,458708243950291901,1651730047241756244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:86⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,458708243950291901,1651730047241756244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:16⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,458708243950291901,1651730047241756244,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:16⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,458708243950291901,1651730047241756244,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:16⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,458708243950291901,1651730047241756244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:16⤵PID:5420
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://52uo5k3t73ypjije.5tb8hy.bid/332E-61FF-9E83-0046-1571?auto5⤵PID:1584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0xdc,0x7ff8174146f8,0x7ff817414708,0x7ff8174147186⤵PID:2440
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:3340
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /f /im "efsui.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{221C34B6-8771-0DBF-8B49-80C3396FDD4F}\efsui.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4248 -
C:\Windows\system32\taskkill.exetaskkill /f /im "efsui.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5028
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /f /im "8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe" > NUL3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1152
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1088
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x150 0x4a41⤵
- Suspicious use of AdjustPrivilegeToken
PID:3624
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
5KB
MD52a425f151ca7be77a553e215b4c46600
SHA11996a1477436dc62d56bf0b5ade74b35eb7b7c34
SHA256dfecc517f99c92c9efc53ab6e54f6777b5021de1a5ff1525846309684ef9cde0
SHA51282265892bc4280203b3020429f680a264480678f58229d9b4ae153b91bc55e8de59353230ef1e6e423b5053bd5414b742ea77a7dfe80afdb78dd83c50c72fc97
-
Filesize
6KB
MD582dd75e24c204b67732734acd45fc4f7
SHA17cf74e2a428bb8a6dcf52a85a8d03a3883ae7203
SHA2565f30223057e4aba48440f407284b151e31b840a982853237655657536db68166
SHA5128848f4c14b3c1599f94721ef5f07b6c3f3647dce556678bdeec8233a354fb54bd353dcff44e1f2b360686820e64d2e6f2dd257a33b789532ebf0377d2b3faefe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD509f622b64c227a9e5e7215d77cd7329a
SHA1a137ed5b5e054dcd109b095feaf1ecb3aa245ce4
SHA25686eacf5bc921387efbd4d534a056dff467bf329ffc3ecf0a9ac67d7056ac8bee
SHA5126a7d8f0cc8718b5015f1956581e70b74f9d022d6c3ad8bdb04bce895de63b8d67caefc5a9335ee32752e4afba10033870739e68fee61238307b921fbdc6651b0
-
Filesize
289B
MD559386c53f2570f0e370e2ece30ccce7a
SHA1b2fe2bc41bc2c07a33ebbc2e3ec6e30229215d69
SHA2563b845724fd74dd2034ec56d4a2ecacc2dd49e0b388bf68f2e9546b9f8fa8065f
SHA5123dd155da349193d5b1c185c52b2bd5b66edcff318d4fb051799523c490f6a95c9da85ab8dc203334b4630c978b0cb6fa70fcc54497e33ea1b9c91f4497541569
-
Filesize
11KB
MD56f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1b6ac111dfb0d1fc75ad09c56bde7830232395785
SHA256b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
SHA512a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
Filesize
19KB
MD52cb787ac6ad67dc8d25c345f8cdccb31
SHA13c945db3ff0d2210ef148047033775b7e6e6f55f
SHA2567085dcfb5fc016a2dfa636ab0a7853e2f8b8a1c73c0914ce9b68e5ca39568880
SHA512c956e6ebfa87bbf8783de43a1c7df8db5d30579af0a9bb65727ab71fcf66543a80d61ba678271db7712c82c138a305da47dd1b70a91ceebfe835840440b06962
-
Filesize
10KB
MD591677d3c3a651a0c59c8fca384a21671
SHA15acca5855c42844b3e930df1393f28c24b94a2a8
SHA256a43b4a86629a68ad10f08bbecd7255c1c95d5788cbd000dae359667f2fe5c49a
SHA5121b746a709abcae0e6970b40869db4cfe111caddaa27071c14fbe61359e51f915ce18cfd7dd8b7915e11613c01d361ae6beadea22c7751ddb95d2ff409dcdd379
-
Filesize
90B
MD5f5b008c6f7b872ff2950f1aea26d176d
SHA186d9d0c6ead0d9a55585cd431805d734e7f32e0c
SHA256b01f28e202a2f1fda7bba77cd1d7677c824806194a212a536264ca35fe1e0b6b
SHA512a7b3e61a18b79524f152dc5ec881e62491a5d1beec50b890efbcaeb1c76eba95ed376ec2f8e7556376f120a31993fcf6036c5b91a1ca5282dbb1c79a152566f4
-
Filesize
252B
MD518d46f5d8ebd3c7d6df0c7a8fd1bd64d
SHA1aeb8407457434aabce2a4c2f95fe305c5303f929
SHA256ceb35b75d397b07c84dfab3a28189e9431bdf80ec99ab65f9ccf01986bd4a8e9
SHA51235fc759be0dee77eb9e39350873c24d9693cf6f370f171814e2ce6250ea814fea8a0887442ebae9077d6e9ff81ae7034faa0afcb080401a7d4ac384d2ba42d65
-
Filesize
3KB
MD56b6888981cf28ad6060bf74a6310d40c
SHA15eab9777cfcf3be44dd621eb3a7abf482df3e7f3
SHA256d429f4b6cda0bc7014c10f05cb4d9a520cbabc6b297c4e8cd792b2b5e854d987
SHA51264c6d6ea608e1c5d0c3a952caf5816a16d31212e1bb9e62b76710b4e9dd751023f3d8c58333c73cf79c7aff0fafb1143290b0666a7e20b798c3e52a563a61655
-
Filesize
3KB
MD5bd600beb7970de7c3a30d3374159ada8
SHA1a7317fd2a67fc4856d02589c001e91b42e5cdbfe
SHA256326c54cac5aa893a2da05c78a7cf9daa6391c2b4ad34a14147c8c80964ebb7ea
SHA512764e60c590d469d699d31bfc83ec428e6bcdbf9b79d24ae567b0439cb1f163290c07c2ff40051a11cb7020f493fa9ec90cd953a0f53752b61da86536d5642d1c
-
Filesize
2KB
MD51b5c9ac81d0db16bdef65bb8ed4401a1
SHA1b45a09049cdabcdaa104e284bb457aabf9e02909
SHA25679f8f465d0ad808a0c2bc0bd79cad80d1f2ec0e92df2a7b9d79d764bb0308535
SHA512c2d6146fad4289a9f6b502872f102dbe7678bab74f744810845ed80d137620b3ea45b8141f2600cc557df27f3e79523df6ce8bc9fc2947798f2171034149076c
-
Filesize
3KB
MD5c22dce2c95e3fbc8ac2f569b7fb8474a
SHA19e5b1c407424004fa5c0c1d96af96a9b0e10353e
SHA256423cad4eca8206b5b3ef851278a749e5246042e32759abe6b2026d14ed2ba6d6
SHA512f516531af2f75cb949ef6fbd2bd18e12aa07f94e2b7cb1398d0b13033f84c91f32ca28dc76c6e8caa8191c7b115a3cf59fddc241bfb3e244ae50247c6eee69f1
-
Filesize
207KB
MD52fcb0be151595ca64a870aa356c0db8c
SHA1e9ecdf81188a5fc3800fbe4b2856c04cbb838def
SHA25658c63bb36f82c489fee50f4f460fb0467abf158200d512c0b007b8111a53b00d
SHA512bbaa13b73a94c1c4c421e99e148aaadc2f01e2b2e5fe49f1bd8c36ddca7592b31660a3e6daac045dc6d92a93028b4b21ea87f7290ee353adb28d43188ad01690
-
Filesize
1KB
MD53ee1b6e8ba66b58ab042e16fae2458e6
SHA1ea7dcbbcfa62164347ce20a46c1400d45f22bd48
SHA25648de711d369441be4831ecca78ebd7c4f1f11e0cc3bf18700d871da8dc20a494
SHA51236d592c6732d51e5add5b4a1e16a54df9e92fdaf7caece1c645c6265793babfa78c6d8137165c42a2c707b3f2b9d912e0c5b1fb0de4c24eac3e05590dae088f0
-
Filesize
72KB
MD59b35870798ea01e8e943091ec7a0bb80
SHA166650be447dceabd4ba938ccf1a9663f2eb99a91
SHA256663aa24d2ef5cc3a0f0b8e8e575643c59a37b4c0fd7d7b2cf5217f14c9eb7309
SHA512b9f297a2cc255a7aac51ff2b1e45f6985359968bfe88b8e7201f7ecb5b16bfd97323042a29ad87e149c7994d9e16b034ebe1b044bffc6e2a98ebef2997656279
-
Filesize
258KB
MD58283c1cc0db9501e05206c0542fe9447
SHA1fa800fdf2fc3bc8c015d7f20e04a54b9f95f39f5
SHA256b592240b55c4c0fcf3733ba808523025ec245302d7ebc897bbc6824596de90a7
SHA512133edc6a33503896adcc86381f1bed32646b734e246b22843a524c489bd6a63c38e696aa14b814c744d817385146ad214a78963a80c6cb3d9a7783099ae6791a