Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 06:50
Static task
static1
Behavioral task
behavioral1
Sample
fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe
-
Size
503KB
-
MD5
fdff4ed0acf0928a12a6a282c3fe5412
-
SHA1
82e1b9434961db4807348c1077fd0bbbab2079d2
-
SHA256
26531a27ea4a0049d4c46845968ecb0ad08d411e8ac845642b1e4089fbbf3bd2
-
SHA512
eb37a86f6d9ed1b447a2dee32159464c78e38cbc64700887c9fa39674829211744b9484d193d712baff74dc94ef42cbaea879e3ce691aa279faa92c245909b50
-
SSDEEP
3072:uSfsMLnYkHyb2Hz9aQkf7kXv9Dpva/X7CRRAiVuD:uSfPNH/HcQkTWpvAX7TiVQ
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.xmfir0.win/B0C8-686B-FFCF-0063-7CD0
http://cerberhhyed5frqa.gkfit9.win/B0C8-686B-FFCF-0063-7CD0
http://cerberhhyed5frqa.305iot.win/B0C8-686B-FFCF-0063-7CD0
http://cerberhhyed5frqa.dkrti5.win/B0C8-686B-FFCF-0063-7CD0
http://cerberhhyed5frqa.cneo59.win/B0C8-686B-FFCF-0063-7CD0
http://cerberhhyed5frqa.onion/B0C8-686B-FFCF-0063-7CD0
Extracted
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16390) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1516 bcdedit.exe 2316 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\\iscsicli.exe\"" fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\\iscsicli.exe\"" iscsicli.exe -
Deletes itself 1 IoCs
pid Process 2548 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\iscsicli.lnk fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\iscsicli.lnk iscsicli.exe -
Executes dropped EXE 1 IoCs
pid Process 2620 iscsicli.exe -
Loads dropped DLL 3 IoCs
pid Process 3032 fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe 3032 fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe 2620 iscsicli.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\iscsicli = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\\iscsicli.exe\"" fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\iscsicli = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\\iscsicli.exe\"" fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\iscsicli = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\\iscsicli.exe\"" iscsicli.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\iscsicli = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\\iscsicli.exe\"" iscsicli.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iscsicli.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpF49C.bmp" iscsicli.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iscsicli.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1376 cmd.exe 2200 PING.EXE 2548 cmd.exe 2592 PING.EXE -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2484 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 1308 taskkill.exe 1544 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Control Panel\Desktop fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\\iscsicli.exe\"" fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Control Panel\Desktop iscsicli.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\\iscsicli.exe\"" iscsicli.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4386C091-7E2F-11EF-91F6-D6EBA8958965} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502932063c12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{437AD9B1-7E2F-11EF-91F6-D6EBA8958965} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433754561" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000025d00367897fcdde42a4c5af41da8d97db6c09d1c00961cb16ab30482fd1dfe000000000e80000000020000200000001a0e1312f534017f7da9b1e2bc9192d2a1f82f4c05714c843616b156a9d443d1200000004cac01005e9c3ef235db98db9b5f428c780794d906d8091193cd7bbecf84c1af4000000009aef9e2f9f3df976cef1df415c23b904b42d517987ec62458dd9192a9056d59c76a6b36a89e2fc899bc140df68e489a49d03a2cfffd5a26fe6c0d214543e758 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2592 PING.EXE 2200 PING.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe 2620 iscsicli.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 3032 fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe Token: SeDebugPrivilege 1308 taskkill.exe Token: SeDebugPrivilege 2620 iscsicli.exe Token: SeBackupPrivilege 2472 vssvc.exe Token: SeRestorePrivilege 2472 vssvc.exe Token: SeAuditPrivilege 2472 vssvc.exe Token: SeIncreaseQuotaPrivilege 1152 wmic.exe Token: SeSecurityPrivilege 1152 wmic.exe Token: SeTakeOwnershipPrivilege 1152 wmic.exe Token: SeLoadDriverPrivilege 1152 wmic.exe Token: SeSystemProfilePrivilege 1152 wmic.exe Token: SeSystemtimePrivilege 1152 wmic.exe Token: SeProfSingleProcessPrivilege 1152 wmic.exe Token: SeIncBasePriorityPrivilege 1152 wmic.exe Token: SeCreatePagefilePrivilege 1152 wmic.exe Token: SeBackupPrivilege 1152 wmic.exe Token: SeRestorePrivilege 1152 wmic.exe Token: SeShutdownPrivilege 1152 wmic.exe Token: SeDebugPrivilege 1152 wmic.exe Token: SeSystemEnvironmentPrivilege 1152 wmic.exe Token: SeRemoteShutdownPrivilege 1152 wmic.exe Token: SeUndockPrivilege 1152 wmic.exe Token: SeManageVolumePrivilege 1152 wmic.exe Token: 33 1152 wmic.exe Token: 34 1152 wmic.exe Token: 35 1152 wmic.exe Token: SeIncreaseQuotaPrivilege 1152 wmic.exe Token: SeSecurityPrivilege 1152 wmic.exe Token: SeTakeOwnershipPrivilege 1152 wmic.exe Token: SeLoadDriverPrivilege 1152 wmic.exe Token: SeSystemProfilePrivilege 1152 wmic.exe Token: SeSystemtimePrivilege 1152 wmic.exe Token: SeProfSingleProcessPrivilege 1152 wmic.exe Token: SeIncBasePriorityPrivilege 1152 wmic.exe Token: SeCreatePagefilePrivilege 1152 wmic.exe Token: SeBackupPrivilege 1152 wmic.exe Token: SeRestorePrivilege 1152 wmic.exe Token: SeShutdownPrivilege 1152 wmic.exe Token: SeDebugPrivilege 1152 wmic.exe Token: SeSystemEnvironmentPrivilege 1152 wmic.exe Token: SeRemoteShutdownPrivilege 1152 wmic.exe Token: SeUndockPrivilege 1152 wmic.exe Token: SeManageVolumePrivilege 1152 wmic.exe Token: 33 1152 wmic.exe Token: 34 1152 wmic.exe Token: 35 1152 wmic.exe Token: 33 1668 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1668 AUDIODG.EXE Token: 33 1668 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1668 AUDIODG.EXE Token: SeDebugPrivilege 1544 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2732 iexplore.exe 948 iexplore.exe 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe 948 iexplore.exe 948 iexplore.exe 2732 iexplore.exe 2732 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3032 fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe 2620 iscsicli.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2620 3032 fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2620 3032 fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2620 3032 fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2620 3032 fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2548 3032 fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe 31 PID 3032 wrote to memory of 2548 3032 fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe 31 PID 3032 wrote to memory of 2548 3032 fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe 31 PID 3032 wrote to memory of 2548 3032 fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe 31 PID 2548 wrote to memory of 1308 2548 cmd.exe 33 PID 2548 wrote to memory of 1308 2548 cmd.exe 33 PID 2548 wrote to memory of 1308 2548 cmd.exe 33 PID 2548 wrote to memory of 1308 2548 cmd.exe 33 PID 2548 wrote to memory of 2592 2548 cmd.exe 35 PID 2548 wrote to memory of 2592 2548 cmd.exe 35 PID 2548 wrote to memory of 2592 2548 cmd.exe 35 PID 2548 wrote to memory of 2592 2548 cmd.exe 35 PID 2620 wrote to memory of 2484 2620 iscsicli.exe 36 PID 2620 wrote to memory of 2484 2620 iscsicli.exe 36 PID 2620 wrote to memory of 2484 2620 iscsicli.exe 36 PID 2620 wrote to memory of 2484 2620 iscsicli.exe 36 PID 2620 wrote to memory of 1152 2620 iscsicli.exe 40 PID 2620 wrote to memory of 1152 2620 iscsicli.exe 40 PID 2620 wrote to memory of 1152 2620 iscsicli.exe 40 PID 2620 wrote to memory of 1152 2620 iscsicli.exe 40 PID 2620 wrote to memory of 1516 2620 iscsicli.exe 42 PID 2620 wrote to memory of 1516 2620 iscsicli.exe 42 PID 2620 wrote to memory of 1516 2620 iscsicli.exe 42 PID 2620 wrote to memory of 1516 2620 iscsicli.exe 42 PID 2620 wrote to memory of 2316 2620 iscsicli.exe 44 PID 2620 wrote to memory of 2316 2620 iscsicli.exe 44 PID 2620 wrote to memory of 2316 2620 iscsicli.exe 44 PID 2620 wrote to memory of 2316 2620 iscsicli.exe 44 PID 2620 wrote to memory of 2732 2620 iscsicli.exe 47 PID 2620 wrote to memory of 2732 2620 iscsicli.exe 47 PID 2620 wrote to memory of 2732 2620 iscsicli.exe 47 PID 2620 wrote to memory of 2732 2620 iscsicli.exe 47 PID 2620 wrote to memory of 2780 2620 iscsicli.exe 48 PID 2620 wrote to memory of 2780 2620 iscsicli.exe 48 PID 2620 wrote to memory of 2780 2620 iscsicli.exe 48 PID 2620 wrote to memory of 2780 2620 iscsicli.exe 48 PID 2732 wrote to memory of 2496 2732 iexplore.exe 50 PID 2732 wrote to memory of 2496 2732 iexplore.exe 50 PID 2732 wrote to memory of 2496 2732 iexplore.exe 50 PID 2732 wrote to memory of 2496 2732 iexplore.exe 50 PID 948 wrote to memory of 2932 948 iexplore.exe 51 PID 948 wrote to memory of 2932 948 iexplore.exe 51 PID 948 wrote to memory of 2932 948 iexplore.exe 51 PID 948 wrote to memory of 2932 948 iexplore.exe 51 PID 2620 wrote to memory of 836 2620 iscsicli.exe 52 PID 2620 wrote to memory of 836 2620 iscsicli.exe 52 PID 2620 wrote to memory of 836 2620 iscsicli.exe 52 PID 2620 wrote to memory of 836 2620 iscsicli.exe 52 PID 2620 wrote to memory of 1376 2620 iscsicli.exe 56 PID 2620 wrote to memory of 1376 2620 iscsicli.exe 56 PID 2620 wrote to memory of 1376 2620 iscsicli.exe 56 PID 2620 wrote to memory of 1376 2620 iscsicli.exe 56 PID 1376 wrote to memory of 1544 1376 cmd.exe 58 PID 1376 wrote to memory of 1544 1376 cmd.exe 58 PID 1376 wrote to memory of 1544 1376 cmd.exe 58 PID 1376 wrote to memory of 2200 1376 cmd.exe 60 PID 1376 wrote to memory of 2200 1376 cmd.exe 60 PID 1376 wrote to memory of 2200 1376 cmd.exe 60 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\iscsicli.exe"C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\iscsicli.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2484
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:1516
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:2316
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2496
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:2780
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:836
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "iscsicli.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\iscsicli.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "iscsicli.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2200
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe" > NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "fdff4ed0acf0928a12a6a282c3fe5412_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2592
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:948 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2096
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1668
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5bfdb85e90ac64e9b76fc6c3138a5ba86
SHA1b48e40cbd93b141c91e99271d57522635eae8453
SHA25693fd95ef0b0805f9c5082ef6df8515cff9d43df882be9ad0e1b7d5fa30ef1857
SHA512ac930be2a7e8280769204c08e0aa25fbdbe99086fbdf3492af9fa4af8654f7f405b35aa800b44ce2d2ce1a3f2b57680f1e374b82c30ed56ca355c60eb0b6693e
-
Filesize
10KB
MD589ed1bbde5d3a363b7f6e325103d66b0
SHA11b3c697e013d1ba9709fc82984b31488bbcd2734
SHA256a55f3b6668e7e406a339442b17ca6e2a14ee7f5f67ebf8a67bdad47277814e9c
SHA5123afad1cc1c245dd106bc9b8105bc5e3f98f65ab94c291be6c505f0e8d7b0bb8dbda6fbb75c98387dbbcec5541ca9e0f24ca032fe1311efe0af5dae3fe7c7b2d7
-
Filesize
85B
MD53aee6622691353a1e404f5718cbb1fd8
SHA1098d6fe30ec25297bbfb95badb2301c2d3c2fe6b
SHA256d80020d26cf6bae7291015d9dc15a0a57f1211c0f0bc5691289b5264ae880e27
SHA512ae760f2fa4a58c3c4c0c56bf02f55b4a3657879f87c4bc018d2884e344a893670fa0355b9a0842f0bf825182f1fc4fec5ad346cc2762c60dae758f57effaaa1b
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af333760a884aa158a5acfbb0fd1cde
SHA1618aed0fc5bd158b6a9fc3743f0a4b1f85706a4e
SHA256321c28c9574373f55e6ff7e84219e77a70c99c5f2ef7143d714a4fa49693be56
SHA5121eb97f33f4d524faf935c53c660cee41a23c9f68d8f2f62c81a3fb64013212030c750edd440e5a1adfad8790732825bcb7da10d1e5e8698744d57afa11542043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c13cac2a15b4d67d047c6fbae9bdbdc
SHA12d21c1bcd7809cc7be01fe64c61ae5061f15cbe2
SHA256a58e5cddf08313d37ea2a8d4ff1f6405e973d671191f20333b2c0c284ebd389b
SHA5122843662c38bf13ebf63e97f0ffbcdfd2fb8c98130acab687159cd5b646f7f6196f0b84eb645338f801b9a022f443a0691c90a3ffde5c6925ea23950246c9a3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389fc41747c08d1eed5490c945d994c8
SHA14987572b79d9f67c9aff462b9b10601240fb62c9
SHA2564fe677674de6ac627e8e732ff0a85cc77e68669360648f74d39f3bcd7138354c
SHA5120bc2a8a9349aedf8984a602bf522166dbe793cee3da0a9d1ac56ad9ed73f58556ade764f8dc324e7905849c1850b3444e00206c05d0f70e0c57703a5ede44e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5808ed22fe769677ce5c3407ec282cf45
SHA10d6331272b68817eb66567cf8df71bf13b290548
SHA256ebbeb3b7c278e8b5fa9ad9c3b01392884d5cd3b0dc02a5a1e5c3d007bb3c2c98
SHA5122c3aef701ca02bedcecac2ee720bf1712a3a0842eaa508f37709d57a1d0c35f8a2f4fe1d169f9a3a443bc6846d28bb109a04965c10254ebab75eeabd312dfea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda5ea28efde4413c90eee54fef834e9
SHA1b4365e8d831c9b14844762dbc926b0e5ff5f5895
SHA25647c887543149d79559bad506da0892289a7b66bd0b0868a0d70b80a735e2c54f
SHA5126ecb520b09da877e48fb9a669ce3aac9a57ea917059f4c2db23391847b6f3e780bebd1706c26e9a282ac0808e7b5219707644cc075ea4855e51b4f45a4c38f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ef20ef44e8688a350637d8f3dd8bfec
SHA15dff5dd2003745e8035b87c73fb95da74b526ccc
SHA2568315cefc61648515aea0a596de0a7d53c99a157ccf510ea80f7be479a071e130
SHA51203d80d315ef13f2df41ca9afb551b32a18d655bc8289fdb7f6a909c73a5c8f742f30fdaf3b3fb14f4bc435b1994ff6ba1a58f2ec802913e81421e7181fc2085a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adfccb2c9924a995e84a99029fac7319
SHA1d512a606877866ac85a993eb36dadc4f650fca67
SHA256e8a84c2d8cbef6c87bc673d5048477d8d90db0e870a1034691b1147e44ac796a
SHA5125284e482a98a4c3603cc89e2fb6da055b04e833cdefb5eabcbd412ad11c903f20ed7fd95840e65d5d54acb85141bcba734a13457ee7a93aab98456eda8388325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ec01759bd76f3e5bd18b0d8ccd6f29
SHA16d171397eac371931f034d70d6f81b0d3e293b52
SHA256b30202e8aad249c20b0a67f99eca9a4f244db8118210b5589d7c08960bea1d33
SHA512d5470f89fb8031f4132831585776d7a2e4cfbb209a54d9bc98b36583bd3a02d0fd4843dd96817d8dc1aab5955e3d59bf8c56963f4b19f759409259b8752a6c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c6bc8b005768587b0368187fa4a3555
SHA1e6b619b0650bb21b4a4a7915649fcbca4f492e33
SHA2565c03519ca35d6991843f7a194b0bc9578ece67aeb992fdf3cf2f69ccaf0e8842
SHA512077a000bf7d4e360f55fc9493ef5689e31b3e4bc6dbb763e0574188bde1bcca1a2e95414150e2806f14ec11c16cd403ef3deaf9182061c67be273ff4c8d81519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec48a50d56df3467d5b269e70470bc8e
SHA1ec3c15ce6eed219da0a49ecea5d4b34530e61c39
SHA25609cf67bf633f761877538ed67335ead211f03543c7e8b407c32d81cbb530aa97
SHA512559a3da6bc850d1114c4d58147c2ad0f8c3d09d84767fb865c64369089fbb5d7d6c3c882d0f8e8f34aa3f00f7b011d44fb9858c1950df8723652d944937bf45c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54255b00f6edf02a34b6e23343e5292d3
SHA18d33431c506ac19a5c0fca4db1fc388a9698da4b
SHA256b74f8e46b79be9c6ca7d1b1103757b1a49fc6df469692208a191fa75f577abbf
SHA512a72fe98a07093eb4eeff5c8406cf861285d11390113c164fde92c69258e4c37e189260bad2dbc8c9dfce0c2bc87c4dc2b302a9aba9e424b46ec9edacecda4c82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240bb85395cd28f13d5d18cbfbef907c
SHA1acf85c6a3512daffe2ab69c3db548d56a966ca5c
SHA256ff1f2c39d203dea1eeaf6d362e40d582a28dd94823cdbe350a338fdb90dca8b1
SHA51258be548b17f8ef6067b56d733aa2d377ee71ce7f4532e8695ff87446ddd9b7e6437ea41e2d1b688f113c7f3f508dd9f17b163736fbdac2a9e6e7440b51adf11a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5484cb1ae992de790dab3bae30646222a
SHA1f922701cbc28443caf4a1cf75afe32100fc450ae
SHA25695dbf2142bed2b30e66f449ffe2e516f30c7b35662376ae63e9fed03c853733f
SHA512f252c7b3857938ede35045d3f04d5530d23d244373d87e3fc0616cf7392d199634d64a3811a856a011936cc504cea1f00d595681855c4fa00d82194e3ca90a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd623e7025b5f37ff3e181ccda1f6b6a
SHA16952ff13bd01c1be1cb800e03053c4582eed906e
SHA256f9af041e61578cfb93048e74360d3657374f59f94a40f79db729dfee71d61434
SHA512303f4ff39e10294ca9185946f4b19f51848fd972d53755d8add81773e44bca3f11e4fbbb2d7ca81353d7b427a7fc92cbbed8b28c5dc86c8a99c841bc8c7c0338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550343498349fc3a36c13dfd18a47409a
SHA1a776fc509f9181d3ecee198a742f1736292f4172
SHA256c33cc7b837a66d72a1b97da9e19849d7946ee57644c4e83d78d981bf142cc125
SHA512ed1dd5c9d0783bffadcb7ba85922238794dba4f801d124f302a4d3ba017c3b1b54bd65b58bd43532f5817a15d0681ed573ab360dda60ff55e28f82bf9a622f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5060ae63f14006965b156122ad905df75
SHA1df65a48b682c1a5622972b13b2888456a6b44b4a
SHA2561853e6beb978ebdd06d581e292c0c5fff4156683e7bc0b1617a9c382b5269d84
SHA512ed01c114a997bdba35b0c158c9ccda88a4df1580f1885fd38429c3285b539a5888362721bdd19d338646cf34493aad25fa67adc5996ce9b5fd07e8dac697e99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efe4a197d20d343098656328aaa42b12
SHA1140e83aa6b8f1e1fc38428a91a09dba857839d2a
SHA256f2e5e1493ee1dc6ff02230e97603252b509a01e3782fb9398bf865ce05f9a554
SHA512665e185b40d6ff39e8115ae5742de5b912d944f9cd2bdfbc613dc2115746f96925eed2d9f5f02d75d9d0a1e7d9a0ae929e0be5f7d4a62b22baac00bbaa597f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505668365ad4c0acc98da37b526194878
SHA1e6854b678b3f4179336d17d7861622d8531020a3
SHA2562f80dd4ac738310b500a1af5b52a5dfb256d80b2941e7855d8cabe5a9fe605c4
SHA51220dc05c00963b337750584ee5a5a01b8e32a34c44bae6f193a27d06aee6c83b8616963223702074b60a040ace2fb5c4f402605d70feede61ca51b5619130c35b
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{437AD9B1-7E2F-11EF-91F6-D6EBA8958965}.dat
Filesize5KB
MD5f0f7c601869de8961be4b5ac817ce112
SHA176796ecba9f0621d0b56a36e37f8f04e329415ed
SHA256410b2b1e6fa0ccc94292d234edb1df7df02f69e3488455eeb75b0fce6f83c671
SHA5128f12072f7954bacadee73689ce54e74e46558897084ee9a127656154022ba905fea7de4fd4f668e75be69a825b67f05c021f6a339a8d0b6689f6c7adbebf91ca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD5daf8088ef9741aa1c68e207497208e0e
SHA1bb306717af4cd2acae5b1fe4794622bffd4e49eb
SHA25645f666347aecd571c2637351b1d7ffe0dcb72aa10e7c6cbd319b6f1f5419d67b
SHA512bbf336f844369cbb27c75593167f03e7d5ceff2b1e40ae10edeb4031eb8c40499741d1e5c7795411ba9c21dea79835b8cdf60f57dcbc724bcb474cb27d3ae3d8
-
Filesize
503KB
MD5fdff4ed0acf0928a12a6a282c3fe5412
SHA182e1b9434961db4807348c1077fd0bbbab2079d2
SHA25626531a27ea4a0049d4c46845968ecb0ad08d411e8ac845642b1e4089fbbf3bd2
SHA512eb37a86f6d9ed1b447a2dee32159464c78e38cbc64700887c9fa39674829211744b9484d193d712baff74dc94ef42cbaea879e3ce691aa279faa92c245909b50