Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 13:12
Static task
static1
Behavioral task
behavioral1
Sample
b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe
-
Size
216KB
-
MD5
b8ca0108f4ae400ebb7169e7cee05f4c
-
SHA1
710b305e72129ad1ff69f9434f27f64298060292
-
SHA256
7a6dea9a1f132fb60fda6b9ab1c821189881d093a64dc62f7903c2a819cb7adb
-
SHA512
e1836c66940f82c95b5f9d97a511b0b3910b89416bd59523ad4bc442c016cfad00e58789d2a0cb52ccaf127d46073574c9e68f2790880832b541969f57cbf7af
-
SSDEEP
6144:SwHysFRnGrHQAVUHjzIOh4OzRk1oOJ4CSrZ:JFRnQVU3IKM1JiZ
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://52uo5k3t73ypjije.xmfru5.top/C349-AA5C-5FE9-006D-F69D
http://52uo5k3t73ypjije.deg5xr.top/C349-AA5C-5FE9-006D-F69D
http://52uo5k3t73ypjije.vrid8l.top/C349-AA5C-5FE9-006D-F69D
http://52uo5k3t73ypjije.hlu8yz.top/C349-AA5C-5FE9-006D-F69D
http://52uo5k3t73ypjije.onion.to/C349-AA5C-5FE9-006D-F69D
http://52uo5k3t73ypjije.onion/C349-AA5C-5FE9-006D-F69D
Extracted
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\MRINFO.EXE\"" b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\MRINFO.EXE\"" MRINFO.EXE -
Contacts a large (518) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid Process 2452 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\MRINFO.lnk b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\MRINFO.lnk MRINFO.EXE -
Executes dropped EXE 2 IoCs
pid Process 1800 MRINFO.EXE 1780 MRINFO.EXE -
Loads dropped DLL 5 IoCs
pid Process 2512 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 2512 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 1044 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 1800 MRINFO.EXE 1800 MRINFO.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\MRINFO = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\MRINFO.EXE\"" MRINFO.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\MRINFO = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\MRINFO.EXE\"" b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\MRINFO = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\MRINFO.EXE\"" b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\MRINFO = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\MRINFO.EXE\"" MRINFO.EXE -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MRINFO.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp2C9C.bmp" MRINFO.EXE -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2512 set thread context of 1044 2512 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 28 PID 1800 set thread context of 1780 1800 MRINFO.EXE 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x00060000000161e7-59.dat nsis_installer_1 behavioral1/files/0x00060000000161e7-59.dat nsis_installer_2 -
Kills process with taskkill 2 IoCs
pid Process 2480 taskkill.exe 1820 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\MRINFO.EXE\"" b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop MRINFO.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{04E11A53-556B-582E-C494-323BC9541A7E}\\MRINFO.EXE\"" MRINFO.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424791889" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6A74CCE1-2CAB-11EF-87C3-6E6327E9C5D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d8cc7bf0365ae542b3373a451c4069aa000000000200000000001066000000010000200000006e83d3d919fc0a16022501ecb651160bf8e212749b31f7c3b0367c93507e4c79000000000e80000000020000200000002548a48f0c8d7cd8348bacfc44e3acf038bc378fb37dbf1df5c05d5e42e19a5320000000e0cb34c7321ee2a4cadbf7e15cbf031509d862115ce35c97b6b2b8f6de29c8f740000000bb9038315d2741933a445868e2845bd692eed5a5e63ab252632429ecc82974dba3d676f9c334f50ccc13c991df3e638a659185b200ec447fb1ee912385cbcb16 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6A8EFC01-2CAB-11EF-87C3-6E6327E9C5D7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b1352db8c0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2756 PING.EXE 540 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE 1780 MRINFO.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1044 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe Token: SeDebugPrivilege 2480 taskkill.exe Token: SeDebugPrivilege 1780 MRINFO.EXE Token: SeDebugPrivilege 1820 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 2576 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 1628 iexplore.exe 1628 iexplore.exe 584 IEXPLORE.EXE 584 IEXPLORE.EXE 584 IEXPLORE.EXE 584 IEXPLORE.EXE 2576 iexplore.exe 2576 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 584 IEXPLORE.EXE 584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1044 2512 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 28 PID 2512 wrote to memory of 1044 2512 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 28 PID 2512 wrote to memory of 1044 2512 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 28 PID 2512 wrote to memory of 1044 2512 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 28 PID 2512 wrote to memory of 1044 2512 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 28 PID 2512 wrote to memory of 1044 2512 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 28 PID 2512 wrote to memory of 1044 2512 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 28 PID 2512 wrote to memory of 1044 2512 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 28 PID 2512 wrote to memory of 1044 2512 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 28 PID 2512 wrote to memory of 1044 2512 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 28 PID 1044 wrote to memory of 1800 1044 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 29 PID 1044 wrote to memory of 1800 1044 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 29 PID 1044 wrote to memory of 1800 1044 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 29 PID 1044 wrote to memory of 1800 1044 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 29 PID 1044 wrote to memory of 2452 1044 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 30 PID 1044 wrote to memory of 2452 1044 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 30 PID 1044 wrote to memory of 2452 1044 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 30 PID 1044 wrote to memory of 2452 1044 b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe 30 PID 2452 wrote to memory of 2480 2452 cmd.exe 32 PID 2452 wrote to memory of 2480 2452 cmd.exe 32 PID 2452 wrote to memory of 2480 2452 cmd.exe 32 PID 2452 wrote to memory of 2480 2452 cmd.exe 32 PID 2452 wrote to memory of 2756 2452 cmd.exe 34 PID 2452 wrote to memory of 2756 2452 cmd.exe 34 PID 2452 wrote to memory of 2756 2452 cmd.exe 34 PID 2452 wrote to memory of 2756 2452 cmd.exe 34 PID 1800 wrote to memory of 1780 1800 MRINFO.EXE 35 PID 1800 wrote to memory of 1780 1800 MRINFO.EXE 35 PID 1800 wrote to memory of 1780 1800 MRINFO.EXE 35 PID 1800 wrote to memory of 1780 1800 MRINFO.EXE 35 PID 1800 wrote to memory of 1780 1800 MRINFO.EXE 35 PID 1800 wrote to memory of 1780 1800 MRINFO.EXE 35 PID 1800 wrote to memory of 1780 1800 MRINFO.EXE 35 PID 1800 wrote to memory of 1780 1800 MRINFO.EXE 35 PID 1800 wrote to memory of 1780 1800 MRINFO.EXE 35 PID 1800 wrote to memory of 1780 1800 MRINFO.EXE 35 PID 1780 wrote to memory of 1628 1780 MRINFO.EXE 40 PID 1780 wrote to memory of 1628 1780 MRINFO.EXE 40 PID 1780 wrote to memory of 1628 1780 MRINFO.EXE 40 PID 1780 wrote to memory of 1628 1780 MRINFO.EXE 40 PID 1780 wrote to memory of 344 1780 MRINFO.EXE 41 PID 1780 wrote to memory of 344 1780 MRINFO.EXE 41 PID 1780 wrote to memory of 344 1780 MRINFO.EXE 41 PID 1780 wrote to memory of 344 1780 MRINFO.EXE 41 PID 1628 wrote to memory of 584 1628 iexplore.exe 43 PID 1628 wrote to memory of 584 1628 iexplore.exe 43 PID 1628 wrote to memory of 584 1628 iexplore.exe 43 PID 1628 wrote to memory of 584 1628 iexplore.exe 43 PID 2576 wrote to memory of 2900 2576 iexplore.exe 45 PID 2576 wrote to memory of 2900 2576 iexplore.exe 45 PID 2576 wrote to memory of 2900 2576 iexplore.exe 45 PID 2576 wrote to memory of 2900 2576 iexplore.exe 45 PID 1780 wrote to memory of 2804 1780 MRINFO.EXE 46 PID 1780 wrote to memory of 2804 1780 MRINFO.EXE 46 PID 1780 wrote to memory of 2804 1780 MRINFO.EXE 46 PID 1780 wrote to memory of 2804 1780 MRINFO.EXE 46 PID 1780 wrote to memory of 3016 1780 MRINFO.EXE 48 PID 1780 wrote to memory of 3016 1780 MRINFO.EXE 48 PID 1780 wrote to memory of 3016 1780 MRINFO.EXE 48 PID 1780 wrote to memory of 3016 1780 MRINFO.EXE 48 PID 3016 wrote to memory of 1820 3016 cmd.exe 50 PID 3016 wrote to memory of 1820 3016 cmd.exe 50 PID 3016 wrote to memory of 1820 3016 cmd.exe 50 PID 3016 wrote to memory of 540 3016 cmd.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\MRINFO.EXE"C:\Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\MRINFO.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\MRINFO.EXE"C:\Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\MRINFO.EXE"4⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:584
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:344
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:2804
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "MRINFO.EXE" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\MRINFO.EXE" > NUL5⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "MRINFO.EXE"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- Runs ping.exe
PID:540
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe" > NUL3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "b8ca0108f4ae400ebb7169e7cee05f4c_JaffaCakes118.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:2756
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1560
-
C:\Windows\system32\taskeng.exetaskeng.exe {CE52C8EA-63D0-44C3-ABDC-EE0F1B87719A} S-1-5-21-1298544033-3225604241-2703760938-1000:IZKCKOTP\Admin:Interactive:[1]1⤵PID:1708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234B
MD56f84dbf74ef41dc3d861f5fb3e0f45ff
SHA13e5f17e9b9589f33ce6add7f2518a666ff2253a4
SHA256df5f432d7e0d2bd1c4dddb1fabbf1e77bd1065b9020f71abaf1a45fbb950bbb8
SHA5129f9ec25b815be7b20df26244d31848c9a4896b130241b63636d63511a290eaad78d289a9bb04592c0ba31492064671351b4c7359310f03469e27764132a20a5a
-
Filesize
12KB
MD5a960756cfe3f9e4dcbbc4aa25a3c4c9f
SHA1451955dfea3a1064a25cc2c19e4aa5f8371b028a
SHA256ca5672f3b48c5bf471d81e957f3765a8f5a45f91bc201c293e4211346b862d9f
SHA512c1931d5d75847932ad2607619027d618b6abbe2185d55ff3d4b039e537afdb6295f44fc14b608fa70250000be5fe24c461cc7445fc8b8fac685829e0fcf00ef8
-
Filesize
10KB
MD55e762a202184f84b44bcf817c61d486a
SHA1f1b9d2331195974b09d22e05586046d2882e054a
SHA25697d44d319fb25beb6f1fd6442684eede802446ae8a5bee1b93eecd30966f3194
SHA5125d4dc4656fa117934928b40fa9e7cc020152b08350b3312dd42124bdbb3e8cfd14d17946a10f3a14d43b88c346c907cc422273cbc10793c25e37ad360f246eb7
-
Filesize
90B
MD5020272bf91f447b8a6d1a0bf839f9d3e
SHA1844fa019009f601902ccd17e11728ad87b627168
SHA256e1729294afbaa357c35873fe384e9be0ccb70a8f1d5f4f85910d8310864c8db0
SHA512ab9bc11fe4ea887b5323bad05925f843d06e81a2b81f037ea2c824f36c10ff0e193019d877aa44cea5db8f030217354aa766dc4c826600d3e652ee6ea04fa3f2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c161dbe5b4de1b2ee801e740d5a946fe
SHA1d5f262237569d934e3f099c295bb83833c4a8fd8
SHA2567af8bb1ac7d11d841e46a886c667b918025f2a048b23efb6ee9136c70e191fa6
SHA512755bb1659f4b29ec1a5248d6cf02d7861cb83d8a98b5d8d5b735146cbb14557365f47aa0b45a0ba6f2f36a9aded55116fde17f60e0c63f1540ea22d1850b89c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556433ce9761768f1c3fcfb4230eac630
SHA1f2e1a30376e8aec62b317dd93410c56a51982837
SHA256dddb7d0faa30f17e98282b112367621893cdd1da2a9213ea3cefa425bb854e48
SHA512d257ee9f979f3a48795a03c0180631bd10d2b5438f834adc4e1dc2bf89dd36c9e81c5da4cbdc6f10ad89563eecfb39e4476c2572ff03fb9196523aee3e71328c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5432d36d098728ff828112dcf05b492b7
SHA1a26ec290f2ec892e9b8b8b67bc54f5e7f279410d
SHA25648db0ea2e75727ba85179814f8afa74b5cadcbfbdff09cffd8c08c88ea15afbe
SHA5126e9878cee4948d7d91fe8fc1b2bae245d0c588744ddc468ee70bbe3aecad8a72bc4c4464001b9d8eb5a8b366618a83160f74c8cfc6a06b8fb7f770d28e363223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a396f013bfbd0e0444b05e6dda276312
SHA1f5c3983efbe9cfe30344c0e466a32d42ccede1dc
SHA256202846dd2e9c03ac240ad0de632cbd62072bd04dbfd1aaf37556fcf8ddc11e8c
SHA5129fb1c93a2ab34f7f96017d0e71363909c609e27b3b5353265edc8cfd08b7821d48d3c5c63b7c98debb4b0f001797cb8aaf5ca1221fa1436f8fb89b609501f601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a51ef4ad97dd87158d9fe7f1cb02a9
SHA1dd3f3b8ea80376182f8cf1cf6262911705a4f13c
SHA256d07789347d48afdb7de60a0baa480a92f1110aca0ef4e939df05233428fc9fbc
SHA5128fc2aefaa018c629f185e19d28e6fe9da2431a41b3d1d41d95d71f5eb40a8df0816b650fb3d421cd02fe7094998d62c3e7bc72a3cbcbbb6ef1c5f55549b4a7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5378212d601c0f69393c9974279a446a0
SHA19baef8e305d4e0c4afb895f99e023804bd83296f
SHA25690029bee8b62cb54228affa9ddfc258fbd5e13c192413b1d04fc5cc5c86b6118
SHA512bf4a5a927bab583fd16d152e46339bf00ea83b378137541a0523a6f6587f8613a32fc7014da58e7dd70c1ff5b6e513e88b271a93d6179243f2b927554f472497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7f206d803a0cb4444a15d683058e5ab
SHA1227105802c5d4c10b2bad94ae152aadc7d03bd54
SHA256c39e87001cdbc015d086c2d5037d27e84e0bd16745716a63e5c499a40e233683
SHA5124baf5a315a471ecb3e2d270602da64da0cf5f7e364a15f23491479196c088589715fa4f966bdfbd7bb1a520bac624312ca6d02c0caccd8a4bc37090f93bd34a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564908be65d048d5d3a149b5bb4ac0ddc
SHA1efcda550f5d4bf05c52ccd6edf19dd23d96e1d1c
SHA256e459be65a1c6a2563964bebc07b3ef22897c73e544cb5a9080ae05adbdf53f4b
SHA5122206a203542c73464476f2abbb1828d62e6c5b23f402a059b3737bb2f015231cb71c380e3024cbe4b555fbb32b23a1f2a58f49b30b229aca9306b9194c759310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a16b5916e7044f035c2fc3df27d9fe8
SHA1d80a47535be4ccd6d8a197838e252e8de767cdd3
SHA2563698d416a58a6126476a4f636bcf7efdf4332f892613b654845e3c032289e330
SHA51258491095b6c199dd2276ab03722c4dd442f4a337b36632cf0e91b6f077c77e4dcfa7f2a0b5480b192a3f8b0bd026882d10ff6b060b24db4d1264557bccc74a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be7799ba14c7e010b60527ec84aee3bc
SHA1a3555fbc4f4d9fcae7f24529b965447fff48e2eb
SHA25689bd22bf86ee5668435e4de7383647eb48885e8982eee2d0bc1e100dd68d6420
SHA5129c86f5c3b968552ddc88213c41f28f500615b0d374e711213995d2fd8b1f2d54c82472c510688418371300e4dd251d75b5deddfa5ad2d806c158b8947c6f7f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e62de312731f622eb7c78a8ee22c59e7
SHA11976813ae8e5449c250573ae5c83c95c09e9cd9b
SHA2560938a23e6b94112b879539e2c28109183cf55f3bc00d0e2098129348b132e820
SHA5128690b7bf7e0c38260f641a7fc760bc0c1793c6c2a59810c7c0e3328552d0f4ea751616b4b35dedb16487bec2f108dfd8a427799aa107cacb5b1a5923ce1f0771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc55fc0b3001c5fda913dc838549fa60
SHA1a00be62dfbd668262bff0189f77b14085b83244d
SHA2560fc85d33730d11286e1fc900566cd1e2de877f9a319ba1fcf763e4e1628c3d25
SHA512c8236930d67c171c38861eb37f017073664b5773c898e4a689e9d34e7098888f84509615af030af3e007a8c938edef5d28647a198b3e8f6d8aa61293059129dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed13950f406a5e25e097f49bb204f311
SHA156f22f2f458838de4bc7f31d496b2d4d1ed2a735
SHA25604076505fc7bdb9413214f5b50a7c0e23caa92a276dacd31b158031e2478ff58
SHA512fa84a6bb18be4cbc1b742721780a83cabb2503872088ff2fa56984c9dcc3af68c172673d611cc05c499fa0e35ab2080172eec7c840c55e2d0a66ac35ef170a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3ba0262b13e3fc8a5e6dfbb3781bb9e
SHA1475de174cbb9800e37d853f92f0a3ca5e1b2f96f
SHA256cc32d73c0dd3ff8ad84472ce1f9315e9fe057a8ab94d164ba06614bb4c6f559f
SHA512a8dc15fb28d8fad394d36929555ac4841769698cff5875d35699074c2a063aae7fb122f9f0756fd4870d39691f6e9a05e9b6cb7677afb2fd101748dc6c703a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1aeb8d9a888bee928fda6a21fa08a51
SHA189b64cb2c8d29e4dab48fe2df0020c1985620c79
SHA256eb3e6dd5e0fdb1a72da064d953d7948fe0ac1adde6911f776858aa67d50ffd26
SHA512763ebe42c8f45d84bf6dd9c4b03a3c260fcb52f95bf28df3f1e631483055dfa5794fefa8abef5fdeff8391f0842871456ee1deaae3fa15a58977a9b7ac944344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5431a66bbf7f906cf6b372c5441183816
SHA1afd570c47013053bee8b2ca1a14bff48d5bb0f42
SHA2561496a13fcb9a7ebee22bfc137c8c03bb19eb20df3ce8649dc564ec06c98eab24
SHA5129319e541db9f3ebe15d1ecdf97583c9c3ba889b83dbd96bef1c951faad0968a4ff48f48c601b59ff5e5c52229f7731dfbdf12832a5e059e950d6a6106d63479e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f45944f4a367e4552bdcbb36ffc512
SHA11d499c4c4ae71eeae2b6972ce83fb044330214a3
SHA256b17da44a03f0e7dd9d6cff368b7ecf83e23e3e7842bade4c768de96e8190ddc4
SHA51299ff3d9d9107e6a59d152c6c236bb918106e501447d580bb1f7683de2e58c42421daf68af08f17996dcd0bad764a1cf49a9ba613b7d5d6e633eafe3fdd0cf682
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6A74CCE1-2CAB-11EF-87C3-6E6327E9C5D7}.dat
Filesize5KB
MD5893aefbab57c346a4e7ca8595e607aa4
SHA1beb07843aa6a4c5342d6ed3bc8d505fefa28a2fc
SHA256dbeb27e8395552cacbaa340dbd84fce6672391a57221d79404634376c4b6825f
SHA5124ba0273e6522636db4d36aed74841ddf6e5fc357f828b45307352dc2bd79584a13a018b6f91f9a493af480919ddc3a05d0e690fba25ccfc51ef5ee4158500793
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
524B
MD5c1499bab3b267f3cae9da5c2bb1d0852
SHA1b3d22f0f91ab2f48797fa87729b1ea62739251c8
SHA2565b0f22c90efa9627d7e16179e0ca713cf596aac5850d776a9c619ae6cc6baaa2
SHA51210bef0c4bdfafc2bf98c6cacea3a3bdc652e028df268111caf42961ac1f89b78c958b6f781d8cd8063e4bf90a231d0efacb2f5ffc2859e71101991d1c23211d9
-
Filesize
1KB
MD5b32ee0da29e26569bd038838f1928528
SHA18d50ef0a8ed90ea61ff3393009e795b3cea4b590
SHA256b560e11a6bb6d7585b216bf2139ab01f36636f9054d26a4179a5b6ca8080ccfc
SHA512f1ef5377936a193465117ccce25e6c4b90628a32eeca1f2a40ae5ebe170389bd41462bca9684916d8809e74da3c208a5a5902e2908982fc52bdbca6618ac6679
-
Filesize
524B
MD50e8a98e6bb6fb3ad5448e3d38bafdca1
SHA1b7ceec34c6f19f4496cd8e3377466803f4e137ac
SHA256dde41f23d522f9a24e972c51c91903649199885a196ea90080ffe7811fdb8708
SHA512ef94207b068b891e17b18226a5e7250275fa8376d30b7f4d7dfa0f66e1698a0ff97b268562754b84a8f0bf3ef01aef7501bdc915f5fd3be20dbb42a027af0868
-
Filesize
85B
MD5313a92eb9dc6f52cf9368d7bdb49f636
SHA1119974836f996a58a14584497d853e3f24b68057
SHA256cde9b6a758da6349dc02027cc178ff4dd2b51676844935d134456bc814b74bdc
SHA51215a851200cea62c693f3ceb03d56e77147aaea7d1019da66ea8cafca627a1316115a523c8f4f2aba9f4869d7e2cceb1e72bd328b7cdb7a11aa3f3f9a7b336d21
-
Filesize
524B
MD5f4c42aaf38232ca3e7047113845d54e7
SHA12ba20b769905bae855a109949ef926945c95aa7d
SHA25655dce613e49d0b7b29883109c38ef4f5db7f1b0a4473b9d5326f73b5e5a18160
SHA51254165d17ebfa2224e7faabcd02c83d6c5ed6c0aee687f4ec6e8c87a4877e3eec50f57ccfb0812c31f17ddda176b592ac0409bacb5c6b8873247c2489d50c2c20
-
Filesize
1KB
MD5e83ab70fbbe4313da354090b019c93d5
SHA1a3706e0604ba7d341646a383017c6dc259c4e29c
SHA25615565a7fb183a4d86ad3d32e01544d01b99cf9feeea31476620317dfd993b01c
SHA512f95b4302c06491b56077d77566752f6a700d95752118c2cb9ae6b50b48a95f6ef8abb2c0b96dbb3ff9bf1ec2a830db66b2c26d9b6124224b6bc93a21d38344fb
-
Filesize
1KB
MD5d712a8597afa11cf28d0388c48970397
SHA10f8460d523dc7efa13c25d2f0d4bd72dd7dbdc6a
SHA2560e588c35ad9344cd2bed21c95732cb94fd252ba77b36fb5ff49eaab3fec2762d
SHA512051642d3cfa09d8b8af5b10bc22837ad98826452fc97fbb8da64efe784746603588df3431c3a905d3bd30daa86258879a4ab54f51b620b97be4d0ce629d9a074
-
Filesize
233B
MD5a1e91923c47567f6a6e8b4759efbdce8
SHA196472c46cc0d85901b0612b27e6ed1b927310534
SHA2563947884f27876aba39f268da374a8aadffe79eb7068e85c1d244487294e132ec
SHA51226cf0f0e925b4da8f49fea549c95d171e2c771057c52948679efd17ec821bc1e7774cf78ca08dcc60adf2cb449da67526f6077f0b0f582ab5126f5a743729e13
-
Filesize
127KB
MD530815aa3f29a08a5789be3d1ed5c7075
SHA14537969a7de49d0eeefd538d82a4328891911966
SHA256884bc6651ff7ad799a12fd2c94d2761b20c5a4bc92ed3f159274c123db4abe54
SHA512cc5292b15b6d078ab7cf4d2acf8b02b8f7890d485fdfb9036b714aaf2ef10da55e219d98cab5eb1489cd72f869a70fa0b68e6d5c5b11b301a1ca4924d9374bf3
-
Filesize
2KB
MD5f9ae5583a287146f0d87eeb7c35af94c
SHA188ce5650c88cfd3143757448a33ab480001c831a
SHA256da8d05e61efa2f72434ce673c8e80778a7dc0f5f8edaa66d0d4df45392e6b4df
SHA5122166532e0b911aa9d662356859cff6ab3e427901230b4650d1373d9a85edeaa16bce86cd44e310ba205838060bc6f66698734c310b51a3d6ae7f6796e508967a
-
Filesize
1KB
MD5e1c31b05c013384503d81ea2ad64a0ff
SHA1e419b033f6ae8b3034f8e80ed026963b6b6631c3
SHA256f0f1d0f23f9cbcddece90d313c4aef00fae6b0abc73986caf40b3f591cc19d0b
SHA512a60f2c8ec1df872a7bd543267879bc6d3d3d242fce0f56dd4a67d3a40fb2be1cc3ce9ca7a92c057f29d817c3c8b4a0cc59b3b25d4c4aabe5cb4f1505d6da8f24
-
Filesize
5KB
MD5cf5b996326404d95e56e56c6095fbf8f
SHA1c3a1cad85e50dd01ad358e5233cc656fd7781395
SHA256feda19c2b46dcd7cb8d33bd10e6aba57085cd679c1eb22081a2d03a141925840
SHA512cba18ee5588a007272673099faf9f7b515ef4b962994823ea986df341af8559ea4868981ff4469c008a6407e5197584449d619dc2d017d8aaf149df59ae06621
-
Filesize
4KB
MD5ea8786a9e8c53d4136b57da721d3a530
SHA1ee83b68c4c9f40b3d3eb4a04f61d9952d7513a0e
SHA25685835a7c2f33dd24fd15d48f288ef0a8e07745611a08bfe6dcb9b8f547321f2c
SHA512b7e4095ed87a7dd922a6a5afbb02acd7e4761c03645819a6c8690b56296f8839db2e355a1bb83d243a42fad4e5400a6f873f8d6caf9a1eee9c6fd86951511016
-
Filesize
2KB
MD5395c2be15da5e47505ce16f2b3dfeae3
SHA1f26d6f1b523c6f58bcdae82c99abd83ebdb6dd7c
SHA25697ffd445a849672e57a3a674af7e86472698f07a319e9354617081eed8ae1e40
SHA512749ca3415332f623c59a21a29342aa6d93e2c1e6979d22e7ebf3ba88e51180e2f3d09edb6270c23a2cc251c76abbfe6b4676f10617e887914b2361251751d12f
-
Filesize
4KB
MD566774a13c8f3917bd188d164749e9637
SHA1505452afdc8c064bd36d520e38f98a6c2b854348
SHA25627fd5c0dff36fdceb96f8dceab5230010c86e94e295625e46f6ab12ba4b7e69f
SHA512fc43cd5f3aaacdf5ee9749f467b9a86fb661340d3e4a47b8b5096b3dd0a69a4f43a7ccd751f451491b66b29bdf787578f6d29bc5a06aaaeff5a4cf862feede9b
-
Filesize
232B
MD50a8dc502c9c3ed9ad092da7363e7bbb5
SHA136150206df0c1054a7cfe034d4bb1d9a7aeeae68
SHA256df768994da3713682658fc9c5f635a981f1566adfa4554f06555cf658b490dc4
SHA5126d2c333748130ffcbdc3e9895c057885ba833d31dc5e43752dd3efa84cd0c2640bcab290252059bb9f63ee75822479b7179c2c6e0bff5179109ff0f8e41d9a80
-
Filesize
3KB
MD5715352b867b82894ee1e3dcb857b8d9e
SHA1e1e14f1298f5c0817b6bcfd12a2495e9595b5f10
SHA256c88fc5d7260ddc763e0146ab6ae64ca31a92edc9efff181ffe84b9305e2e8fe7
SHA512284e47d2c7f7031cd2b1e3a13b231968236777b3fe97f052cb9cf4bbfb69676f2f1f17ae269bf274b71d27e2dfb89d9642f4d815f96eba9d9450ff3f9706727f
-
Filesize
4KB
MD5b730ea0c54af71df0fe2367b746b378f
SHA1d37fa9b16c8d43360807129a48fdd67537f4d323
SHA2560a4a717dcd9cc0d3f7259c237210ee8cae8e3a2368d09f4d4f2d3fb42cca43a8
SHA512437ede4346b3d7f36e0eeca265aead1c8bbf7d92bc65aed05311e0545009073f9ca42f47d3b8426b3305402e0ed8a028494ed02f251bc105bb6642cbd2f8c128
-
Filesize
244B
MD5cca42bd5b580bbc9a4a9dd1528b3cb40
SHA1990b6bfee988f5a48fbdde374a24c8e9879c45ab
SHA256e4808967f2b21eb05a3454b4cd13d8387da753e367177241eb4639614d83b64b
SHA512c14c3afcc9334f8c521142f8414ae26c8572b1b402922d7ae61f07f1505711c95c14e7b4df4770df4fde9d06083b3531d3460f70f3cb5f48b099b55737cd811c
-
Filesize
63KB
MD50385931abab9197608516aae98f1981f
SHA1ede99d3521c822ace97a6ed01f29d20fe094dd9b
SHA2568a22796214b9f883c55e0cce3b4af2c7008761289d9a1bb132161863d8b2654b
SHA51201f41a224832d2455ec81bd3c141eb152d07c7835d13d660ab7a2650d7ff32afcf62fcf2fcf1d266fcc6a2b5cbec1c98ada3b4959efbbe91ca6a10a4db76344b
-
Filesize
15KB
MD5f09d52bb228b40fc77eb02ed341152e2
SHA1d27b4b33090f0adce6eccc20a2c246e05949d61e
SHA2561b405cba59d89a25f111b5251ad4c5953c5fcef92c13f5c212df0f81a3d019ad
SHA5124ad95d4e4d0afa39a798bddf5ad98eae594c0b155ba60a324073df808f3bf5f01e7469770641c9cb84d8572e06031f6ef221850469b2292d0922af495bc5ac8d
-
Filesize
216KB
MD5b8ca0108f4ae400ebb7169e7cee05f4c
SHA1710b305e72129ad1ff69f9434f27f64298060292
SHA2567a6dea9a1f132fb60fda6b9ab1c821189881d093a64dc62f7903c2a819cb7adb
SHA512e1836c66940f82c95b5f9d97a511b0b3910b89416bd59523ad4bc442c016cfad00e58789d2a0cb52ccaf127d46073574c9e68f2790880832b541969f57cbf7af
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
Filesize
25KB
MD5623fe81e0b18bd06f69e1cf75feaf479
SHA180227605564679e2e4ccc6d751d1a963c456b8b8
SHA2568a13c3648c759b83870969e25bee41af6c2253c6b48514b97b37e621fdad1d61
SHA5124f7b9a3924f75091414463e5b138a38b667aea036ab9792e1b9509dec91033a820727a263e59b029a7b8fafbff86aa551d97000b2ce619f4e1f977930bee859b