Malware Analysis Report

2024-09-11 05:43

Sample ID 240601-gw7agada44
Target 8991de78e5b334947a47afbde360abe5_JaffaCakes118
SHA256 256b0bee110baf0afc1f1080d78541900565551ece3e540128261e0096f6e6ec
Tags
defense_evasion discovery execution exploit impact ransomware spyware stealer
score
9/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
9/10

SHA256

256b0bee110baf0afc1f1080d78541900565551ece3e540128261e0096f6e6ec

Threat Level: Likely malicious

The file 8991de78e5b334947a47afbde360abe5_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

defense_evasion discovery execution exploit impact ransomware spyware stealer

Renames multiple (8595) files with added filename extension

Renames multiple (7062) files with added filename extension

Deletes shadow copies

Possible privilege escalation attempt

Deletes itself

Executes dropped EXE

Reads user/profile data of web browsers

Loads dropped DLL

Modifies file permissions

Drops desktop.ini file(s)

Drops file in System32 directory

Drops file in Program Files directory

Drops file in Windows directory

Program crash

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Discovers systems in the same network

Suspicious use of AdjustPrivilegeToken

NTFS ADS

Interacts with shadow copies

Uses Volume Shadow Copy service COM API

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-01 06:10

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-01 06:10

Reported

2024-06-01 06:12

Platform

win10v2004-20240508-en

Max time kernel

138s

Max time network

108s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe"

Signatures

Deletes shadow copies

ransomware defense_evasion impact execution

Renames multiple (7062) files with added filename extension

ransomware

Possible privilege escalation attempt

exploit
Description Indicator Process Target
N/A N/A C:\Windows\system32\takeown.exe N/A
N/A N/A C:\Windows\system32\icacls.exe N/A
N/A N/A C:\Windows\system32\takeown.exe N/A
N/A N/A C:\Windows\system32\icacls.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\takeown.exe N/A
N/A N/A C:\Windows\system32\icacls.exe N/A
N/A N/A C:\Windows\system32\takeown.exe N/A
N/A N/A C:\Windows\system32\icacls.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\vssvc.exe C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin N/A
File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin N/A
File created C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe:0 C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Java\jdk-1.8\jre\lib\net.properties.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\CHICAGO.XSL.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_sortedby_up_18.svg.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\root\ui-strings.js.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_US\en_US.aff.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ef8c08_256x240.png.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_remove_18.svg C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.cpl.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\email_initiator.gif.locked C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp4-ul-phn.xrm-ms.locked C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp3-ul-phn.xrm-ms.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x.locked C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\Weather_TileMediumSquare.scale-100.png C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\files_icons.png.locked C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\unlimited\local_policy.jar.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusEDUR_Subscription-pl.xrm-ms.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientARMRefer_eula.txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EMLAttachmentIcon.png C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\ta.txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-64_contrast-white.png C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptySearch-Dark.scale-150.png C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\dark\vscroll-thumb.png.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART6.BDR.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\InModuleScope.Tests.ps1 C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\nb-no\AppStore_icon.svg.locked C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-40.png C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarMediumTile.scale-125.png C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ru-ru\ui-strings.js.locked C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\th_get.svg.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EXPEDITN\PREVIEW.GIF.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\s_checkbox_unselected_18.svg C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\themes\dark\rhp_world_icon_2x.png.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ro-ro\ui-strings.js.locked C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File created C:\Program Files\7-Zip\Lang\fy.txt.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcDemoR_BypassTrial365-ppd.xrm-ms.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\update-settings.ini.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\zh-tw\ui-strings.js.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\SplashScreen.scale-100_contrast-white.png C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\contrast-high\AboutBoxLogo.png C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-256_altform-unplated_contrast-white.png C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\pt-br\ui-strings.js C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\nub.png.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Retail-ul-oob.xrm-ms.locked C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\ExcelTellMeOnnxModel.bin.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\pt\msipc.dll.mui.locked C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\hi_contrast\core_icons__retina_hiContrast_wob.png.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\en-US.pak.DATA.locked C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019VL_KMS_Client_AE-ul.xrm-ms.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\osmia64.msi.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\EPDF_RHP.aapp.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\distribute_form.gif.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\plugins\rhp\createpdfupsell-app-tool-view.js C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\share_icons.png.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_KMS_Client_AE-ul.xrm-ms.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\dark\arrow-left.gif.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ru-ru\PlayStore_icon.svg.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-20_altform-unplated.png C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-256_altform-unplated_devicefamily-colorfulunplated.png C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\css\main.css C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\he.txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\LargeTile.scale-400_contrast-white.png C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\sl.pak.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-black_scale-180.png.readme_txt C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A

Discovers systems in the same network

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\net.exe N/A
N/A N/A C:\Windows\system32\net.exe N/A
N/A N/A C:\Windows\system32\net.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

NTFS ADS

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe N/A
File created C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\takeown.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\takeown.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4980 wrote to memory of 3732 N/A C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin
PID 4980 wrote to memory of 3732 N/A C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin
PID 4980 wrote to memory of 3732 N/A C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin
PID 3732 wrote to memory of 3328 N/A C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin C:\Windows\system32\vssadmin.exe
PID 3732 wrote to memory of 3328 N/A C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin C:\Windows\system32\vssadmin.exe
PID 3732 wrote to memory of 4024 N/A C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin C:\Windows\system32\takeown.exe
PID 3732 wrote to memory of 4024 N/A C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin C:\Windows\system32\takeown.exe
PID 3732 wrote to memory of 4892 N/A C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin C:\Windows\system32\icacls.exe
PID 3732 wrote to memory of 4892 N/A C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin C:\Windows\system32\icacls.exe
PID 3732 wrote to memory of 4460 N/A C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin C:\Windows\system32\takeown.exe
PID 3732 wrote to memory of 4460 N/A C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin C:\Windows\system32\takeown.exe
PID 3732 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin C:\Windows\system32\icacls.exe
PID 3732 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin C:\Windows\system32\icacls.exe
PID 2652 wrote to memory of 4908 N/A C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin
PID 2652 wrote to memory of 4908 N/A C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin
PID 2652 wrote to memory of 4908 N/A C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin
PID 4908 wrote to memory of 1416 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\vssadmin.exe
PID 4908 wrote to memory of 1416 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\vssadmin.exe
PID 4908 wrote to memory of 4760 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\arp.exe
PID 4908 wrote to memory of 4760 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\arp.exe
PID 4908 wrote to memory of 3808 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 3808 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 5072 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 5072 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 64 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 64 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\nslookup.exe
PID 4908 wrote to memory of 1836 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\net.exe
PID 4908 wrote to memory of 1836 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\net.exe
PID 4908 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\net.exe
PID 4908 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\net.exe
PID 4908 wrote to memory of 4764 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\net.exe
PID 4908 wrote to memory of 4764 N/A C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin C:\Windows\system32\net.exe

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe"

C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin

C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4980 -ip 4980

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 628

C:\Windows\system32\vssadmin.exe

C:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\system32\takeown.exe

C:\Windows\system32\takeown.exe /F C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\icacls.exe

C:\Windows\system32\icacls.exe C:\Windows\system32\vssvc.exe /reset

C:\Windows\system32\takeown.exe

C:\Windows\system32\takeown.exe /F C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

C:\Windows\system32\icacls.exe

C:\Windows\system32\icacls.exe C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe /reset

C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3732 -ip 3732

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 264

C:\Users\Admin\AppData\Roaming\BVBIKK~1:bin

C:\Users\Admin\AppData\Roaming\\BVBIKK~1:bin

C:\Windows\system32\vssadmin.exe

C:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\system32\arp.exe

C:\Windows\system32\arp.exe -a

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 10.127.0.1

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 10.127.255.255

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 49.12.169.207

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 224.0.0.22

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 224.0.0.251

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 224.0.0.252

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 239.255.255.250

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 255.255.255.255

C:\Windows\system32\net.exe

C:\Windows\system32\net.exe view static.207.169.12.49.clients.your-server.de

C:\Windows\system32\net.exe

C:\Windows\system32\net.exe view igmp.mcast.net

C:\Windows\system32\net.exe

C:\Windows\system32\net.exe view mdns.mcast.net

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4908 -ip 4908

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 600

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2652 -ip 2652

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 1044

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 1.0.127.10.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 255.255.127.10.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 207.169.12.49.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 22.0.0.224.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 251.0.0.224.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 252.0.0.224.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 250.255.255.239.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 255.255.255.255.in-addr.arpa udp
US 8.8.8.8:53 static.207.169.12.49.clients.your-server.de udp
DE 49.12.169.207:445 static.207.169.12.49.clients.your-server.de tcp
US 8.8.8.8:53 static.207.169.12.49.clients.your-server.de udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
DE 49.12.169.207:139 static.207.169.12.49.clients.your-server.de tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 igmp.mcast.net udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 134.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 igmp.mcast.net udp
US 8.8.8.8:53 mdns.mcast.net udp
US 8.8.8.8:53 mdns.mcast.net udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp

Files

memory/4980-2-0x0000000000710000-0x0000000000810000-memory.dmp

memory/4980-3-0x0000000000400000-0x0000000000415000-memory.dmp

C:\Users\Admin\AppData\Roaming\NYZ6KK~1:bin

MD5 8991de78e5b334947a47afbde360abe5
SHA1 155497359e022662b6028c939e0055a52463c219
SHA256 256b0bee110baf0afc1f1080d78541900565551ece3e540128261e0096f6e6ec
SHA512 aea0e71ac10ff1773ca9c65a6d864099834ff3986954f08db54ac6f5be43d03ba09ce5d4869e05633feb08c36e7929079b836e141c13de46861daf4ad654f763

memory/3732-11-0x0000000000400000-0x000000000042C000-memory.dmp

memory/4980-12-0x0000000000400000-0x000000000042C000-memory.dmp

memory/4980-13-0x0000000000400000-0x0000000000415000-memory.dmp

memory/2652-20-0x0000000000400000-0x000000000042C000-memory.dmp

memory/3732-30-0x0000000000400000-0x000000000042C000-memory.dmp

C:\Windows\Temp\P49EF.tmp

MD5 9686e36f7086f18dc866351b5f1dcd92
SHA1 7fbf5558d7509468fc974e92f6464ccddb0bd894
SHA256 cf664db1f0277133d904fa8f7c8f1cc17122d0687bfbd9a30db4f79535385fb5
SHA512 7482eda4a3ef290125db3cc96541421f96acc1f450e991a939e445ce93a36ae1103e161218c75099558e4e2fed90124d78fce6b27994d00a8f386386f1f2a4d6

memory/2652-1858-0x0000000000400000-0x000000000042C000-memory.dmp

memory/4908-2879-0x0000000000400000-0x000000000042C000-memory.dmp

C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\S-1-5-21-1337824034-2731376981-3755436523-1000-MergedResources-0.pri.locked

MD5 27dc00bb2dd19cb07ae1f3e4ede6c417
SHA1 5be0a9479d0f42f2144a7a01f7829474eed879f1
SHA256 27602a77c0f65b4cc1b7bf801cc0d39d0c275e9384c7572a8ea7ae3f52523e7e
SHA512 47f58387e89c65ad6ccec3436709dff1650646160ca798683ea7f096baebede3da4bb71e34671e08f324e8ba3a5c0d1d6b24028cdef52de0f33cfe68d3f2f892

C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\S-1-5-21-1337824034-2731376981-3755436523-1000-MergedResources-0.pri.locked

MD5 58713222c3db724b11131c18590b4393
SHA1 78fb318072ed9705d1268f620de2f32946a19929
SHA256 3cfc416912fe72f3d962084c6d1bf0a998fa73c38d97694baf80ffff11dd6458
SHA512 21f7c22d587170d1ce612d352b6936dd0066fe84ba384b5639e7c3553c0be42a304aee2ec4328a75b2e416e7cdbc82317affc22599b8cd8c735282f32b066a3e

C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\S-1-5-21-1337824034-2731376981-3755436523-1000-MergedResources-0.pri.locked

MD5 050bbd8b41fd8710e106a95c1047409b
SHA1 60d72a6a24e96a152b1ae54f5255677a6af13721
SHA256 524967ec7a155f4b2dca60dd32844f07b33a06f31ebadfd9045c8d9ef1b96e10
SHA512 debeb08a84535c49ddcd772f5db0e9685c30d22af028459e8b05cdf45d04f4aaf51bb8881c8c78018d3787889419023462e4a9b2de274627cd59aef867b4991a

C:\Windows\Temp\YLCF20.tmp

MD5 5bef1c13e1c53aad094bb94086afb7e7
SHA1 9caca218662cc7eab126bc085b1d8ac9e359913f
SHA256 a13792cde232bebbc4f38a63a057bad7a2674e8c97415fd6646be416e112d1f2
SHA512 e1196949a266e5d0fc3e27a571a9e92ec1acf9db40ca59013cc1f8b746fa6242372301ac02158e04599fcaedc9e4d4e39777685df2dc9c8af4dafab89a8ef29a

memory/2652-34659-0x0000000000400000-0x000000000042C000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-01 06:10

Reported

2024-06-01 06:12

Platform

win7-20240221-en

Max time kernel

119s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe"

Signatures

Deletes shadow copies

ransomware defense_evasion impact execution

Renames multiple (8595) files with added filename extension

ransomware

Possible privilege escalation attempt

exploit
Description Indicator Process Target
N/A N/A C:\Windows\system32\takeown.exe N/A
N/A N/A C:\Windows\system32\icacls.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\VhZqw8co:bin N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\icacls.exe N/A
N/A N/A C:\Windows\system32\takeown.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI C:\Windows\System32\snmptrap.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\system32\4JVAJY~1 C:\Windows\System32\snmptrap.exe N/A
File created C:\Windows\system32\4JVAJY~1:bin C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Windows\System32\snmptrap.exe:0 C:\Windows\system32\4JVAJY~1:bin N/A
File opened for modification C:\Windows\System32\snmptrap.exe C:\Windows\system32\4JVAJY~1:bin N/A
File opened for modification C:\Windows\System32\snmptrap.exe C:\Users\Admin\AppData\Roaming\VhZqw8co:bin N/A
File created C:\Windows\System32\snmptrap.exe:0 C:\Users\Admin\AppData\Roaming\VhZqw8co:bin N/A
File created C:\Windows\system32\4JvaJyOHaW C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Windows\system32\4JvaJyOHaW C:\Windows\System32\snmptrap.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf.locked C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-core-multiview.jar.locked C:\Windows\System32\snmptrap.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\Europe\Brussels.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0196164.WMF C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18196_.WMF.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\CONTACT.CFG.readme_txt C:\Windows\System32\snmptrap.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\EET.readme_txt C:\Windows\System32\snmptrap.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099169.WMF.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00052_.WMF.locked C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Brisbane.locked C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-snaptracer.xml.locked C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0090390.WMF.readme_txt C:\Windows\System32\snmptrap.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL002.XML.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\square_s.png C:\Windows\System32\snmptrap.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02134_.GIF.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\bdcmetadata.xsd.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_hyperlink.gif C:\Windows\System32\snmptrap.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Templates\1033\UrbanMergeLetter.Dotx.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Dot.png C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyclient.jar.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Panama.locked C:\Windows\System32\snmptrap.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\MANIFEST.MF.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\vlc.mo.locked C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187849.WMF C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\DiscussionToolIconImages.jpg.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\button_left_over.gif.readme_txt C:\Windows\System32\snmptrap.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\license.html.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Dili.locked C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\flyout.css C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14800_.GIF.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.w3c.css.sac_1.3.1.v200903091627.jar C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\PREVIEW.GIF C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00084_.WMF C:\Windows\System32\snmptrap.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02269_.WMF.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02085_.GIF C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21422_.GIF.locked C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PULQOT98.POC C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-netbeans-modules-options-api.xml.readme_txt C:\Windows\System32\snmptrap.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\Asia\Baku.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107512.WMF C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03464_.WMF C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\OliveGreen.css.locked C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\INCOMING.ICO.locked C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Paramaribo C:\Windows\System32\snmptrap.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\Australia\Currie.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Galapagos.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\Gadget_Main_Background_Loading.png C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\Process Library.fdt.locked C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\23.png C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGBORDER.XML.locked C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\org.eclipse.equinox.p2.artifact.repository.prefs.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-It.otf C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_LinkDrop32x32.gif C:\Windows\System32\snmptrap.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\cacerts.readme_txt C:\Windows\System32\snmptrap.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\ECLIPSE_.SF.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Macau.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\PREVIEW.GIF.locked C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099146.WMF.readme_txt C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationUp_ButtonGraphic.png C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-ui_ja.jar C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Sydney.locked C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PAPYRUS\PAPYRUS.ELM.locked C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02223U.BMP.locked C:\Windows\System32\snmptrap.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00006_.WMF.readme_txt C:\Windows\System32\snmptrap.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe C:\Users\Admin\AppData\Roaming\VhZqw8co:bin N/A
File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe:0 C:\Users\Admin\AppData\Roaming\VhZqw8co:bin N/A

Discovers systems in the same network

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\net.exe N/A
N/A N/A C:\Windows\system32\net.exe N/A
N/A N/A C:\Windows\system32\net.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

NTFS ADS

Description Indicator Process Target
File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe:0 C:\Users\Admin\AppData\Roaming\VhZqw8co:bin N/A
File created C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\System32\snmptrap.exe N/A
File created C:\Users\Admin\AppData\Roaming\VhZqw8co:bin C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\takeown.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\snmptrap.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Windows\System32\snmptrap.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2868 wrote to memory of 2344 N/A C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe C:\Users\Admin\AppData\Roaming\VhZqw8co:bin
PID 2868 wrote to memory of 2344 N/A C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe C:\Users\Admin\AppData\Roaming\VhZqw8co:bin
PID 2868 wrote to memory of 2344 N/A C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe C:\Users\Admin\AppData\Roaming\VhZqw8co:bin
PID 2868 wrote to memory of 2344 N/A C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe C:\Users\Admin\AppData\Roaming\VhZqw8co:bin
PID 2344 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Roaming\VhZqw8co:bin C:\Windows\system32\vssadmin.exe
PID 2344 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Roaming\VhZqw8co:bin C:\Windows\system32\vssadmin.exe
PID 2344 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Roaming\VhZqw8co:bin C:\Windows\system32\vssadmin.exe
PID 2344 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Roaming\VhZqw8co:bin C:\Windows\system32\vssadmin.exe
PID 2344 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\VhZqw8co:bin C:\Windows\system32\takeown.exe
PID 2344 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\VhZqw8co:bin C:\Windows\system32\takeown.exe
PID 2344 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\VhZqw8co:bin C:\Windows\system32\takeown.exe
PID 2344 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\VhZqw8co:bin C:\Windows\system32\takeown.exe
PID 2344 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\VhZqw8co:bin C:\Windows\system32\icacls.exe
PID 2344 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\VhZqw8co:bin C:\Windows\system32\icacls.exe
PID 2344 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\VhZqw8co:bin C:\Windows\system32\icacls.exe
PID 2344 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\VhZqw8co:bin C:\Windows\system32\icacls.exe
PID 2616 wrote to memory of 2460 N/A C:\Windows\System32\snmptrap.exe C:\Users\Admin\AppData\Roaming\JLNR13~1:bin
PID 2616 wrote to memory of 2460 N/A C:\Windows\System32\snmptrap.exe C:\Users\Admin\AppData\Roaming\JLNR13~1:bin
PID 2616 wrote to memory of 2460 N/A C:\Windows\System32\snmptrap.exe C:\Users\Admin\AppData\Roaming\JLNR13~1:bin
PID 2616 wrote to memory of 2460 N/A C:\Windows\System32\snmptrap.exe C:\Users\Admin\AppData\Roaming\JLNR13~1:bin
PID 2460 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\vssadmin.exe
PID 2460 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\vssadmin.exe
PID 2460 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\vssadmin.exe
PID 2460 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\vssadmin.exe
PID 2460 wrote to memory of 2784 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\arp.exe
PID 2460 wrote to memory of 2784 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\arp.exe
PID 2460 wrote to memory of 2784 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\arp.exe
PID 2460 wrote to memory of 2784 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\arp.exe
PID 2460 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 820 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 820 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 820 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 820 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 2184 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 2184 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 2184 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 2184 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 472 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 472 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 472 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 472 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 2308 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 2308 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 2308 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 2308 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 384 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 384 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 384 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 384 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 852 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 852 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 852 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 852 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 1880 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 1880 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 1880 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 1880 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\nslookup.exe
PID 2460 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\net.exe
PID 2460 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\net.exe
PID 2460 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\net.exe
PID 2460 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Roaming\JLNR13~1:bin C:\Windows\system32\net.exe

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe"

C:\Users\Admin\AppData\Roaming\VhZqw8co:bin

C:\Users\Admin\AppData\Roaming\VhZqw8co:bin C:\Users\Admin\AppData\Local\Temp\8991de78e5b334947a47afbde360abe5_JaffaCakes118.exe

C:\Windows\system32\vssadmin.exe

C:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\takeown.exe

C:\Windows\system32\takeown.exe /F C:\Windows\System32\snmptrap.exe

C:\Windows\system32\icacls.exe

C:\Windows\system32\icacls.exe C:\Windows\System32\snmptrap.exe /reset

C:\Windows\System32\snmptrap.exe

C:\Windows\System32\snmptrap.exe

C:\Users\Admin\AppData\Roaming\JLNR13~1:bin

C:\Users\Admin\AppData\Roaming\\JLNR13~1:bin

C:\Windows\system32\vssadmin.exe

C:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\system32\arp.exe

C:\Windows\system32\arp.exe -a

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 10.127.0.1

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 10.127.255.255

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 37.27.61.182

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 224.0.0.22

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 224.0.0.251

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 224.0.0.252

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 239.255.255.250

C:\Windows\system32\nslookup.exe

C:\Windows\system32\nslookup.exe 255.255.255.255

C:\Windows\system32\net.exe

C:\Windows\system32\net.exe view static.182.61.27.37.clients.your-server.de

C:\Windows\system32\net.exe

C:\Windows\system32\net.exe view igmp.mcast.net

C:\Windows\system32\net.exe

C:\Windows\system32\net.exe view mdns.mcast.net

C:\Windows\system32\4JVAJY~1:bin

C:\Windows\system32\4JVAJY~1:bin C:\Windows\System32\snmptrap.exe 2616

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 1.0.127.10.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 255.255.127.10.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 182.61.27.37.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 22.0.0.224.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 251.0.0.224.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 252.0.0.224.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 250.255.255.239.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 255.255.255.255.in-addr.arpa udp

Files

memory/2868-2-0x0000000000520000-0x0000000000620000-memory.dmp

memory/2868-3-0x0000000000400000-0x0000000000415000-memory.dmp

\Users\Admin\AppData\Roaming\VhZqw8co

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Roaming\VhZqw8co:bin

MD5 8991de78e5b334947a47afbde360abe5
SHA1 155497359e022662b6028c939e0055a52463c219
SHA256 256b0bee110baf0afc1f1080d78541900565551ece3e540128261e0096f6e6ec
SHA512 aea0e71ac10ff1773ca9c65a6d864099834ff3986954f08db54ac6f5be43d03ba09ce5d4869e05633feb08c36e7929079b836e141c13de46861daf4ad654f763

memory/2868-13-0x0000000000400000-0x0000000000415000-memory.dmp

memory/2868-12-0x0000000000400000-0x000000000042C000-memory.dmp

memory/2344-16-0x0000000000400000-0x000000000042C000-memory.dmp

memory/2616-26-0x0000000000400000-0x000000000042C000-memory.dmp

memory/2344-28-0x0000000000400000-0x000000000042C000-memory.dmp

C:\Windows\Temp\qt2042.tmp

MD5 9686e36f7086f18dc866351b5f1dcd92
SHA1 7fbf5558d7509468fc974e92f6464ccddb0bd894
SHA256 cf664db1f0277133d904fa8f7c8f1cc17122d0687bfbd9a30db4f79535385fb5
SHA512 7482eda4a3ef290125db3cc96541421f96acc1f450e991a939e445ce93a36ae1103e161218c75099558e4e2fed90124d78fce6b27994d00a8f386386f1f2a4d6

memory/2460-207-0x0000000000400000-0x000000000042C000-memory.dmp

C:\Windows\Temp\ly23DE.tmp

MD5 5bef1c13e1c53aad094bb94086afb7e7
SHA1 9caca218662cc7eab126bc085b1d8ac9e359913f
SHA256 a13792cde232bebbc4f38a63a057bad7a2674e8c97415fd6646be416e112d1f2
SHA512 e1196949a266e5d0fc3e27a571a9e92ec1acf9db40ca59013cc1f8b746fa6242372301ac02158e04599fcaedc9e4d4e39777685df2dc9c8af4dafab89a8ef29a

memory/2616-1304-0x0000000000400000-0x000000000042C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\B1A73.tmp

MD5 e028c8417dd1f4a1bbebe990687f60be
SHA1 735a00747091318bb37e2a99495d7d2d329eeddc
SHA256 ad1745fb0662b3217f3d8e591fc3476278766709a185b43bdea26c966071a6c3
SHA512 a2a1c67f7b9418cd5d2da78bf908fa8286dc4e55926107636e542fff2b8da75cc1e2b934ee77e148ed082df9b090b590d19f18a428f6e656824fdea202c8200c

memory/2272-43100-0x0000000000400000-0x000000000042C000-memory.dmp