Analysis
-
max time kernel
569s -
max time network
566s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 22:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Joke/YouAreAnIdiot
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Joke/YouAreAnIdiot
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___VL28I_.txt
cerber
http://xpcx6erilkjced3j.onion/2EF5-F7D0-C289-0098-B467
http://xpcx6erilkjced3j.1n5mod.top/2EF5-F7D0-C289-0098-B467
http://xpcx6erilkjced3j.19kdeh.top/2EF5-F7D0-C289-0098-B467
http://xpcx6erilkjced3j.1mpsnr.top/2EF5-F7D0-C289-0098-B467
http://xpcx6erilkjced3j.18ey8e.top/2EF5-F7D0-C289-0098-B467
http://xpcx6erilkjced3j.17gcun.top/2EF5-F7D0-C289-0098-B467
Signatures
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral1/files/0x0004000000000733-364.dat mimikatz -
Blocklisted process makes network request 6 IoCs
flow pid Process 3527 400 rundll32.exe 3538 400 rundll32.exe 3550 400 rundll32.exe 3562 400 rundll32.exe 3573 400 rundll32.exe 3586 400 rundll32.exe -
Contacts a large (1112) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file 3 IoCs
flow pid Process 61 3248 msedge.exe 61 3248 msedge.exe 61 3248 msedge.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 612 netsh.exe 2892 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Cerber5.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ Cerber5.exe -
Executes dropped EXE 14 IoCs
pid Process 808 BadRabbit.exe 4688 F1E8.tmp 1708 BadRabbit.exe 2360 BadRabbit.exe 5096 Cerber5.exe 1832 Cerber5.exe 4156 Cerber5.exe 1456 Cerber5.exe 3132 Cerber5.exe 1964 Cerber5.exe 184 Cerber5.exe 1216 Cerber5.exe 512 Cerber5.exe 1612 $uckyLocker.exe -
Loads dropped DLL 3 IoCs
pid Process 400 rundll32.exe 4696 rundll32.exe 4840 rundll32.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: Cerber5.exe File opened (read-only) \??\m: Cerber5.exe File opened (read-only) \??\x: Cerber5.exe File opened (read-only) \??\o: Cerber5.exe File opened (read-only) \??\t: Cerber5.exe File opened (read-only) \??\u: Cerber5.exe File opened (read-only) \??\z: Cerber5.exe File opened (read-only) \??\a: Cerber5.exe File opened (read-only) \??\e: Cerber5.exe File opened (read-only) \??\a: Cerber5.exe File opened (read-only) \??\j: Cerber5.exe File opened (read-only) \??\p: Cerber5.exe File opened (read-only) \??\m: Cerber5.exe File opened (read-only) \??\m: Cerber5.exe File opened (read-only) \??\i: Cerber5.exe File opened (read-only) \??\k: Cerber5.exe File opened (read-only) \??\b: Cerber5.exe File opened (read-only) \??\i: Cerber5.exe File opened (read-only) \??\a: Cerber5.exe File opened (read-only) \??\q: Cerber5.exe File opened (read-only) \??\s: Cerber5.exe File opened (read-only) \??\y: Cerber5.exe File opened (read-only) \??\y: Cerber5.exe File opened (read-only) \??\u: Cerber5.exe File opened (read-only) \??\b: Cerber5.exe File opened (read-only) \??\j: Cerber5.exe File opened (read-only) \??\n: Cerber5.exe File opened (read-only) \??\o: Cerber5.exe File opened (read-only) \??\h: Cerber5.exe File opened (read-only) \??\k: Cerber5.exe File opened (read-only) \??\e: Cerber5.exe File opened (read-only) \??\x: Cerber5.exe File opened (read-only) \??\e: Cerber5.exe File opened (read-only) \??\z: Cerber5.exe File opened (read-only) \??\o: Cerber5.exe File opened (read-only) \??\r: Cerber5.exe File opened (read-only) \??\y: Cerber5.exe File opened (read-only) \??\h: Cerber5.exe File opened (read-only) \??\p: Cerber5.exe File opened (read-only) \??\v: Cerber5.exe File opened (read-only) \??\h: Cerber5.exe File opened (read-only) \??\m: Cerber5.exe File opened (read-only) \??\x: Cerber5.exe File opened (read-only) \??\y: Cerber5.exe File opened (read-only) \??\z: Cerber5.exe File opened (read-only) \??\s: Cerber5.exe File opened (read-only) \??\x: Cerber5.exe File opened (read-only) \??\h: Cerber5.exe File opened (read-only) \??\o: Cerber5.exe File opened (read-only) \??\j: Cerber5.exe File opened (read-only) \??\n: Cerber5.exe File opened (read-only) \??\r: Cerber5.exe File opened (read-only) \??\z: Cerber5.exe File opened (read-only) \??\m: Cerber5.exe File opened (read-only) \??\g: Cerber5.exe File opened (read-only) \??\k: Cerber5.exe File opened (read-only) \??\v: Cerber5.exe File opened (read-only) \??\b: Cerber5.exe File opened (read-only) \??\h: Cerber5.exe File opened (read-only) \??\p: Cerber5.exe File opened (read-only) \??\s: Cerber5.exe File opened (read-only) \??\v: Cerber5.exe File opened (read-only) \??\e: Cerber5.exe File opened (read-only) \??\b: Cerber5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 60 raw.githubusercontent.com 61 raw.githubusercontent.com -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird Cerber5.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp2C76.bmp" Cerber5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\Desktop\Wallpaper = "0" $uckyLocker.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\microsoft\word Cerber5.exe File opened for modification \??\c:\program files (x86)\office Cerber5.exe File opened for modification \??\c:\program files (x86)\thunderbird Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\excel Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\office Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook Cerber5.exe File opened for modification \??\c:\program files\ Cerber5.exe File opened for modification \??\c:\program files (x86)\ Cerber5.exe File opened for modification \??\c:\program files (x86)\excel Cerber5.exe File opened for modification \??\c:\program files (x86)\steam Cerber5.exe File opened for modification \??\c:\program files (x86)\outlook Cerber5.exe File opened for modification \??\c:\program files (x86)\the bat! Cerber5.exe File opened for modification \??\c:\program files (x86)\bitcoin Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft sql server Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\program files (x86)\onenote Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\program files (x86)\powerpoint Cerber5.exe File opened for modification \??\c:\program files (x86)\word Cerber5.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote Cerber5.exe File opened for modification C:\Windows\infpub.dat rundll32.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint Cerber5.exe File opened for modification C:\Windows\infpub.dat rundll32.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! Cerber5.exe File created C:\Windows\infpub.dat BadRabbit.exe File opened for modification \??\c:\windows\ Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! Cerber5.exe File created C:\Windows\dispci.exe rundll32.exe File opened for modification C:\Windows\F1E8.tmp rundll32.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office Cerber5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $uckyLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BadRabbit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BadRabbit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BadRabbit.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2124 cmd.exe 4676 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 1 IoCs
pid Process 4808 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings Cerber5.exe -
NTFS ADS 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 812987.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 845941.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 333280.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 848488.crdownload:SmartScreen msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1332 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4676 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 8 schtasks.exe 2316 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3248 msedge.exe 3248 msedge.exe 2276 msedge.exe 2276 msedge.exe 3832 identity_helper.exe 3832 identity_helper.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 1612 msedge.exe 1612 msedge.exe 400 rundll32.exe 400 rundll32.exe 400 rundll32.exe 400 rundll32.exe 4688 F1E8.tmp 4688 F1E8.tmp 4688 F1E8.tmp 4688 F1E8.tmp 4688 F1E8.tmp 4688 F1E8.tmp 4688 F1E8.tmp 4696 rundll32.exe 4696 rundll32.exe 4840 rundll32.exe 4840 rundll32.exe 3440 msedge.exe 3440 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeShutdownPrivilege 400 rundll32.exe Token: SeDebugPrivilege 400 rundll32.exe Token: SeTcbPrivilege 400 rundll32.exe Token: SeDebugPrivilege 4688 F1E8.tmp Token: SeShutdownPrivilege 4696 rundll32.exe Token: SeDebugPrivilege 4696 rundll32.exe Token: SeTcbPrivilege 4696 rundll32.exe Token: SeShutdownPrivilege 4840 rundll32.exe Token: SeDebugPrivilege 4840 rundll32.exe Token: SeTcbPrivilege 4840 rundll32.exe Token: SeShutdownPrivilege 5096 Cerber5.exe Token: SeCreatePagefilePrivilege 5096 Cerber5.exe Token: SeDebugPrivilege 4808 taskkill.exe -
Suspicious use of FindShellTrayWindow 62 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2268 2276 msedge.exe 83 PID 2276 wrote to memory of 2268 2276 msedge.exe 83 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 1696 2276 msedge.exe 84 PID 2276 wrote to memory of 3248 2276 msedge.exe 85 PID 2276 wrote to memory of 3248 2276 msedge.exe 85 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86 PID 2276 wrote to memory of 4464 2276 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Joke/YouAreAnIdiot1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb993b46f8,0x7ffb993b4708,0x7ffb993b47182⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2452 /prefetch:32⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2280 /prefetch:82⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6216 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3376 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Users\Admin\Downloads\BadRabbit.exe"C:\Users\Admin\Downloads\BadRabbit.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:808 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 153⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:400 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Delete /F /TN rhaegal4⤵
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /F /TN rhaegal5⤵
- System Location Discovery: System Language Discovery
PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2293647852 && exit"4⤵
- System Location Discovery: System Language Discovery
PID:228 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2293647852 && exit"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:8
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 22:58:004⤵
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 22:58:005⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2316
-
-
-
C:\Windows\F1E8.tmp"C:\Windows\F1E8.tmp" \\.\pipe\{AA25E6AE-FA02-405B-9F10-F672D9A5F4F3}4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5960 /prefetch:82⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3232 /prefetch:82⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3440
-
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5096 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:612
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2892
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___HWG9_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:4372
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___S8NL1W8_.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:1332
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "C" > NUL & ping -n 1 127.0.0.1 > NUL & del "C" > NUL && exit3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2124 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "C"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4676
-
-
-
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1832
-
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:4156
-
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1456
-
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3132
-
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2064,290140479335751882,4560484285912316106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204
-
-
C:\Users\Admin\Downloads\$uckyLocker.exe"C:\Users\Admin\Downloads\$uckyLocker.exe"2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2832
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2952
-
C:\Users\Admin\Downloads\BadRabbit.exe"C:\Users\Admin\Downloads\BadRabbit.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Users\Admin\Downloads\BadRabbit.exe"C:\Users\Admin\Downloads\BadRabbit.exe"1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"1⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:184
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"1⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1216
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"1⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:512
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\3d1a622c0dc941df8a4e86672ba6bc61 /t 3832 /p 43721⤵PID:3804
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1401C7EC8E96BC79CBFD92F9DF762D_5398732881722BDE3E78D6CA6BB2B78B
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
313KB
MD5fe1bc60a95b2c2d77cd5d232296a7fa4
SHA1c07dfdea8da2da5bad036e7c2f5d37582e1cf684
SHA256b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d
SHA512266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD518b9fc957d89248ffbf870cf16d236f5
SHA158aefc3c344e6c7e300c3f7b3ae14095694813fe
SHA256ff3fa608ed1c109d20b6de6a9a910ce569b2ebe77e98566224a0bd8ab7c4cfdb
SHA5128cf2df0be474b9b2d43fcf30d779c1d09d383c148661affbeb42b7eb2a433aae38cb0c3c17922541f0b9ffa3354110c517fc68445e1311eb3383bf44bb56a71d
-
Filesize
579B
MD5ca3dac1178d10a645e836551a65b0332
SHA17fb32ae3ca77810f51265946218125ec1d7e49c6
SHA2560fa377dfa78c020268face14a750666536e8ba935ac2275ca4c78bacb4d98c16
SHA512bb5e66de5fe780b39a2521fd628e30fc9a227476bf15c80279cd03240f825e27fce96cd4c9b1ad9f5d72be49b867f9b2b319c45f4822cf01679aedf5c136efbe
-
Filesize
5KB
MD5783bcb59a9461d44784b05d44d31d1a0
SHA12044316dd03aaeee5648c9d1afcfc81714608a66
SHA25644722a8a03f37983060a9706117a3c6c201153981672b324dc7c24a090c650cc
SHA5126faf93b7fed3092ae85bee59d70080490fb041ee8e09499e1e98d0711b8a81830c2ddcda7275c56a11ee973b7cae5de3ec8ad8f711d46e287d014b006a86f4a9
-
Filesize
6KB
MD5bd38891c9b78212b002f00e11a574ec5
SHA1f23c7dd44f9d784612005d8a07004b79d40554dd
SHA2568fde5c0fefeacfbb00b621b2825eae89c4d9bc6a9f201cd301439f047c83e4d0
SHA5123a9f5f30527385a0d9e9cc3611e19a58854098a7304dd27d78768ce5b8c7df4d3f58f12aa6d5bb57eaf17a61e218037f89e30c710cf1e5c1d1610afe78681199
-
Filesize
6KB
MD5e83640c19a3764db4aa91032ca6d80be
SHA110f802df4dce20258b19627f1a1034b8fc7afb65
SHA2562af89d9c119a4c1fe98fb5a640fdd062842fdc6836c4b24257febdeac53275ae
SHA51274c46f0780f923c45b70e92112eb3fe84b155698d5d51e6b1f17321853fd4addbeeb873cc50f693b1059c8bd3d22cfd3fb22bd6e17e8c71e898c2b4236e8dea1
-
Filesize
6KB
MD57e54c57b19225dc8e937ece7939356a8
SHA13192ce6efc6fbc8e523aab6189330a5e7dc69be8
SHA256cd47690f8b25dbcedbc90ddad7bb9f24e76da03ffb2e93a0459a7d2adeeb2810
SHA512bdddcfc76a67bf21f2de463c226f335d0a6d63948d77f4470c4bb91424e10014ffcc6e85fb6af557962a67c6a0e3241c07a3019c19812419003e95b5583e144c
-
Filesize
1KB
MD5300d71a3f55e74628f73c0637f4b8c59
SHA1a5181237c6723672ec3785c76af128acf7552b67
SHA2561ae4024188d8ee3eccc17e46e0c3bc4988cc7536c121627ccbf7bed5c072f5f5
SHA512c820c7315edb4cfc2bc64f14b3fb60e2b65f5f786f4dc854ce5b9a3de29872f60b1b760ff30a39296a7110acf6aff0b580e0354f718c4e1154fa2baf4ba34452
-
Filesize
1KB
MD5e88f0f40a8f6c052a81088b11d3e4322
SHA146faba32536e6491a6a13cbe5741e855e9abd108
SHA25699527c0f4052753567a40117b99bfab400412a34ffcfc8f4cefeb6a5638c8663
SHA5129de512c96c060c9fe723ae73b4344ee8c087dfbb089b2d1fdc680677fbb6c90f90363ec01059e9bad0d7b512c78ab3477cbf1bd8cea4f922becce89383835b32
-
Filesize
1KB
MD5ed8e83412ca35a951af9ace68a1abefc
SHA1f4d229b3b2f39b64559cd1d22372ca9085be139b
SHA25624abd48a1522a71ca41e7081b51c4822d6c036842f5c3734c26805dd2f0e42ed
SHA51293614232853ed34c9669cdfb807ba7a989ec0aa4b7c782ba8ea2e65cc36f18ce847661c484c9ef8908969017eaab4ff1f83362f512165ac6c72bc3a2e3b2760b
-
Filesize
1KB
MD54f51d4152327f845eb750f0cac7b1dd6
SHA18ac97f4f471302d533042b947051ae2b6c1adcbb
SHA256c712c6fd71718867cecf60207e3a68f70f6c525529fac303ca177ab499bd7668
SHA512127a9cd882b284451a4fa0fb0eb3b6873b83ad985b6e6a1b0465cdfb45922c471975da20917f262be0ef1003565a1c3825782c6a4fa3c37c56d6a3734df2afa9
-
Filesize
1KB
MD52097482e08f1109e5f9976c9599bfe01
SHA15e3f1fc4ea666ac2bf618d115bab468824cc4b4a
SHA2563d8b05638c5b9419a778c3c28e5c1c1b38e17aa95a123a6b4eeaaaaaf30a8df0
SHA51270e64742aefb2088ff1d40df87115e0857ca8d9d2a624e3f7abc1ec9ecee39bece4bfb49e6ff4beb06995cef6bebe4e9efe9ca0ae7be9cb1bad8b374a70cd01e
-
Filesize
1KB
MD57c4d1d7f16f43b2bf44e5e83a0aba734
SHA1b36e76a8a695a73041a8b9888924fa9fb1f1810e
SHA256dbc5ee7e824d37fad7d3e31e23ef2950e016d97b24f97d3bc97b3d961716791c
SHA51236112c5db7f61e72e664c3682c33d15777c668e744c8061db0cf5f8b1605d2ee47fc5ec0476692a92c1269592e0c0ca3f5921ed6e551415cd2405411bac50e2d
-
Filesize
874B
MD50efc56bc388d480aca878d13dc34dd18
SHA1b9dad0e36d4c9383afe3c85bcde52b3242cfade9
SHA25629927fbf9fac57df9b79de42b248bc39da912573171c908217e94eb4ef49fa57
SHA512c4b94d6c2cd9cfa183fed57b12db8e0ca5cd80d5f3915eb7d5c1aafaabc187256f0b43589f27cabf57813e39f21976faf2c33252468b2a10910ae4cfd8754d95
-
Filesize
874B
MD5e6080e51ce4b1ef9e0a5688ad2029e85
SHA1a2cc3c4d69c37e714352581752e53fa7177227b1
SHA25605a342029d968c26a23344066fe5e844433a7befd884b04a2d6fa8d4573e9678
SHA51203eeacb7a80bc16d3dce593a6123b636cd24bbff62107eee6239f9350830f49a36c68564e8f2eb374900d37d052144ee76d77caa38e501ce1399d39624fe8a11
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50346ca638288a30af689bcd0636e2eec
SHA121435b4299737cc025732f7fa5c14745a2772a20
SHA256fa80f99b88757c55d1fbfba08042183059f15ec9cd57b605315b74d421439c61
SHA51235760757846686fd08e5c36016f7c33d675f39a6827d2fdb4703ddf972e9c906b709b411805dd18587b8e69339315adf479a127171ce0818c3d067b515a9ea05
-
Filesize
11KB
MD53d180b37375aaea611187ecc6078a388
SHA194e05f6cb9e938f23f2a5a878a7eb102aff209ba
SHA256153343287d085aa9c5706285c4d69626ff320ef39c852eb5b6ea3e0aae286d41
SHA5126d5b2e5546ec99d40fc06d7ab1fedf3b0859b008a8d9f7df98c2c71b80ee6e857fd7df292703e43c5b22a8f267324a84f20270e55998dc989491e05ed6610887
-
Filesize
11KB
MD53fc545c45134f82727250628fa367133
SHA19ace4ba3ba70d2e45b7656001ce55c10cce17b5a
SHA2566b982f64aee9e5122a4b700d56b06856c6ecda39be7df5f167de0f73761f9a10
SHA51203cc9b9064853851e46736e58bbeec5cbdbb83f01d2037fcab0845b73d0235d636ad39450efba60b41727060c4063b09f218317686e012238cca6bc8ee13a4e9
-
Filesize
10KB
MD55dd3016e78da28b1cd9f814d58719279
SHA1b931715963058c92a97f878b87ddf7394601ba3a
SHA2567bd780c78338fa1eb854a271124e68866ee896558be7bbfc398e92c6b45b2b5c
SHA512f6ae597afff703462452a773ef77837ebd3e87987ada8ffa88ee7cfa0eebbd423f33982ad88e0616c1edc3b9b08debbac75cf556c095c689380bc3ada2d602f1
-
Filesize
75KB
MD538676598ecbfe5a75441e7893dc5d636
SHA1d24ecbe392f322f102af532a0ab72bfb609f3a0e
SHA25682ec9b3f02968f7262d6690e94286f095ad0127492a9eb96e3c9c8f0aebfa5fc
SHA51200ed438d674149ae1cb7df5b22f574965826e9585bfd4918e95fa5caf89f39838d6b081987561e02a43f93533f6ceaacc3a219a06b499fac6f3b6ce02c2833ca
-
Filesize
1KB
MD5eb1e8349d5aa0c8afddf6f8bbb50a5ba
SHA17d92406734e20fc5bbb6b08e7b74d23750b02479
SHA25682afa41ada7a2164a3f53a2be8fa94a9cf1787c1ecb2c540ad5891f86c83bc3e
SHA512a99b4c5987edda05a93bed87be52a1e2b7c9221474ad9005c76c79e12d3f4b7524ae47e3762645c4beea2bfa002fb1cf6fec150b3126c8f88d25275b658aa2ce
-
Filesize
431KB
MD5fbbdc39af1139aebba4da004475e8839
SHA1de5c8d858e6e41da715dca1c019df0bfb92d32c0
SHA256630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da
SHA51274eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87
-
Filesize
414KB
MD5c850f942ccf6e45230169cc4bd9eb5c8
SHA151c647e2b150e781bd1910cac4061a2cee1daf89
SHA25686e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f
SHA5122b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9
-
Filesize
60KB
MD5347ac3b6b791054de3e5720a7144a977
SHA1413eba3973a15c1a6429d9f170f3e8287f98c21c
SHA256301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c
SHA5129a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787
-
Filesize
401KB
MD51d724f95c61f1055f0d02c2154bbccd3
SHA179116fe99f2b421c52ef64097f0f39b815b20907
SHA256579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648
SHA512f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113