Analysis
-
max time kernel
130s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 06:20
Static task
static1
Behavioral task
behavioral1
Sample
b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe
-
Size
350KB
-
MD5
b21a8247fed6d7f3fb9fa89016a5f41d
-
SHA1
9227062dc0a62e4fa0284ad521a56c373c34ffde
-
SHA256
2d63a0d8ece25bdb093098fe7569c973ada10927387ee288b87030e5765f514b
-
SHA512
68c0342db819d8df9bddce9c23a2552cfa6d72e24ff54c3ed922a4388e698c0c6e3cee8688c905564540141ea32d3e26e8acc49b5412aadd526aea93fe5f7fa7
-
SSDEEP
6144:oucrZMDMXbJ2kAUWaNCZAaCudurslKREBKT0PLNMbQ4AWbO/Fh:P8ZM2RiKCZ9urGETYNMbQ4zbm
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.xlfp45.win/23BC-9D7C-A97F-006D-A0FC
http://cerberhhyed5frqa.slr849.win/23BC-9D7C-A97F-006D-A0FC
http://cerberhhyed5frqa.ret5kr.win/23BC-9D7C-A97F-006D-A0FC
http://cerberhhyed5frqa.zgf48j.win/23BC-9D7C-A97F-006D-A0FC
http://cerberhhyed5frqa.xltnet.win/23BC-9D7C-A97F-006D-A0FC
http://cerberhhyed5frqa.onion/23BC-9D7C-A97F-006D-A0FC
Extracted
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16392) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1180 bcdedit.exe 1916 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\\pcaui.exe\"" b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\\pcaui.exe\"" pcaui.exe -
Deletes itself 1 IoCs
pid Process 3028 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\pcaui.lnk pcaui.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\pcaui.lnk b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2180 pcaui.exe -
Loads dropped DLL 3 IoCs
pid Process 1540 b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe 1540 b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe 2180 pcaui.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pcaui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\\pcaui.exe\"" b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\pcaui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\\pcaui.exe\"" b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pcaui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\\pcaui.exe\"" pcaui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\pcaui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\\pcaui.exe\"" pcaui.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pcaui.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp196.bmp" pcaui.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2472 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 772 taskkill.exe 1736 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\\pcaui.exe\"" b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop pcaui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\\pcaui.exe\"" pcaui.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1265231-2BA8-11EF-BEA9-FE29290FA5F9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60dde463b5bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424680740" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1134731-2BA8-11EF-BEA9-FE29290FA5F9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2832 PING.EXE 964 PING.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe 2180 pcaui.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 1540 b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe Token: SeDebugPrivilege 1736 taskkill.exe Token: SeDebugPrivilege 2180 pcaui.exe Token: SeBackupPrivilege 2492 vssvc.exe Token: SeRestorePrivilege 2492 vssvc.exe Token: SeAuditPrivilege 2492 vssvc.exe Token: SeIncreaseQuotaPrivilege 1940 wmic.exe Token: SeSecurityPrivilege 1940 wmic.exe Token: SeTakeOwnershipPrivilege 1940 wmic.exe Token: SeLoadDriverPrivilege 1940 wmic.exe Token: SeSystemProfilePrivilege 1940 wmic.exe Token: SeSystemtimePrivilege 1940 wmic.exe Token: SeProfSingleProcessPrivilege 1940 wmic.exe Token: SeIncBasePriorityPrivilege 1940 wmic.exe Token: SeCreatePagefilePrivilege 1940 wmic.exe Token: SeBackupPrivilege 1940 wmic.exe Token: SeRestorePrivilege 1940 wmic.exe Token: SeShutdownPrivilege 1940 wmic.exe Token: SeDebugPrivilege 1940 wmic.exe Token: SeSystemEnvironmentPrivilege 1940 wmic.exe Token: SeRemoteShutdownPrivilege 1940 wmic.exe Token: SeUndockPrivilege 1940 wmic.exe Token: SeManageVolumePrivilege 1940 wmic.exe Token: 33 1940 wmic.exe Token: 34 1940 wmic.exe Token: 35 1940 wmic.exe Token: SeIncreaseQuotaPrivilege 1940 wmic.exe Token: SeSecurityPrivilege 1940 wmic.exe Token: SeTakeOwnershipPrivilege 1940 wmic.exe Token: SeLoadDriverPrivilege 1940 wmic.exe Token: SeSystemProfilePrivilege 1940 wmic.exe Token: SeSystemtimePrivilege 1940 wmic.exe Token: SeProfSingleProcessPrivilege 1940 wmic.exe Token: SeIncBasePriorityPrivilege 1940 wmic.exe Token: SeCreatePagefilePrivilege 1940 wmic.exe Token: SeBackupPrivilege 1940 wmic.exe Token: SeRestorePrivilege 1940 wmic.exe Token: SeShutdownPrivilege 1940 wmic.exe Token: SeDebugPrivilege 1940 wmic.exe Token: SeSystemEnvironmentPrivilege 1940 wmic.exe Token: SeRemoteShutdownPrivilege 1940 wmic.exe Token: SeUndockPrivilege 1940 wmic.exe Token: SeManageVolumePrivilege 1940 wmic.exe Token: 33 1940 wmic.exe Token: 34 1940 wmic.exe Token: 35 1940 wmic.exe Token: SeDebugPrivilege 772 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 876 IEXPLORE.EXE 876 IEXPLORE.EXE 1820 iexplore.exe 1820 iexplore.exe 904 IEXPLORE.EXE 904 IEXPLORE.EXE 2840 iexplore.exe 2840 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 904 IEXPLORE.EXE 904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2180 1540 b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe 28 PID 1540 wrote to memory of 2180 1540 b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe 28 PID 1540 wrote to memory of 2180 1540 b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe 28 PID 1540 wrote to memory of 2180 1540 b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe 28 PID 1540 wrote to memory of 3028 1540 b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe 29 PID 1540 wrote to memory of 3028 1540 b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe 29 PID 1540 wrote to memory of 3028 1540 b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe 29 PID 1540 wrote to memory of 3028 1540 b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe 29 PID 3028 wrote to memory of 1736 3028 cmd.exe 31 PID 3028 wrote to memory of 1736 3028 cmd.exe 31 PID 3028 wrote to memory of 1736 3028 cmd.exe 31 PID 3028 wrote to memory of 1736 3028 cmd.exe 31 PID 3028 wrote to memory of 2832 3028 cmd.exe 33 PID 3028 wrote to memory of 2832 3028 cmd.exe 33 PID 3028 wrote to memory of 2832 3028 cmd.exe 33 PID 3028 wrote to memory of 2832 3028 cmd.exe 33 PID 2180 wrote to memory of 2472 2180 pcaui.exe 34 PID 2180 wrote to memory of 2472 2180 pcaui.exe 34 PID 2180 wrote to memory of 2472 2180 pcaui.exe 34 PID 2180 wrote to memory of 2472 2180 pcaui.exe 34 PID 2180 wrote to memory of 1940 2180 pcaui.exe 38 PID 2180 wrote to memory of 1940 2180 pcaui.exe 38 PID 2180 wrote to memory of 1940 2180 pcaui.exe 38 PID 2180 wrote to memory of 1940 2180 pcaui.exe 38 PID 2180 wrote to memory of 1180 2180 pcaui.exe 40 PID 2180 wrote to memory of 1180 2180 pcaui.exe 40 PID 2180 wrote to memory of 1180 2180 pcaui.exe 40 PID 2180 wrote to memory of 1180 2180 pcaui.exe 40 PID 2180 wrote to memory of 1916 2180 pcaui.exe 42 PID 2180 wrote to memory of 1916 2180 pcaui.exe 42 PID 2180 wrote to memory of 1916 2180 pcaui.exe 42 PID 2180 wrote to memory of 1916 2180 pcaui.exe 42 PID 2180 wrote to memory of 1820 2180 pcaui.exe 47 PID 2180 wrote to memory of 1820 2180 pcaui.exe 47 PID 2180 wrote to memory of 1820 2180 pcaui.exe 47 PID 2180 wrote to memory of 1820 2180 pcaui.exe 47 PID 2180 wrote to memory of 1080 2180 pcaui.exe 48 PID 2180 wrote to memory of 1080 2180 pcaui.exe 48 PID 2180 wrote to memory of 1080 2180 pcaui.exe 48 PID 2180 wrote to memory of 1080 2180 pcaui.exe 48 PID 1820 wrote to memory of 876 1820 iexplore.exe 49 PID 1820 wrote to memory of 876 1820 iexplore.exe 49 PID 1820 wrote to memory of 876 1820 iexplore.exe 49 PID 1820 wrote to memory of 876 1820 iexplore.exe 49 PID 1820 wrote to memory of 904 1820 iexplore.exe 51 PID 1820 wrote to memory of 904 1820 iexplore.exe 51 PID 1820 wrote to memory of 904 1820 iexplore.exe 51 PID 1820 wrote to memory of 904 1820 iexplore.exe 51 PID 2840 wrote to memory of 2540 2840 iexplore.exe 52 PID 2840 wrote to memory of 2540 2840 iexplore.exe 52 PID 2840 wrote to memory of 2540 2840 iexplore.exe 52 PID 2840 wrote to memory of 2540 2840 iexplore.exe 52 PID 2180 wrote to memory of 2568 2180 pcaui.exe 53 PID 2180 wrote to memory of 2568 2180 pcaui.exe 53 PID 2180 wrote to memory of 2568 2180 pcaui.exe 53 PID 2180 wrote to memory of 2568 2180 pcaui.exe 53 PID 2180 wrote to memory of 1992 2180 pcaui.exe 57 PID 2180 wrote to memory of 1992 2180 pcaui.exe 57 PID 2180 wrote to memory of 1992 2180 pcaui.exe 57 PID 2180 wrote to memory of 1992 2180 pcaui.exe 57 PID 1992 wrote to memory of 772 1992 cmd.exe 59 PID 1992 wrote to memory of 772 1992 cmd.exe 59 PID 1992 wrote to memory of 772 1992 cmd.exe 59 PID 1992 wrote to memory of 964 1992 cmd.exe 61 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\pcaui.exe"C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\pcaui.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2472
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:1180
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:1916
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:876
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:472065 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:904
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:1080
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:2568
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "pcaui.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\pcaui.exe" > NUL3⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "pcaui.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:964
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe" > NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:2832
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:2456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5a630a77378a469c12bdc3797f2dfaf5b
SHA172f5d3647f0d800b2078370d1af9e9d821ab9992
SHA25697288e8f60bc54dce32a0b47d2ece22370cf4fa9854f09e8fedd6a623109c9d2
SHA51205ecd865a8f1b9b64283a3f5a7161d0a1ba7d8d4a05de59199d89c6c7ede22e3498e338da0f94a281279e9321f79a6dc5ea6f72daf450027384a21b6ac17449a
-
Filesize
10KB
MD5ed480010e758a6b20f97c0fe790d8658
SHA1232799fd7951cbcce925a0d3693032384fb469b8
SHA256a1d0ea718d515450fcfe9d427e0354317c2bec293e4a5434c61d30a2a2d0fe1a
SHA512ab1795373ec3a41c8d408b75f65dabf775b4ffff2160dd29ec982a2c9251f2bdb58db9e0fc2f746e3249c5ddeda6a8d0f69239bed537f3edf6fa665f52064fe1
-
Filesize
85B
MD54b8bf2097b5d31328a1dbbe4fc737655
SHA1a909c6bbaa0a16a0d0d8797011ab3a045c2e0008
SHA256a19ce3d0fab9e70c511335b7ed898d08b6e20b9ab13a221c379c1759eb532b6e
SHA5124872ed7311e61ac9ee9ae3eb08e2b9729c81470d34483dce82e1fb24c20c7a40e43831295ce49a35dbaf172a158004780f4d43218ab4fe1cb4f77aac7561af85
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e5554a7c6111d5bf9b6e43fa1296f714
SHA15e1858b43cdf0b2385a08cfb99ab6f0285a72f2c
SHA256f3d36159b8e5bf9b2d8551d2c545576c0c13797ba07e7c1b8aac898eeb290796
SHA512b2aab1135eb6c6972c96029e25dd31527ef6cb4e3453425456371cffc8921afbaca375f6a425deeeb87709c3a7b2819ca9eca897308639e524e996cb494dbb28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a23fbd51d9d3950b1059ac860924d16d
SHA10ebdbc27b28011973ef6a36a6d1484b32bf05962
SHA25610229c4303ab1e61903cfb5a1e3ae150fe811a513254f556c0d2479972478c4c
SHA512ffe72acc658f1401ff06706031cda83d381287df45ce16afcb9084aad96bc2d4990b2d7898c4f0e6fc18c7daf03f05755999d755b82826f7cb27674fd171c3a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f5187258153f07ad30106ff29b54010
SHA1a5ae3b1dd20b24b2b2277b18f2f4b612710ae275
SHA25645b9a34c812a4c378b923578a1f47fb5c7ddb274af5b17983cd9f7ebab8c9f9a
SHA51285094b14730638950e2c44124dd432c3e83dd12c04d7610d1e2f036d3b0a3a0a8035e4d45956a545eb061ec83d714d786a9157e2219e130a69661524f652943e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b21b2c9e1fd5bd367b215da95224d0
SHA13a2420a9ad78118a2fce5dadab597db3228fb2ff
SHA2566dd8bd5c46133626cc99d2607f59d68ef54f36bccd4cec2491ca9965d694fc5e
SHA5125708ffb66c40bdd0b8acf7c6a2cacfa5d8bb78087b1b2cbd40b7fac4df7a1be0df444f73116d762ec2bf46785c573b6c3dec6e9f96d60cac8f731470b15c893f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4ecb7c47e9febc96ae9fb9a48b38094
SHA1a5538229fafb5fc8629b0365ed44ecebfe4857be
SHA25639a42a882cfa4adb1cdb16b9dac3a3112109beb91172b4b82d0480854e9c9597
SHA512239f3b3405494cc0d462859700775da6443d2e0fce74274b5b1f6b0a279fe29790134b7f01fe78a334fcc00772026562bb7a1ca693dba46857752d6407da0776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592cbbcf02bafa93daf77501f66c28dd0
SHA1452c96376e4f78c5ed4555bf5341d5181b96d494
SHA2568778b7fcdb7b5ed6ad40882d0e21f2ddd5b09c27683fbdcb07d0ce46a37ff5d7
SHA512050916392e7bfd0a4399b6127417c0864eab67b2b4b2e5415f4df061febb38f0acf57ad5ad3df17c9affbb20634d10dbaf8a0fbb8abaaf9e67bea3988eb4f5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c82ac9109fac28aefa3b2322996caf
SHA199111c6f4f0db38be96d02079c28bd1f5b0fd5f2
SHA256f133b249a12e2ff59661367d2a69a3218c7e15e3e2837c52e9658c888c70920c
SHA51281a9e20937a710d2a377516c81f139ac5f37213b0bd634dd82192f16236203f58882dc3c63361f2cf2a9ffb526f52ea7f42539e020a645196d7fa55707a3d74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d889db61b9c3ccee0753d46700921f4
SHA143cd5f09fe1d4c131f1c99dcc385a45449db4acd
SHA256971306fc823c52a2577f1e40986c2b8ea2eb9010bef976758d94a30321fc456f
SHA51220e9f346f59682dc0dc450f25a91d83b1c94b70e580ef3ff7dd639c2cc10e3c23edce3ea7c1f13175a31b7f9a4980f8b75dd0048a6bf1dfdd632b6eaf7d84d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddaebee63dd01b107a478741fbaf29fe
SHA182ab1db9b128343512f51d5bb52bdf685eb236e2
SHA256d9938f05b33394207e5893a75744c286ca7458bba3a9e8664fdfbe5ce46dfc42
SHA512822a378440763bdac1a6e0f49c70894193e6e5d91ba7b32ddc6a2d7e212ecdeafdeeba1d0e5c7a5cb11b9e0bd688446828cbb9f9a938d1c908a71a35b7878fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbc12402c92802e4602b19e349bb3b0d
SHA195a1a592528e77853f010f62405cd09c90467035
SHA2568e1421dcd46e4ac3007fb324fac4952d879006cff5b3bf4fb92a755c519dfc7d
SHA512d906a785c16d948435ffbe51546ef87e471bed1542b78529ea5377c2ae7d2f2a68ccd94f35c3b57e559cd0df545e21bb88c0d6efdf94182ff5e441614d302c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9555320232fe62d52e0944a78891b12
SHA156fd6f6d1a9eff773076bd49a568f6d9b8d04ba8
SHA256ed287e7b99092f00e90b68aca29e097e3523213627f1264a7d58ffbada73d365
SHA51290e45d49f5da82060a293473023b9ec698e9ec912e01df4ec89d843d4985f98a7e2ad1ebe1229fb521de4ae7b80e888bab4e0ff73254d2e00ba73f032ea47353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5753f1a30f2b937ca8cc91ff38c831774
SHA153011407549f82565303ccaf716b059726de0fd0
SHA2563583fc68d2ae931c3e54cecd463012877ab449cb25b7c4dfffab0e90abd5cf98
SHA512480c24e866f12b1537d93f13016bc8c501f1f70aabfc2dcadc5514169ba3c059e5baeaf76888f9de278e92e49acc4e8ee8fc76187dc4da22c2ee765aac36b97f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8ac5a84eeb056ad1bd50f8d1d34b1c
SHA1c04684bcdf59da8036369617688a020c26814137
SHA256082fbd34ec71738cb4ea166d91b57c5a32b82649e28d1d6bafb7502b50f3bc92
SHA512585c5105d1f8898dd9fe5f68994a2e9e2efbc6644d88579d0ced88c51e086223fe6e800bd9760aab94aef6f506073023884565e789cfcbd6a9dab9297945b7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43320414d501f59dfe6a3ad03ae43e4
SHA1445b8ba5f5caf61a22ff30a4a542d99ccde21e14
SHA256fe9f689aea00930283c0fd0826b2875fe98d35129b43ecb21aa2b963c871cdaf
SHA512f7c6b63e97ca1e79becfffd9fe855f8341f89424b27be7df998dbc85a96c5a8ad1af79509c73705de9dedbcf2b6116a654a9d58b83572b58d3bcf1b8c8dee9d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d65b6a208bb7d7e743e70668da881533
SHA146687e070fd90f24604e0ba7a699209a9fc3789e
SHA25682cb4858ad6a7e8d293dfaf65bf959d486648c6aad6924ca767c67b5631e2b05
SHA5123f3449e9f3bad52642114e0614b101ea388035f5be72f3926f8d28a294913242bfe3820bbdf782bce4725d390ea0e621455c0fdece01bb4f939e352d077c2ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c859f126355bc24808a0ba92c13d35e
SHA1bc92a1434f379674d93a6015786ade379eca13c2
SHA256fc3202abb5dab62c920f1315ef35fcfbf2bc93e1c0cf2a37a8295dc3277c96f4
SHA51230e73bb14f0f2399d188861da738276ab45f31fa24c47761ec07a05fa1cc98d9ac4efada68adbbfb681d129589d0bec280d73b2671bbda15881fe3f4ce1ac163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec09d91d570ef65f320a0558b96646d3
SHA11db60979a3159b085540fd26e719ef0dceb7b685
SHA25675722da47dfd03f12ad490580c56ea2018ecb697b1f1a773432c914d114a7dd3
SHA512827742f1600aae7591ec864b3cdbd4fc94110204f9804fe22e506f016d944230d8fd0d89423410d05525bd69716d37070b09814ed378679445cdc013ba97d5bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdb2fca5d3da789d2cdeb0e4f40d67e6
SHA1e944e63d51e773332d7b2ccbe91bde29fd6b1427
SHA256f022890cba24b02dc8b7c4aeff3a1c00bbdeec60f85cf15e3b29bf324a896714
SHA512a2a5efc71a74c18ea0ab6b144ea0f725530a5908497a1a8a33607f67eaddbaf693a4bf5b0c3372b35b01dd0b4461ca8f67435cb68014cd7b069ac0194a264fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0d4fece508454fefd1689f84a425850
SHA1c35d1511d21de11a03a59f38f1b9c0bcc6590cfd
SHA256a61f518f8c01d55cabe28cf4b01f89244936178d4787de330f7eaa666dc1bbb6
SHA51279a2a8d90a73c14bb2ca20fc76a69cb664b541ceded279f73217fb9aa826e27bc00b3022a693beccaaacda0bbb2c8be783c37c97bafdebf6a0eb5bf69524de99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca4b2db101dab2f64a9a053fddeeba00
SHA1442ce6939cc69f70577498a2c092b568f382f7fe
SHA2563e33608719b0701f63573da7a4dbc559126ddae19e74fb4327eebe6f93b77a57
SHA5126f9b8899be594aa728ab5b4fd468dc05de6450cdc98935dc98d4ae16ae02b1c433d994b1607f3b70afc469856baffa9ddc6e0e03acb9451b09692c610b0098ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56e5cd04da207d4d135c1ffa82ce4d3e1
SHA1df9ac2811e20edb228c756b6ade79f4cf7cc9382
SHA2569d4f57a636ed4bc82bf78010f8024675da8ea777b9932097a6a2661e80d8a620
SHA512516ce3fb457e142f116cece9ff419e7f14d44bdef788083f94524f12c36e16c7dfa0877d9edb29c65d4799cc574d570a1b6693c7a88b003a86ebe59b922635a8
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A1134731-2BA8-11EF-BEA9-FE29290FA5F9}.dat
Filesize5KB
MD52c4c7cf05e63ce53fceac6c36856e4ef
SHA1537ef0d5e69ac92fd8fc4b54dd38d307d12af858
SHA256d821753d79cd3dafe5dc4f347441e465414e05bcbcb732716d7c3076f5de52d1
SHA51289366fe8f4b3ccce1d49d2e5a77b91d1d067cb1874f5e1b66d2cd3d5d2fd77add094e92de38ec2ec774c9c4890aad1998285dd8e50f2a7c4aaaccc103194674e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8FO28TZ9\favicon[1].ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD56e4ac0e730a84d98a9f5977561af5847
SHA1abc74807b9461e2cbf9da1c576853a987710722b
SHA256b8950c08b48f91431e479fec94b784ba761142d7a99c2dec9516214b05526416
SHA51223a5deda28cf3f268387163da275af2f4fdbcf1b0d9710e12cc40c0a34c8d3f7cf6b7a6e4d26b45c7917c33d03afbfba5b3e5916e052b4fdf8de71d3e8f2da54
-
Filesize
350KB
MD5b21a8247fed6d7f3fb9fa89016a5f41d
SHA19227062dc0a62e4fa0284ad521a56c373c34ffde
SHA2562d63a0d8ece25bdb093098fe7569c973ada10927387ee288b87030e5765f514b
SHA51268c0342db819d8df9bddce9c23a2552cfa6d72e24ff54c3ed922a4388e698c0c6e3cee8688c905564540141ea32d3e26e8acc49b5412aadd526aea93fe5f7fa7