Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 23:12
Static task
static1
Behavioral task
behavioral1
Sample
ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe
-
Size
226KB
-
MD5
ed28a3189aefa3589a8602d24d19f1cb
-
SHA1
4619f493d165ffc9893f19a32e197b7572497cd2
-
SHA256
52e15e0deb115003af9f56c7f4e66076a4c859b4e8d782e5ad1d29a95b9164bc
-
SHA512
06577460509c754a2850f69ac250132e73e2367995825632cf358cf7dd20f1774cb38a7c2a214209fe74a10ca8bac7fdf3bc84d0447fe77963a926333d3d73de
-
SSDEEP
6144:BQGB/n4ZWOeRzb2RL6nDHoEpgYH79X+9Ac:l4ZADDHofYGAc
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.xmfhr6.win/939D-5CBD-8609-0063-7DA9
http://cerberhhyed5frqa.cmfhty.win/939D-5CBD-8609-0063-7DA9
http://cerberhhyed5frqa.dk59jg.win/939D-5CBD-8609-0063-7DA9
http://cerberhhyed5frqa.xmfu59.win/939D-5CBD-8609-0063-7DA9
http://cerberhhyed5frqa.er48rt.win/939D-5CBD-8609-0063-7DA9
http://cerberhhyed5frqa.onion/939D-5CBD-8609-0063-7DA9
Extracted
C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Contacts a large (16388) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 748 bcdedit.exe 2268 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\shrpubw.exe\"" shrpubw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\shrpubw.exe\"" ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 3036 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\shrpubw.lnk ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\shrpubw.lnk shrpubw.exe -
Executes dropped EXE 2 IoCs
pid Process 2540 shrpubw.exe 580 shrpubw.exe -
Loads dropped DLL 6 IoCs
pid Process 2684 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 2684 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 2380 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 2540 shrpubw.exe 2540 shrpubw.exe 580 shrpubw.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\shrpubw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\shrpubw.exe\"" ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\shrpubw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\shrpubw.exe\"" ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\shrpubw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\shrpubw.exe\"" shrpubw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\shrpubw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\shrpubw.exe\"" shrpubw.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA shrpubw.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp3228.bmp" shrpubw.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2684 set thread context of 2380 2684 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 31 PID 2540 set thread context of 580 2540 shrpubw.exe 38 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\ ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe File opened for modification C:\Windows\pagination ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe File opened for modification C:\Windows\ shrpubw.exe File opened for modification C:\Windows\pagination shrpubw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shrpubw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shrpubw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3036 cmd.exe 1460 PING.EXE 2792 cmd.exe 1464 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000800000001650a-34.dat nsis_installer_1 behavioral1/files/0x000800000001650a-34.dat nsis_installer_2 -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1900 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 1920 taskkill.exe 956 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\shrpubw.exe\"" ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop shrpubw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\shrpubw.exe\"" shrpubw.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE8A0D81-B9A7-11EF-A51B-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b5ce25c00c009a4894156f50b0319f6e00000000020000000000106600000001000020000000c41097a2037cadf42188ad626d1a5c536b726d577cd58318a1bb8666a29a1616000000000e80000000020000200000006ad1e661f94314c7f3f182babe68a48767af6c4f66b455b43334ec55865be3b720000000503f3cfbc2aa17376e74c6b976aa3f5c817f0def10dc12ae1cc4ba3be1aca8ba400000007e9f3080e4edbe329b5d2566611e963ec416debf85fc017bc3c0370a6aee9190ffcf19a1f71fdeb6df174ce42b6b61563270c4da88dd261af3f05dfc7b686efb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e02a59c1b44ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE7BC541-B9A7-11EF-A51B-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1460 PING.EXE 1464 PING.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe 580 shrpubw.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 2380 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe Token: SeDebugPrivilege 1920 taskkill.exe Token: SeDebugPrivilege 580 shrpubw.exe Token: SeBackupPrivilege 2856 vssvc.exe Token: SeRestorePrivilege 2856 vssvc.exe Token: SeAuditPrivilege 2856 vssvc.exe Token: SeIncreaseQuotaPrivilege 900 wmic.exe Token: SeSecurityPrivilege 900 wmic.exe Token: SeTakeOwnershipPrivilege 900 wmic.exe Token: SeLoadDriverPrivilege 900 wmic.exe Token: SeSystemProfilePrivilege 900 wmic.exe Token: SeSystemtimePrivilege 900 wmic.exe Token: SeProfSingleProcessPrivilege 900 wmic.exe Token: SeIncBasePriorityPrivilege 900 wmic.exe Token: SeCreatePagefilePrivilege 900 wmic.exe Token: SeBackupPrivilege 900 wmic.exe Token: SeRestorePrivilege 900 wmic.exe Token: SeShutdownPrivilege 900 wmic.exe Token: SeDebugPrivilege 900 wmic.exe Token: SeSystemEnvironmentPrivilege 900 wmic.exe Token: SeRemoteShutdownPrivilege 900 wmic.exe Token: SeUndockPrivilege 900 wmic.exe Token: SeManageVolumePrivilege 900 wmic.exe Token: 33 900 wmic.exe Token: 34 900 wmic.exe Token: 35 900 wmic.exe Token: SeIncreaseQuotaPrivilege 900 wmic.exe Token: SeSecurityPrivilege 900 wmic.exe Token: SeTakeOwnershipPrivilege 900 wmic.exe Token: SeLoadDriverPrivilege 900 wmic.exe Token: SeSystemProfilePrivilege 900 wmic.exe Token: SeSystemtimePrivilege 900 wmic.exe Token: SeProfSingleProcessPrivilege 900 wmic.exe Token: SeIncBasePriorityPrivilege 900 wmic.exe Token: SeCreatePagefilePrivilege 900 wmic.exe Token: SeBackupPrivilege 900 wmic.exe Token: SeRestorePrivilege 900 wmic.exe Token: SeShutdownPrivilege 900 wmic.exe Token: SeDebugPrivilege 900 wmic.exe Token: SeSystemEnvironmentPrivilege 900 wmic.exe Token: SeRemoteShutdownPrivilege 900 wmic.exe Token: SeUndockPrivilege 900 wmic.exe Token: SeManageVolumePrivilege 900 wmic.exe Token: 33 900 wmic.exe Token: 34 900 wmic.exe Token: 35 900 wmic.exe Token: 33 2632 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2632 AUDIODG.EXE Token: 33 2632 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2632 AUDIODG.EXE Token: SeDebugPrivilege 956 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 2900 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 2900 iexplore.exe 2900 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2436 iexplore.exe 2436 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2380 2684 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2380 2684 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2380 2684 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2380 2684 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2380 2684 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2380 2684 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2380 2684 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2380 2684 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2380 2684 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2380 2684 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2540 2380 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 32 PID 2380 wrote to memory of 2540 2380 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 32 PID 2380 wrote to memory of 2540 2380 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 32 PID 2380 wrote to memory of 2540 2380 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 32 PID 2380 wrote to memory of 3036 2380 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 33 PID 2380 wrote to memory of 3036 2380 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 33 PID 2380 wrote to memory of 3036 2380 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 33 PID 2380 wrote to memory of 3036 2380 ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe 33 PID 3036 wrote to memory of 1920 3036 cmd.exe 35 PID 3036 wrote to memory of 1920 3036 cmd.exe 35 PID 3036 wrote to memory of 1920 3036 cmd.exe 35 PID 3036 wrote to memory of 1920 3036 cmd.exe 35 PID 3036 wrote to memory of 1460 3036 cmd.exe 37 PID 3036 wrote to memory of 1460 3036 cmd.exe 37 PID 3036 wrote to memory of 1460 3036 cmd.exe 37 PID 3036 wrote to memory of 1460 3036 cmd.exe 37 PID 2540 wrote to memory of 580 2540 shrpubw.exe 38 PID 2540 wrote to memory of 580 2540 shrpubw.exe 38 PID 2540 wrote to memory of 580 2540 shrpubw.exe 38 PID 2540 wrote to memory of 580 2540 shrpubw.exe 38 PID 2540 wrote to memory of 580 2540 shrpubw.exe 38 PID 2540 wrote to memory of 580 2540 shrpubw.exe 38 PID 2540 wrote to memory of 580 2540 shrpubw.exe 38 PID 2540 wrote to memory of 580 2540 shrpubw.exe 38 PID 2540 wrote to memory of 580 2540 shrpubw.exe 38 PID 2540 wrote to memory of 580 2540 shrpubw.exe 38 PID 580 wrote to memory of 1900 580 shrpubw.exe 39 PID 580 wrote to memory of 1900 580 shrpubw.exe 39 PID 580 wrote to memory of 1900 580 shrpubw.exe 39 PID 580 wrote to memory of 1900 580 shrpubw.exe 39 PID 580 wrote to memory of 900 580 shrpubw.exe 43 PID 580 wrote to memory of 900 580 shrpubw.exe 43 PID 580 wrote to memory of 900 580 shrpubw.exe 43 PID 580 wrote to memory of 900 580 shrpubw.exe 43 PID 580 wrote to memory of 748 580 shrpubw.exe 45 PID 580 wrote to memory of 748 580 shrpubw.exe 45 PID 580 wrote to memory of 748 580 shrpubw.exe 45 PID 580 wrote to memory of 748 580 shrpubw.exe 45 PID 580 wrote to memory of 2268 580 shrpubw.exe 47 PID 580 wrote to memory of 2268 580 shrpubw.exe 47 PID 580 wrote to memory of 2268 580 shrpubw.exe 47 PID 580 wrote to memory of 2268 580 shrpubw.exe 47 PID 580 wrote to memory of 2436 580 shrpubw.exe 50 PID 580 wrote to memory of 2436 580 shrpubw.exe 50 PID 580 wrote to memory of 2436 580 shrpubw.exe 50 PID 580 wrote to memory of 2436 580 shrpubw.exe 50 PID 580 wrote to memory of 2416 580 shrpubw.exe 51 PID 580 wrote to memory of 2416 580 shrpubw.exe 51 PID 580 wrote to memory of 2416 580 shrpubw.exe 51 PID 580 wrote to memory of 2416 580 shrpubw.exe 51 PID 2436 wrote to memory of 2960 2436 iexplore.exe 52 PID 2436 wrote to memory of 2960 2436 iexplore.exe 52 PID 2436 wrote to memory of 2960 2436 iexplore.exe 52 PID 2436 wrote to memory of 2960 2436 iexplore.exe 52 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\shrpubw.exe"C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\shrpubw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\shrpubw.exe"C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\shrpubw.exe"4⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:1900
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:900
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no5⤵
- Modifies boot configuration data using bcdedit
PID:748
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures5⤵
- Modifies boot configuration data using bcdedit
PID:2268
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:603137 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:2416
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:3056
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "shrpubw.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\shrpubw.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2792 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "shrpubw.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1464
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe" > NUL3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "ed28a3189aefa3589a8602d24d19f1cb_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1460
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2900 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2800
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5981⤵
- Suspicious use of AdjustPrivilegeToken
PID:2632
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5768593bafcbe910755fe7f3a2e0476d0
SHA18c468e40c97831f4d2d24d8431379fce5b08ae32
SHA2569a417caaf4ea85faa1cd58a189ad467f0d17db5c6bd8932e26dc58c615b7a19a
SHA5129522c6f2deac126bc5b337f518fb54b24f38054d794fcd6e3b0e621322f73708af9ef8bda801400ffcaec877b44799920b1bd78414dab43ef2453bfb132d10cd
-
Filesize
10KB
MD57e6e73547b060f2a014dbe6fcb5ec668
SHA17be6fb9d7b91eb0b038d66ca128340cd47bc45d9
SHA2566a419cec6da1721c606b80fe651b388bade651f8d78ed15b0acf109afd787f42
SHA512f07d6a86c86c30cabd024c9a266bdac582a3f699a8c345728f22782c0fe94740dc5011e30b4f08d5c1d95425ced92d6e564fc354abd815eab88c4dad9d551a22
-
Filesize
85B
MD5a5066ecae43064ddd8af5c6221e05867
SHA17c726d3bc2e4fba1e825a301e172d4cb597ed83e
SHA2560b3e7237bb75a12133fc8f058b229c4d60ab6e7dafbfa6c5e3a0800ce421cdd8
SHA512676e44c4a34e7c3177c240c7929f5e12bd6db011566a12fd9de8088c095ac1b7bb043e7867ca8d7bc03ea2c763ec0545bcf66d1878a09ca3801e2dd66cfb8a08
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0ae236d641cc88d56971837afd5435
SHA11456d10eb273736f4e630e1db9de9df7a1811225
SHA2569a166c5445e461eda86f1af395596cd139a29b49608e64e3bbbdd611eda1570e
SHA512b79f7b06a4711a9194d1327e6de345c002881c05c1cf93b9c6eccdc1d047ed38acf4b2a3529eb81f7bbc10fdca09fc55bf43bd083637ccf32304f8b2e4d3dfb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5260f2d5dd95d3eb829a3f791af8a4719
SHA12d6d56154912a0f6f80b99e38c5b8b9355c57f53
SHA256c1bfa7c1da734398fd95a54634ec2259bd79f8bf13bef7bb122483466b568bb7
SHA51207f84006e46ea56923c75adc22df92cd307df8476271c11c3caafcd65e27a6d3d8d92a6c1a583b7df2f1afa3a30ccffb737e545166a98944b30fd93c85de1532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5152613fb301bb63c1ca6dd44d929b5a4
SHA1c8885e3cf372b5bc8d344da73343a71fc3bce85f
SHA256b213bbcfbaa8467e9ac611ff4861e5a5480b950e25f0357ebad74b8e4f962067
SHA5123ae43105f276968d9795dbc0329560043f58603c55ec461ed78eea929c566de74f19091477387d6d9626096f5e54a3bec13e67879ab3845d0f469d6c0c6a5438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6a822fb474e813b9ad527aeb74f1969
SHA1dff4b9147c14345520b8ce3f9b54d9944d72567c
SHA2567db4abb61da08eff5075de011ffaf9e5d2cd0338ff1e91d257a5eccaa3e658c8
SHA512ae19746a80752f635834cdbcac9f0e0bea47374b7193628fdea4252db2382f8cb934563776451e2d42e336ac2c8e4724654a37fb716590d9b6e962f5496b6690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed1f1703b1c8cb07b05130bf9bf7873
SHA1c344629a7038f6f89b4e2bc6846c642d3473d323
SHA25696492bd9527e80e650f26b6701720aa3aa38e2d8048ca341cbb2973896b715ba
SHA512646a47dc065f94ecbde3ad702ca798c80651dd9dd716bba90d00ee2a1dd1fd7808c6df466f0143f70017679ba0eb8c744c1c025ad1c9206f4c2ebb7b210e1c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e302d16668e042deadc55d5f7592bf
SHA178118b4f97a2833f1c140ad71c2d900692e32fac
SHA2561fa5f686c966400d7beb83fcc6de00bb0f9890384a5447636cd7e2e0c4aabf41
SHA512e173624ded7807dbd7e817e85588059c4af464b68193ff3b73fb286160f210ae4a16babb1cbc314567c92669d135732b2b638fcdd64a7476fa2cd93abfb6fdfe
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FE7BC541-B9A7-11EF-A51B-E61828AB23DD}.dat
Filesize5KB
MD5c5eb6b66977295c1a616cd4801b46b24
SHA17fa7083c58525197044e6816dfa8daab8ec45d42
SHA2568f03831e811b10870b805d1abbb54215a52296d27f4201d5a29085d1b5adc07e
SHA512bee165eb35600c58113273c29f1d37ccbdd1e3242fcd3723cfea4a9e597f6d1d4ce2dcbd76340b2b4102f55adaca5cf447e673c04fe4afda7d58e051657c0c27
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
113KB
MD5164724978a7243bdc20d1ac77eba6418
SHA13fa0cf927cee74db40bda63a8fb51c5ab31c2366
SHA256dab48b011cd01ed12b86d8881ad3cc85913875fea9b17008a33123b40a87da78
SHA51230b09df3d90075402995b92a16d7c5c42d4c0ed8dff95af494aec430011cf07e96941c33a4af42ecf5243f2f878d3351c6f496f0d40e64da1db5f9973b0e4f21
-
Filesize
2KB
MD570c0bfe7c834d097e805787ed2f123a4
SHA1fded0dc703add894b981c6ca64a56b8c67fa1544
SHA25691d313b0cd8e40919b541b43113283d6dde03a7c663917b883a45f09ef7925ca
SHA512b68beb9eed98888bb6aebe2f8fa1642849f5ffc0c7816614615d5ed4f85e6b7c6d73baf10d0bdbaa180aa21275bf5fb3fce490267fa90213e5e5e35b1f001e20
-
Filesize
1KB
MD571d9cfd7071a666eaf2696178bc99fb7
SHA1c7ce822f1c320d9da254b889b77ee5582324e7e7
SHA256eaf1b54e7fd8be768b46d18c7e4b7159d25081e08bafc3813e4cca149add74eb
SHA5128f217b5727ac8bc151caf562cfd02cdb276d0925d459df2a6428a581b7db72461431fbd263652edc1e817a183ac4d26557b01214dacb16e7ca79e98f817057a7
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
84KB
MD5f47a66f7cf15f17cc98d4cb4f0b34bc2
SHA1e6ae6734c0acf0beab835f168881c6cfa98ac515
SHA25606df7ee9794cc4db9950e0ea805add4870276a794a8756484a6ccd0a96783aa1
SHA51276afe23aae871ef77e8d03248dee2555d64e3eece66561b453f075d871cd7fa477f3715d1663f3de00c1258e53bf87cf5e955d267884874ae196605a80eea81d
-
Filesize
226KB
MD5ed28a3189aefa3589a8602d24d19f1cb
SHA14619f493d165ffc9893f19a32e197b7572497cd2
SHA25652e15e0deb115003af9f56c7f4e66076a4c859b4e8d782e5ad1d29a95b9164bc
SHA51206577460509c754a2850f69ac250132e73e2367995825632cf358cf7dd20f1774cb38a7c2a214209fe74a10ca8bac7fdf3bc84d0447fe77963a926333d3d73de