Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
f65e53031dd147cba479d30d495467df_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f65e53031dd147cba479d30d495467df_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f65e53031dd147cba479d30d495467df_JaffaCakes118.exe
-
Size
29KB
-
MD5
f65e53031dd147cba479d30d495467df
-
SHA1
0dddd9947c23a832326af732827ac06561ffae36
-
SHA256
bc3be7d0c255b8ea25426a4e357539fb716fc882a3b1e17001e9364d3d22ad59
-
SHA512
ad95df5bd59ad28b48bc380db48963b06c5b7ddaab57f5cebfc29768c6c04e7b3bc19474ea2be878b700e04e58ba34c66ed40cbd37a834df5aeee9b8591a7441
-
SSDEEP
768:nUKHqS2l31I8KcR8aKyqkKuhDFr6PG2BbC:zH/2lFI8D8brqDt6+YbC
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys 0.pif -
Sets file execution options in registry 2 TTPs 60 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvMonitor.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapsvc.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIARP.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAS.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Runiep.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GFUpd.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASARP.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvMonitor.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonxp.kxp f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mmsk.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mmsk.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVWSC.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQDOCTOR.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Wuauclt.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regedit.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GuardField.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GuardField.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GFUpd.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Wuauclt.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutoRunKiller.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonxp.kxp\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regedit.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIARP.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPC32.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ast.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ast.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAS.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Runiep.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Frameworkservice.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASARP.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVWSC.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nod32kui.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WOPTILITIES.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WOPTILITIES.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPC32.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nod32kui.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Frameworkservice.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapsvc.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutoRunKiller.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQDOCTOR.EXE\Debugger = "C:\\Windows\\system32\\1EXPL0RE.EXE" f65e53031dd147cba479d30d495467df_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2968 0.pif -
Loads dropped DLL 2 IoCs
pid Process 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\Q: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\R: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\S: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\T: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\H: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\K: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\L: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\V: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\X: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\Z: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\E: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\W: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\Y: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\G: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\J: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\U: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\O: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\I: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\M: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened (read-only) \??\N: f65e53031dd147cba479d30d495467df_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AUTORUN.INF f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File created C:\AUTORUN.INF f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened for modification F:\AUTORUN.INF f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File created F:\AUTORUN.INF f65e53031dd147cba479d30d495467df_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\0.pif f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File created C:\Windows\SysWOW64\MFCDD.DLL f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MFCDD.DLL f65e53031dd147cba479d30d495467df_JaffaCakes118.exe File created C:\Windows\SysWOW64\1EXPL0RE.EXE f65e53031dd147cba479d30d495467df_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{441E9581-909A-11D8-A009-729E5AF85804} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34D9F421-909A-11D8-A009-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000074f290bc776cd04b9ef469c75e9c67fd00000000020000000000106600000001000020000000e4ca970a3381d88799f65167d34974fa106eaf0f6c44ea0189ad29bfcbdf4835000000000e8000000002000020000000d065f8e7db34dc5899e574ca76b36623bcc14a76714dfa8a06b92ae6691d77dd20000000f96b93bb48d7000ed9b14a8ba6aec9c169d67f4f1f83713481e33b2ae5a9da6240000000329268c1e8fa5830bf5d61bee25dd506cd94c2cc98c585d2592dea324bd573fc124b343402ef9b7844f945332228f2b734118b0038a0b95d6d56981bf1da3d78 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "1921825414" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2042f732a724c401 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "1921825441" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe Token: SeSystemtimePrivilege 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2812 iexplore.exe 628 IEXPLORE.EXE 628 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 2812 iexplore.exe 2812 iexplore.exe 1040 IEXPLORE.EXE 1040 IEXPLORE.EXE 1040 IEXPLORE.EXE 1040 IEXPLORE.EXE 628 IEXPLORE.EXE 628 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 628 IEXPLORE.EXE 628 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2356 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 28 PID 1712 wrote to memory of 2356 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 28 PID 1712 wrote to memory of 2356 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 28 PID 1712 wrote to memory of 2356 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 28 PID 2356 wrote to memory of 2692 2356 cmd.exe 30 PID 2356 wrote to memory of 2692 2356 cmd.exe 30 PID 2356 wrote to memory of 2692 2356 cmd.exe 30 PID 2356 wrote to memory of 2692 2356 cmd.exe 30 PID 1712 wrote to memory of 2160 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 31 PID 1712 wrote to memory of 2160 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 31 PID 1712 wrote to memory of 2160 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 31 PID 1712 wrote to memory of 2160 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2068 2692 net.exe 33 PID 2692 wrote to memory of 2068 2692 net.exe 33 PID 2692 wrote to memory of 2068 2692 net.exe 33 PID 2692 wrote to memory of 2068 2692 net.exe 33 PID 2160 wrote to memory of 2192 2160 cmd.exe 34 PID 2160 wrote to memory of 2192 2160 cmd.exe 34 PID 2160 wrote to memory of 2192 2160 cmd.exe 34 PID 2160 wrote to memory of 2192 2160 cmd.exe 34 PID 2192 wrote to memory of 2636 2192 net.exe 35 PID 2192 wrote to memory of 2636 2192 net.exe 35 PID 2192 wrote to memory of 2636 2192 net.exe 35 PID 2192 wrote to memory of 2636 2192 net.exe 35 PID 1712 wrote to memory of 2640 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 36 PID 1712 wrote to memory of 2640 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 36 PID 1712 wrote to memory of 2640 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 36 PID 1712 wrote to memory of 2640 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 36 PID 2640 wrote to memory of 2616 2640 cmd.exe 38 PID 2640 wrote to memory of 2616 2640 cmd.exe 38 PID 2640 wrote to memory of 2616 2640 cmd.exe 38 PID 2640 wrote to memory of 2616 2640 cmd.exe 38 PID 2616 wrote to memory of 2576 2616 net.exe 39 PID 2616 wrote to memory of 2576 2616 net.exe 39 PID 2616 wrote to memory of 2576 2616 net.exe 39 PID 2616 wrote to memory of 2576 2616 net.exe 39 PID 1712 wrote to memory of 2544 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 40 PID 1712 wrote to memory of 2544 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 40 PID 1712 wrote to memory of 2544 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 40 PID 1712 wrote to memory of 2544 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 40 PID 2544 wrote to memory of 2648 2544 cmd.exe 42 PID 2544 wrote to memory of 2648 2544 cmd.exe 42 PID 2544 wrote to memory of 2648 2544 cmd.exe 42 PID 2544 wrote to memory of 2648 2544 cmd.exe 42 PID 2648 wrote to memory of 2424 2648 net.exe 43 PID 2648 wrote to memory of 2424 2648 net.exe 43 PID 2648 wrote to memory of 2424 2648 net.exe 43 PID 2648 wrote to memory of 2424 2648 net.exe 43 PID 1712 wrote to memory of 2276 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 44 PID 1712 wrote to memory of 2276 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 44 PID 1712 wrote to memory of 2276 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 44 PID 1712 wrote to memory of 2276 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 44 PID 2276 wrote to memory of 2280 2276 cmd.exe 46 PID 2276 wrote to memory of 2280 2276 cmd.exe 46 PID 2276 wrote to memory of 2280 2276 cmd.exe 46 PID 2276 wrote to memory of 2280 2276 cmd.exe 46 PID 2280 wrote to memory of 2452 2280 net.exe 47 PID 2280 wrote to memory of 2452 2280 net.exe 47 PID 2280 wrote to memory of 2452 2280 net.exe 47 PID 2280 wrote to memory of 2452 2280 net.exe 47 PID 1712 wrote to memory of 2816 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 48 PID 1712 wrote to memory of 2816 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 48 PID 1712 wrote to memory of 2816 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 48 PID 1712 wrote to memory of 2816 1712 f65e53031dd147cba479d30d495467df_JaffaCakes118.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\f65e53031dd147cba479d30d495467df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f65e53031dd147cba479d30d495467df_JaffaCakes118.exe"1⤵
- Sets file execution options in registry
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.execmd /c net stop McShield2⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\net.exenet stop McShield3⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McShield4⤵PID:2068
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop KWhatchsvc2⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\net.exenet stop KWhatchsvc3⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KWhatchsvc4⤵PID:2636
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop KPfwSvc2⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\net.exenet stop KPfwSvc3⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KPfwSvc4⤵PID:2576
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "Symantec AntiVirus Drivers Services"2⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\net.exenet stop "Symantec AntiVirus Drivers Services"3⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec AntiVirus Drivers Services"4⤵PID:2424
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "Symantec AntiVirus Definition Watcher"2⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\net.exenet stop "Symantec AntiVirus Definition Watcher"3⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec AntiVirus Definition Watcher"4⤵PID:2452
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "McAfee Framework ·þÎñ"2⤵PID:2816
-
C:\Windows\SysWOW64\net.exenet stop "McAfee Framework ·þÎñ"3⤵PID:2440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfee Framework ·þÎñ"4⤵PID:2556
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "Norton AntiVirus Server"2⤵PID:2988
-
C:\Windows\SysWOW64\net.exenet stop "Norton AntiVirus Server"3⤵PID:2532
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Norton AntiVirus Server"4⤵PID:2416
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop DefWatch2⤵PID:2412
-
C:\Windows\SysWOW64\net.exenet stop DefWatch3⤵PID:2468
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop DefWatch4⤵PID:2496
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "Symantec AntiVirus Client"2⤵PID:1976
-
C:\Windows\SysWOW64\net.exenet stop "Symantec AntiVirus Client"3⤵PID:2476
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec AntiVirus Client"4⤵PID:2180
-
-
-
-
C:\Windows\SysWOW64\0.pifC:\Windows\system32\0.pif2⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:2968 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2812 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1040
-
-
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\packet.dll /e /p everyone:f2⤵PID:2508
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\pthreadVC.dll /e /p everyone:f2⤵PID:1144
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\wpcap.dll /e /p everyone:f2⤵PID:1316
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\drivers\npf.sys /e /p everyone:f2⤵PID:808
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\npptools.dll /e /p everyone:f2⤵PID:2300
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\wanpacket.dll /e /p everyone:f2⤵PID:288
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\drivers\acpidisk.sys /e /p everyone:f2⤵PID:2292
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Documents and Settings\All Users\¡¸¿ªÊ¼¡¹²Ëµ¥\³ÌÐò\Æô¶¯ /e /p everyone:f2⤵PID:1824
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.baiduoo.com/tj.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:628 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:628 CREDAT:275474 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54d366108f1b0fc64a03c140532df6541
SHA18c62471ca3991f68996b1591c244deb4faac92fc
SHA25698b730cb458e274e8c80eca4b9dbed19a3cbf350c4db2ce05e52f28c88135921
SHA5129b9f6de9bfac2a837445da90bb5c25f9ce9e119cb975e22cf2669c751b573966e87ec9e6d07233a86574f7f7e21fa5f1650bfa62d9710d88450d1e0cdc5e3c5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD591a1ad3a635f13f9a5c96ca3222e32d8
SHA121bbe6748ec1218a84dd386ae56f036a89c6849e
SHA2563ac057faa5a01c7d1bfc975f2b490bd979f8a71f0a0f71e6d9d37da7e065c0a7
SHA51262c7743b50679fec0a63a3ad32920504bec5d1edb81758f52050334816338b9edf339d36ae8ac8fe9d673940de0040fc7767a35d1ef02c9ced5ee806bbce3de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b1b5a7d041d00ca022ab5cadfca449fe
SHA174158f7c7c9b10d3adb736beabe71d496a18016e
SHA2560706fbf858e086486866dddd1fbfd4be1d8fd2c46b77ea286baac47c5f1d410a
SHA512c7c56076a4bff98524d8602a5edc1c0a08571a93e08029f91f2878f9e534d0fc5bf8bacb2178d61355a44386f34bd7098a65f534b2c365cb99a59c6ecd63910a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a12ef52d74ed0e96b04b70c0bd4d44f8
SHA1d42bb870a359f6f6fee82bfb10c2ba3e940c4199
SHA256bf9b8c1d611bf87640c911091d3ed25c53f09bb25e749ce3dec85dd68b5a88d0
SHA51274bba1b80d3281404b462d97a293a8e9d1bceae4e07fe76afbc0ab2affea8fdf47cf9ff343f0f3c29740845b35ef82a6083a1d5556662688012a2bf05aacbd43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5606f2dcb5d5d5afc72792c26a2bf87ac
SHA18d6a1bea688f9ab14888a29d7fb0f2a31ae56cf0
SHA256bcdc70500460e192e9717a214e6b2fdc16a2861c790957b86bed659b085af8cc
SHA512c46aed28acb4970e363f662673b7d37558ad4a890da79f523d48f5d26d379e46d81a5bbc849f14d79da3b11f2e6b7b58b39dafa23f00f978270e5c766f0d8905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52a9a9a8399176e3ed4ea4ddffe9bb86f
SHA1a31e6ad2cb7d1d91dedd25e8af6838c9e062f4e0
SHA256f267ea850113fc653b18296b31d99e4f7a60c36a02917c32e514c605495d734e
SHA5122ed697320d69bb5990bf122bcc2374b22216eb77ce39debba5c49d2fb990efb0426d5485b534f195768d92d8c6300cd9df85cf5625654481971e7342a0c3bcce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50252b33a73689e49e6388e7dd6b32bd8
SHA196f418bfa9eb371fbaba8f351afe9000ff74eb9c
SHA256a61f62b116eb5c53ce3cde9747ce8e092ecbdbee27b85c8bea4620ae0ecc83aa
SHA5126bbc5564503c5f492a1b7ccf1ae3e5cdf5985ea1bbefbe7ca27bdecf9dfa0f04641d7ee64da8901a6f2cac3a5ae173a4b2c1a29a62d12a87a1abde90af9df89b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fd2be53d70814cb0d6a97c080d012e07
SHA1e9e4c07cac4c6c7a71ff0cfb59b590e35b8eff93
SHA256dcf740f61642b9865cf070838cf8bfc5ef8138911f2c1083b74daed5dcc90150
SHA512aed75ad0566144f454db49f48ff61e4c282fd29e3750ebc06e6fc2fca07a953476ab048553caa307132270108bc07f154bbb9f52ac5cf6e36c7ee6971bbd0d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58781de328344d0a30b5fcfea8c9422b6
SHA186eeaa0d26e5f1de5d2ae721bc3c4b7001f7932c
SHA256321095507d742734d8eaea2d9e70205b0c25d0de4dfed05a3862e33485460272
SHA512eae2b3f0805e1f63aefe867b12974c150b37bdeaf6c3c50b735ac219d9976d4b806083d46f7ed7cbc346325c508593b0335eecd41fb11121c25c0a4ef07973d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD586792f5b676abd15c2cff4276e0e4eb4
SHA1944b4f239ef6b5eff5abf072e714cae4d5781353
SHA25647451c1a3c6367deec9254af2996a1d9102b1d1bcbf9d7ddf67145ebaec6b25d
SHA512a6442194fe602fadfb45c594ced4be1b72c7c4d862e043bd7ca50a57731ff3bb868826ae9410842ad857eae5530b2c5d4e5c0bb50c26580f08311a7d62801524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d2b882f729f01813e86c5cedafac6ded
SHA1f8a70d6b8a5770eba73869704e0b32ec6fe2caa0
SHA2568f6e6eb165bff85a90afdc8f11b49bcc00cf854d924c95544772e2af6031d8d4
SHA512189cbc67392494628589e389f256d81418d0203b82f980c6a05b33ab5bc316300c8f6ba264777ba17c4e0cf2c30718256b1cb82087fa254ed184329f0f2070ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5423140ce04cff913b98acb517cc14226
SHA19b6c9f6458ae7f3604f2ee9fc23292251bcbcea2
SHA2568c82727cb3f44059ae461d12fc0d3c0c25ca2edec9762685c3073c8b9eba326d
SHA512243156b9bf59ab15eff895f72928d46b45c89d7e9c131bbd40ec8d585f70d32f8d912ddf788f3755da52873c014ff34f69ea905dc438026aea7e5ee7de5a5ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD525cf9341f514d44168fe587cd5511dea
SHA1c227d004a81a10d867b41cf9d59d45e56559e608
SHA256aa88030b9682780d398ddc824eddb88eae0e2a8a6eb172d025ca4da76703dd87
SHA5129b89775f54fcdf8b7f5dfbb7c7baec082792407eb07c764d9a0e6f8074a01fae059af6abe2fe9093a60817b52d084f617272662b8ca69f87b114286ad6bc46b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD522f89e5fbc3aa4936293f02fde41a6ff
SHA1aabeb809d16639cbc3a2b9296ff0452a04aa9fb3
SHA25635dec46fb9d0b5d881347db31c793006894fa162a813afaefce75f4631f8b92d
SHA512a1578a1604830bcfe392657bfb39c9b6df01903fce749c89a209497caa1bd886c0374f9f661d5f80ad9d5415d1e0795891c796d6f4b09422159228fdb9eac360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD581e899391e0cce0f317af716ffe68a19
SHA15b3fae340b899a47e5b95c9f96e7126318d029c4
SHA2568c6ca29b9cc58c0d86e2214cb2f85142e3d2df849d6227aca2d54a9194d8c258
SHA512f7a96357656dab00f8d918f006622b278c880f58e655637a3bf4ef15ebd121775517914d565656ac4a2fdcf5415118fe448fba06fbe84a6aef57c03e9ce1ed0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e0e8fc0f98ae25a0539addb692cf91bd
SHA14c5f2b0f67f696306080460ba526ba887c7626af
SHA256fab6f2088824aac650d8528606ccfcde5da9576331a36ee8a5305915fc663897
SHA5129ff531eebbeda8ba441470dbd24f53bcedcda2d39b133c96e678d83713a135dd41a987574d754a0a8dbb47d67d6fe009415621a287573fc68a8e8330dd8c62e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54a64bf19fa65f0d6d95c97a4c9bd1698
SHA16bc01c928b2a91f4839d0120638d7b26e487d5c0
SHA256841238c3f308fd0e7e6ecc245458873549beba6d4c04a19719ccec124138c2f1
SHA5125c10c217709bb6f11b5c776d15e2a8b1bd40af41a5fd54bae974dce2e7ca97a905c9b7cb2b16efb9f11db02ed0cb4bc5abd54f6156a1fd11f45deff2d0dd3ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56259c0f8c269fe2fd3da8706ec890b85
SHA10a657997b6ae2335087576930a3da22405d3344a
SHA256bd730cc0169a286687c1f5599f5e40dc9467a917358d30b82eb1be74b2509297
SHA5122420b385713cd090dcbdb775e184114d9c3e2e411b7573402f08c3f90c7217d77337f7c835ab1a306ffb45ffb38dda25b440295fb23af8a1f5115c6b1af4ac35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58b3bf17e3b9b508387d633db17fa151c
SHA1b044d06fed4a83c369b71eef8045537e4586472f
SHA256e0d046ac55ac5518aa49696f3ffb3a7881b3afc3ee60a290952d2afc33d2cfb5
SHA51260b312c3811f2a5f44b61c095a31f783e786e003b403fa58456ce07ab09f9fe2ae77ceb3c20c2419fc60431b86f24cfbf307e73106edc14733f44527dbff8e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c63ef4d145f95ac2c7f117bfbc04e199
SHA11d29e76eb5cd2d70ee20c348e772c3503ebf76a6
SHA256efecf8da05faf1e20997fd0cf2011b65e7f1ee0344f0635ebaa330fbbd2f03ba
SHA512fb455a284f295018744190120e3251a914559cabb02996f10c69abaa9ff0a0091caa607f1ddd25365c7b3f7377a6577ca10f65b418d26aa1b1a09b4e2a5a20b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD530b58289023ecf0bc31ed47b31efcd73
SHA1a3f53904dea1f06e1f2a0b353687479ca171fc1e
SHA256fc429089d6f3925f2ff22fa969083a200ac342524bca4c06e64eafd502b908d3
SHA512ae9143a19154dc22dcabb775a4ee211de370b2d41b07178984b313697ab73e9ab4e9d8a08ebe192c1456fbc1201ffdb56eb380b522612ae7fedf4d116f1f5a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD597218d2c3801170e1e7a7cfbdd0b2253
SHA19035032e380e61c59aa62144b835f8f9cec30fc4
SHA2565a381954232b3eeeab6d2254c8b39f54485696e7b21f3178c59971e585ccfd18
SHA5128aacdf18f8ea1fb87b88f8e153d005bbfbd3d96b6112f7d18d4d9a078b1d0c81af40c638cef83e91b0f9b77793ef984eaad2b113f04fb3f5d2d03e4085cd5b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD543f126af335e56893bf4e8ddc0cdd878
SHA109eefb31f626eff37f4548e077eb69f72759aa63
SHA25642337576b082b664bb91dd0e3dd103736d53bc6632d878373f084bc2c25fb315
SHA5123acb19a9140f4ae6dadfc4c9d14b49b1bfe1692a12bf5d57a0161e637a7c5b81a80b46fe6ed893ccdfe75baad57d7c486bf709d3460e7a1c506974b13800edb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD548cb72d6bdd8b6a3e91027de5d549281
SHA1e6df9175aebe6670fbcacc3c1bf4604fc8d051a2
SHA2566f39a6b969949f7efebc960caed5567627a5acdc66e80bfa3af6cea479a31388
SHA512b42c02ab7527cdaa11d4542f43956a9bc390e8fc9281a278bce27c1c0acba7d4b59813690e0336b11fce9ee23141aecc0cc88c02110e99217e0e0acf46461285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a6161b718f039c3f982445dcd0f99e1f
SHA1c9bac79ad04e9fd30cb5a77db0d402ac4b98e2a4
SHA256ae385cc5aba83c5209ff0fbc10f8fb0abb0fd9654aa1128cd397c32a48a37425
SHA5128ace22377485b93ad7e9f5f7b65de52eb123eed4201e9a64fe40205a0d0de48bb237550745ce9ade19eb36da8d10ab7cf3f5e7b44c21697d60cbcef5f74cdd54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53c1e9641c2cb49257759588f3e6a3e86
SHA1bf8589c4059884dfc41d4813978a21a44667e1fb
SHA25636b4b1bf7103c33ded4b6f05714b49f669064f56f9f236446a56a5144dd77d2a
SHA5127474cd7db9f3247271d8ec8c5ff9a087fdafa6373f33705eccd3d2515c691a008f5f4899196ac1211f8f0d7430cdd4478703a54d23afe6768403d66cd4ac9b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce7a38c73199a910ad8fa27d725982e9
SHA18f186609597797c685cbcf60c48443023b106970
SHA2562945087bad24b2f9f4c7737378835b14d622fb2c7089aa91555470cec1da217d
SHA5128dacb1a652ac34b77d605524a7b78c0441ab3a25141c298972d054043a0d6f13bb69b2a56d87359e7dc0f7e9d0a81b08569ed9554bf0fcd347af916bf4fd9157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f945e64a497b5f53a23644abce4aa7ff
SHA18a1b80c1c781979cf52ea695f242c9fead4c0b6f
SHA256141c61de96b8d5c6680ee2829013db997dce1e24b56abbea00caf757b3978902
SHA512f2ba3ad543aa5f88992f9254ae35c561e9b0a411c5f710b433d05f4f86b8f9a2bfe36377408ca3185a6f0586658019ea7209664bf0291179861b6af415c0529b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD595c16b4e1caa327162a4efa7917db6ee
SHA124c9bdd29cb817ac1d5e533799ece5a9ca66f2cb
SHA256c48a75bbd2fced2075c25c554da7b024f0675e58adf5b6a012f4f449d1cd1510
SHA512c552fd209eda4b06df3edef9b9f37327cce6a462ea0be330314796a0d71914adb41b02408f9ed0b2837cf4ffe91fe140141313c40040f7d98ef9aaf7b846dc6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54e859d55759a1e11b91163d6fb9bbac6
SHA104feb523020e6dc8fbec58b1c26ac319ac8434d3
SHA256b6be35cf60ec0cde63df4b91051512edb5752948dbbdf97d559653b2f7899f18
SHA5129caf0305043e76fb9dad037f0e78d9cd7fa8e9e09f0f7acb0be0574b09f9fba2d951aa9a72043e3ff08d4fb2bca8168deb373fe2ab71430c4cd9b050174e7e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54498bb49538fd814b7104f5143cb70b9
SHA1778f3901fadf1af52d40aaa8ebc86f2ebbd8544b
SHA2564597e96c4b4a95a2d4b063b946c8dc68f072c89e7846c303d5c14cd1f9ef87c7
SHA5121e5fe5ea3190a737e1073db2a7c8ed57ca0f2522764b68f6e94fe37d45fb0ef5a6873c8cfacea06c80203a970b765ad223d3c5fc1aa3f1e3d1b17a77afc74586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56d6a9c8768436f8ddddf28cfa1c2e347
SHA131785dc04c651861c7525f60722d13d83e00c2cc
SHA25630ee96ed89a62f416e193c5906190134b38ecd9cfe47196fca4c6b1b978e0db8
SHA5128054b940cd7a60c3588327aa7fb160c4ba996a31034d52a4bf57e734e4d7bb015f57b767e9e1c348a38fb8215a624e03380f8f5354d827e8e75626f64aded994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f1669570e69ddaa585b53f601ded104f
SHA16eb6562265cda3b56934679bc24b8e949a66f9c6
SHA2566df6ab2492487de2c91753e4eb04112e374764c06fd3749bf8a98fe45a6a1ce6
SHA51278febd4f5fa68c90f743f791bde4b71699a6b56b9a8905ed39264f970f791c070b2ca2f1a3cdbdbdd2985185c5d542a2f3ee1fd7c6b5f25d4916246a1a768ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58009c8e62b647c456c8d7c663a3144cc
SHA13965c302a7a491c4ea145cf596ad71e82ab6194c
SHA2566adb17bf67d6b126228235d98deddfc748e6b31ed4cbb48c444569071682253c
SHA51263b0830edae1e162e393fc0d9aeaa7da5f84040c86587af4334e10af295143910f581e0b6dd29852986396422ff3dd2ae35f9b4b739dceba00f1812c189ac6be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5186f43ee2bfe61f81b94985ebbe0577b
SHA1340c72df61dd35b9fa4364d36437db156fb522f7
SHA25621fa5514f0f9b5bdbc4487c3adac39568b682a57e8083366554f8cd9eb46d371
SHA512cbcc204c3e424c999e9e6b47bd27b8d6723d440a3bd91fb975e17b70427e55cbea65108b5ca99f30723cc6b83d4689b8f5fa439aeabc09ad4676b8ae5684bd50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e3d8b02aef9c3f9d2c77bd2b9c3f3796
SHA10c937ef44a2cf51ef7f60c30c25da084bd863f41
SHA2566250784caa2431af35e16b96b7f0074bab8e7aab7664a490e57ad726dfee5f26
SHA512ff4941642d24a885ecd7ff2b50a3c3f769fe4958acfac5843369d95a57a4fe4d77fd098d4a1e15d86589d679b3f180a860c4bbe865e57b1c914cb46e274a3a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a6ae7a0c15790372cc0c173adfd01ea8
SHA1ce012a1862ae244daad3cba57cf8bc60f96bcb39
SHA256667df4c9b6d7b8ead966f6ad5f8dca13232d92bfe636b97ff3f4a1a4e1ad4958
SHA5124589e8df89e5084994f37a77e15d4a7703dedebf2058e251790f9027e9bdbc67e249993097e72b603af29d2b2ae85bdd041d50dd76a62960642972227ea941b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f8d1192f612bdf9718732fefa545b1eb
SHA166241133caf3771b25a45d7d58c4c8747b56d2d6
SHA25697aecf8d92bfa28331dbb89d78ee01ba4231b1d209b127eaf78530b02f60530e
SHA512146b598349d804db419f7a801f86e1963b4e55c4d39b62d075de9c083601aa34a933086d560fa665d67d5361fdeb7b105fa5ade73045e7374d46e28357ce4338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52191d76afb8d54ed7117a7cddfc98388
SHA16b2dfab07db132053ba1942b403dcea33d2510e8
SHA256a33a32f1bc8033b03dbbcb67359784e486356705e67e2ffaea8e77158dc116ff
SHA5123f24cc65fe78be755e7accda0064b8e829beeae9db5c2f5f6b76212d8e2301109c3b6f756b34f24025a92dcdd07bf663a856e399631b34a85d4cae46f5757083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ad44cc819e8e252994e25ebfd65add5e
SHA1915531721fc4d608685e742f6cc705b7c5b54a24
SHA25641dee35ecdaf37821490c13e673b160ce105456eb0a8ac44a8d3ea62669d996f
SHA512ae0ecef8512e9e968d21d04c42ab1f7d0f6bfe41a825448ccca178be59f67ac6345b4440c8725c79ee0d97ba14368cf0d470a3df13310a53f0cf1c4367a5db13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57d89099956e9e21f5cb5c3defbff9422
SHA18662854905cad8fbc328e8199c35ecb8264a26a5
SHA2569323fc57324e6be379315fa4007c9d257e7e0018f70ae8777e45be8acb426d73
SHA512489da73bd4a37df757af568fa223638b226121af58d821cce76198ede58e8c2d7f57c53d7f6c6ba1dc5f23be96e0f025cdbf10505bca325b7bdd74d859cc0c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5389a864b64297a55246c9128bb3cd781
SHA1f5a0f23009ebf8a1bbee4083f7d038b322852a3f
SHA2566f8cf2358ec0d15f98299da847b23c5edb8283bfac37ac92554e06838318e4b6
SHA512626484adc98659db36a349f37f5090eb890e22ff9a78158b71927a57d69aa412d7a34ac000fcaa8887934764f7eecb17e8ef5f958d7cc646fdbf90b9d23851ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5726e04955e38e54c116f8a14c1398d42
SHA100a71627119548f85acb2cce04b30270bb142cc7
SHA2560167d6b8280bdd73b0917792ebf27c51e47c5a9c8c3eac3bae50312aca06718b
SHA5124e6926948013ca67758da87e6ab375d7abe7ce071a9f3e10dfa3c4c1047d0defafac722e998f223383c743ac58731f86decf19a40be06ab9e93e6f2a10b29474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54c5c57af4ae3dff278b91949401ae9a3
SHA1feed16e80af6b9edfec4a7f5b59ced0b0556bd0b
SHA256c033659574cfb76c8407061a4e8f29ba90be861f7f5149e639e0a7a25e269cca
SHA5129f9e46e36b5ea51baa938850b0f6e452cad6df460a5bbb3ce60a46378bbe07df33b438e95affa0ccaa131a58129b5e46575f845bf0c809c7b823f1a60f2fe4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a3cc7403cc0f9184fdd7738a5e312d4c
SHA136eed8b0ed3d5ffaea50867eac6ed679ca4d6dd4
SHA2564155f7c6ea97680cbb460798dc39f2069485446b5f5b0ce993eff035821e0ca2
SHA51293af5cdf9ce43e714ebd55fbdd368b140ff310d33c283f64cab267063051ca340dbeb7b93fa656ec9dece64797f697d4ff9ff834b136e0f925e0b68e0ad45418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53580264e713d9899cf2f7d7e50a28faa
SHA1ee6f43c049b0fc80701053793e1acaf2ddd6c8bb
SHA25648cda7056429d7b8a18939203b87fc6b63041acfce3c56ba9d0b8e8d7c3f9aae
SHA512c2347a7ef024ad8f36fec76986b008d2a4557713f223d856052b51e6c794167ed530eccda5c7727e6374fb33885230ffa17c0b98586c081ff95d6df22cef92ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f8af5f8f62ea2fcd1c338c4bcefd0dec
SHA1fd421504ce0c4a7ee00a6fe8d19938775a92aeda
SHA256953a89e93b0791b95ba7fd2d6613550f127f86288dced270e7d159cf88cd8b9d
SHA51255fd8f75831d4e9cadf7a012cbd2a6954e800746770a4d8f2f58e90e3deb71600d7ba15db19e67b441b7f98e23343d281a550b9136bb2a7567790bba28c0e865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5914a3491b5da4473fc0e6315d712c4ac
SHA10da408805259e9637d5b96e0aff667054da67715
SHA256f0ad9add4f01b1409c8db5eb75b2bb0d2172bb61f09defd0a95801a8ede9c2be
SHA512a70571d3835e48c570cd6b256848598708bbe2030dd96f800bccd9404c1a02af079006dfc4b46000ed05081cb79bfec7dc009002972e2f3358c5f5119cc53010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5231e1a3e53791fea7565a3ab5af742ea
SHA1dba6b571eccaff4a421fec48ce043c5933f6d4a9
SHA256dffa701b3aed6dd51c61f128e721adb2d377c6ce37adff75f023cc0cc171a017
SHA512ffcddc3b4cd99108e2f198b9b1d16cf3d62e45ce0fa7ac764c619040a81326445d38a3dc230adcaa0bc18d70ae7356db52a567e4ce5bbcc01ded7a8ca0f3aedb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fcced6f93c040e3e5bef9568c7d221cd
SHA18d718a9c2ef38735e813e5efa4763592fae9e07f
SHA256f18090231eb772d9a63aecf73030115de5c7e04e678ce075cd5a39fa014213a9
SHA51220a66287b6eb1f6980a0b8db96f6e8b05fc7c3408f57105c9ea97760228a22a605853632d29077d6f71185759296c3bbea0f78fdddc88a7dd963002d41a835f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56872ec713858757de51e28c25642cdf9
SHA1104fb43c0d6a01c66946d7a51ea50a9325a59223
SHA256da95a933c45d10cc1d25720ef622c1fb17f7e002a3ecf4a7448a3839fd4c60bc
SHA5128ee97068591ba93973987e2c7662619754886120e89d59eaa158bac6f6f22aae08bd249405107bdbb6bf6d07a2ce0da086028a31b8f795696a6511187cbe6f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d6fe34f08d3179f19a988d17cad3c8cd
SHA17061fff4d9eed44fe9f115b3ac972ad1aec82bb2
SHA256aeeb200fcc5581f4074a2c05012bf4d1fcb75c8ee09a11784179b673dcaf0462
SHA512666444659181bed727cb5ceb9075f07a382e6372666012c828d76e6fd8b4aa1df0be2b71ab0f296f329a9421ae77fff6d1b19d8f6ef270a156cd9cbe7dff6330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50b58acf97940d5eb2ae2c4b2bd259d9e
SHA1c235a5fc546761012d56cc5c3e3eeec65d8e365c
SHA25637a4a20c1c4f71c10c2438003157b888939ef6e14e22e0eeb8a19d60c170a9f7
SHA512d707cb6aa19b14009b2c1fb8f0d5ea790288c1f0af9a3ab32203e47cadf814068135c2b5e2d25bcbf7c7860969d6a45d68cbe027d68e99351ad49ac0c73ff0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58a5001b304cb52e0262432ec197baeb4
SHA1ecb3b987dcca1af771b1e875bdb7386323b3c9be
SHA256479ce3fb6288f37f5f6c715484f07f463556b888e4168ff86f4fa2a51e8d45dd
SHA5128722084dc960c28ffdf8f6f663bf4e39c6a4156a3769c366807f123e548e8722f6c8f4e5f9e4e153ebca53ea0c8e546ff8f8416d05ae6b73965ec0f69dd77579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57369b1999da3d9bd87e0fd39eeb319a2
SHA1f3b42119bd22fb37ecb46b098879d79db5d462c0
SHA2561e6ae7a01d296b1335e4803b046053d99b9f4841b3a38a7f3ae43ac62738fd8d
SHA512a9c3814643d1188d785b122dbbc66dc3e5177a627a207a0001de3d48ae1224f3e4d055538ce451c5780ed9aed174007deef34aea97c87d8b140beb4abe14969a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD514babd06bb7ed6be641470acdfe58594
SHA1e2bd408222e944b2d806ce559b41f886fca90cfd
SHA256ab4154ee66cad696c07bfc7d29adf1888c4fd6a131214b52d7469d4bd8b12829
SHA512b3292244955c865e3618629df10fe2c58c0bae870747dea2243f28d9e1b79d6797a8319f57047f03f456c74eca837985d5c656b2dcda480a0d743b40cbefba87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56a84e7fe6739a0a0bb9ffdedee775b4a
SHA102e6c0dd1c39ebeb4b6c427833f6137b893a6add
SHA256b9400f6655d8d2daa629b59dc778f048cd429c9dc2d9ba26fe48d767e9e06941
SHA51257c1c0bd3cdb63c3cd77587a0ebac958759d2db0b7d807555e5db89a7e9c70226af89183518c14e5ad4054b239a4d17c8bf2d402a4befd713ecbd2565c16cb62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e86423e9bcd367530656696dfa7de207
SHA14d6769e20df1ef465770d4cac8a228143878ba1e
SHA25687b72e6e465b06fd604254133a37f9119255be9d1dbaaa3650e8620101c6174e
SHA5127c12eab2e4dcd43c05cb91ce3f5c606fe845510b877ef56d6a12b259ca7b1556c19a8ec90f519b246ef37b47816979170912a5ceec32cabf623a8d1d42163e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD506e32932d62b283104fba6a86f7221bd
SHA15092b53dddc5187c45affa5f4b2207078bbfb859
SHA256f7e662997f7b298d1857ec15a86af14e355da319f46d413a588e5d5e5b9f5db1
SHA512df84886457e7fb11e354c2903657db0518fd83302224c3c3b94b1a3d0c5c65e59f9a60a0a701181eba6a2bc8003d0f462faaac99e812ad050abb6875667e03fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD565d41c6ed21702a8f2484b61ac04400d
SHA1256fa2cc29bee9c9f833973866ce543b52f5747c
SHA256dc9ef59b65e7b4637c66c583dfd5a4f28abbe6501ffe295723561ee29acfacba
SHA512445ebe92ee8b98f73ab3170aaa2d67496b610aa98e4431045fa59d36a2b7e21a124de9abd6e25a0699034b984127a6da4f0fd657d0392b614be7ff6d5c8d6211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58791565ab1322f80030640dc758dfd9b
SHA1e0663a3e538e56862d92823c3cb3e33aa57ca1af
SHA256db314dc3648b0a6ac0259593b028b28bd20e03426911a3a099e366a45b7e4ed6
SHA512320c531129319ba5b5cd876ae68ba5eaa6162c70b463b7127820dea21a89a5c2c84ac3a51c5446f767700dfe7d2f623c8792a537849c9f5e6847c017cf1fd9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5da2230e70b8682eb9c9413eb69d14969
SHA113128d47564fd8d1312808d19a5aa02744668397
SHA256fabb161c0af01b02344428051d1ab24c8582bced0c02922871de8dc5e9d9fe60
SHA512dc4c2774113f8fa0d8f49344335b7e2d2ca54eb37d6665d814e09c256d742d5e3fe5778b90e1278f16c2142f54de22d1d206b86d3f2f7962035f14d41e7d36ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50ecfdff2e343b46e9714213ef66b4f7e
SHA1aae6c8e2ab2278de40598fb2061de3fc15ee21cb
SHA256ea2517d96a41a02a6bcb3512bf0b0305851215d9eccde027f494e91bba91625f
SHA51271e0a0352e85b9a442b8e43510a7232528ac867bddd9128b391697c9f96e328086e36190679d6ef48a3fe0ee37ed275982eed34eb4e330ccb15441618e9c9d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD555e611178d1db2d19e3a6ba48e4d28b3
SHA1c105b5a38981f1959307f9a6a72f86c85d2200c5
SHA256923f33e099c17257fa636ce79a159aaaf32fefc0adc103974ce417562f5fc3df
SHA51200e953f2cedbb99e3682b99e0bb81da6d09680ef9d279ad88dfdc288a637b3595c93d0cdba795d721fceae73d30cb3a57909dc54c14ef1797d766c8d637d3059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5291c40d854370dec613db0edb215e63e
SHA15546cbf6dac44f1864e9695545cf4773e1a294e2
SHA256fd2cae2476f1df9b52653975d6e7850cd518e5543f5b992691fa3c51ba68d498
SHA512fd6212314c3c5f3024283a3f9a49c1dd3a590f43eb26f71531050d07effa0e654fd6a39ed1c24c73a46ad83087437d56c36314ac2298f7f95868f536e4ef5ce3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
7KB
MD5ed39b3accc3428934a21772438640be5
SHA1796bf164ff32f1e7453d31988fcf7b2c5e072ed4
SHA256a6a2a4c186b787bc13242f0ab1b5c0b422aa978847da0841539db848faff1fd3
SHA512d87af3b1597973497808c215df184640487d9a5e32961b74345bde2fb3d2dedce98bcac5384f096ae533e14961ecf138ecf27b2e731ef3e2659d55bd021e2ff1