Analysis
-
max time kernel
127s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 04:48
Static task
static1
Behavioral task
behavioral1
Sample
046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe
-
Size
710KB
-
MD5
046c31b39dfd7efa5529d967d9da0cd2
-
SHA1
a8dcf135677807e411fe238ca3cdb161904f0615
-
SHA256
d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe
-
SHA512
c11c66492e6d20c589bfd41d904782c9a7c9fcd38461e5c7f053cb3d9f4eacacf386eeef1c6b914307c5ef630db5e3a3e8c4ba44bf9711549fbc388334fccc5b
-
SSDEEP
3072:Pk8kRENOocTpQ32pBHfaCIBHK5GkMeW7SX:M84ENO19Q32r5IBqGkQ7M
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.azlto5.win/1814-D8F3-2543-0063-78FC
http://cerberhhyed5frqa.xzcfr4.win/1814-D8F3-2543-0063-78FC
http://cerberhhyed5frqa.asxce4.win/1814-D8F3-2543-0063-78FC
http://cerberhhyed5frqa.45kgok.win/1814-D8F3-2543-0063-78FC
http://cerberhhyed5frqa.ad34ft.win/1814-D8F3-2543-0063-78FC
http://cerberhhyed5frqa.onion/1814-D8F3-2543-0063-78FC
Extracted
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16390) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2880 bcdedit.exe 2212 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7950FA1F-A216-74FE-80F8-918F1AE2C65E}\\ntoskrnl.exe\"" 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7950FA1F-A216-74FE-80F8-918F1AE2C65E}\\ntoskrnl.exe\"" ntoskrnl.exe -
Deletes itself 1 IoCs
pid Process 2688 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\ntoskrnl.lnk 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\ntoskrnl.lnk ntoskrnl.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 ntoskrnl.exe -
Loads dropped DLL 2 IoCs
pid Process 1792 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 2756 ntoskrnl.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntoskrnl = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7950FA1F-A216-74FE-80F8-918F1AE2C65E}\\ntoskrnl.exe\"" ntoskrnl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ntoskrnl = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7950FA1F-A216-74FE-80F8-918F1AE2C65E}\\ntoskrnl.exe\"" ntoskrnl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntoskrnl = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7950FA1F-A216-74FE-80F8-918F1AE2C65E}\\ntoskrnl.exe\"" 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ntoskrnl = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7950FA1F-A216-74FE-80F8-918F1AE2C65E}\\ntoskrnl.exe\"" 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntoskrnl.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntoskrnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2688 cmd.exe 2916 PING.EXE 2948 cmd.exe 1496 PING.EXE -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2888 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 944 taskkill.exe 2896 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7950FA1F-A216-74FE-80F8-918F1AE2C65E}\\ntoskrnl.exe\"" 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop ntoskrnl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{7950FA1F-A216-74FE-80F8-918F1AE2C65E}\\ntoskrnl.exe\"" ntoskrnl.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40085541bd13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000019e6021846dd67bc45d8920453c78cb744794d7e679ce1378b6c3ee3e5b1b30c000000000e8000000002000020000000d74723f31cf6922b56c7d1169716eea743c7bac0305c458bd7269934151eb05490000000a9dea2fb5284feed264955b420236646d2277a8e8938ddc352515a47e07a9456b637780534870885366f51d417e42d871045ddfc90b0859db249e3f7deedc53e279fc82c7ae374c1d1a6ebe839c7f5ebf650e13303df26ba30cb879ad712c783eae288847bfbb8efc6624ebc89cd5d1948d8460ba30eec98909276a10ed3c45b63be5d0baf60a8ded0060b26b822139c4000000057a4c1515864656d4d01227c7ff8bae525cc32b6c61fe48413bc23200467f5f196bae2c5c0a74bc076e5982f092207759d42277919c5c2dc745014ad8c06e9f4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E8381B1-7FB0-11EF-9E5F-7A7F57CBBBB1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000008744da40258bc8f7349b4890fc235e124b107aa3bd54e1696f88213a53753ed4000000000e80000000020000200000000356ee6b43f03c7dcbeb6e469a2002b946e57f81a7fc9e62b24d55e4d1f4c70c2000000094621360a935f5e050eeb3d06be6e7511f8b5bc20d90c407503f35e8b740c772400000009f9f40bdb6adba6b7a6e4b233de3d396a03b639cd1de43da49dfb46a26cb6d117bff3011bb988bf1383b4aa367d895bcd7dfa0483b8265dadb63edb9388c1381 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433920015" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2916 PING.EXE 1496 PING.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe 2756 ntoskrnl.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 1792 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe Token: SeDebugPrivilege 2756 ntoskrnl.exe Token: SeDebugPrivilege 2896 taskkill.exe Token: SeBackupPrivilege 2768 vssvc.exe Token: SeRestorePrivilege 2768 vssvc.exe Token: SeAuditPrivilege 2768 vssvc.exe Token: SeIncreaseQuotaPrivilege 2336 wmic.exe Token: SeSecurityPrivilege 2336 wmic.exe Token: SeTakeOwnershipPrivilege 2336 wmic.exe Token: SeLoadDriverPrivilege 2336 wmic.exe Token: SeSystemProfilePrivilege 2336 wmic.exe Token: SeSystemtimePrivilege 2336 wmic.exe Token: SeProfSingleProcessPrivilege 2336 wmic.exe Token: SeIncBasePriorityPrivilege 2336 wmic.exe Token: SeCreatePagefilePrivilege 2336 wmic.exe Token: SeBackupPrivilege 2336 wmic.exe Token: SeRestorePrivilege 2336 wmic.exe Token: SeShutdownPrivilege 2336 wmic.exe Token: SeDebugPrivilege 2336 wmic.exe Token: SeSystemEnvironmentPrivilege 2336 wmic.exe Token: SeRemoteShutdownPrivilege 2336 wmic.exe Token: SeUndockPrivilege 2336 wmic.exe Token: SeManageVolumePrivilege 2336 wmic.exe Token: 33 2336 wmic.exe Token: 34 2336 wmic.exe Token: 35 2336 wmic.exe Token: SeIncreaseQuotaPrivilege 2336 wmic.exe Token: SeSecurityPrivilege 2336 wmic.exe Token: SeTakeOwnershipPrivilege 2336 wmic.exe Token: SeLoadDriverPrivilege 2336 wmic.exe Token: SeSystemProfilePrivilege 2336 wmic.exe Token: SeSystemtimePrivilege 2336 wmic.exe Token: SeProfSingleProcessPrivilege 2336 wmic.exe Token: SeIncBasePriorityPrivilege 2336 wmic.exe Token: SeCreatePagefilePrivilege 2336 wmic.exe Token: SeBackupPrivilege 2336 wmic.exe Token: SeRestorePrivilege 2336 wmic.exe Token: SeShutdownPrivilege 2336 wmic.exe Token: SeDebugPrivilege 2336 wmic.exe Token: SeSystemEnvironmentPrivilege 2336 wmic.exe Token: SeRemoteShutdownPrivilege 2336 wmic.exe Token: SeUndockPrivilege 2336 wmic.exe Token: SeManageVolumePrivilege 2336 wmic.exe Token: 33 2336 wmic.exe Token: 34 2336 wmic.exe Token: 35 2336 wmic.exe Token: 33 2380 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2380 AUDIODG.EXE Token: 33 2380 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2380 AUDIODG.EXE Token: SeDebugPrivilege 944 taskkill.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2596 iexplore.exe 2596 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2596 iexplore.exe 2596 iexplore.exe 2596 iexplore.exe 2596 iexplore.exe 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1792 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 2756 ntoskrnl.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2756 1792 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 30 PID 1792 wrote to memory of 2756 1792 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 30 PID 1792 wrote to memory of 2756 1792 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 30 PID 1792 wrote to memory of 2756 1792 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 30 PID 1792 wrote to memory of 2688 1792 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 31 PID 1792 wrote to memory of 2688 1792 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 31 PID 1792 wrote to memory of 2688 1792 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 31 PID 1792 wrote to memory of 2688 1792 046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe 31 PID 2688 wrote to memory of 2896 2688 cmd.exe 34 PID 2688 wrote to memory of 2896 2688 cmd.exe 34 PID 2688 wrote to memory of 2896 2688 cmd.exe 34 PID 2688 wrote to memory of 2896 2688 cmd.exe 34 PID 2756 wrote to memory of 2888 2756 ntoskrnl.exe 33 PID 2756 wrote to memory of 2888 2756 ntoskrnl.exe 33 PID 2756 wrote to memory of 2888 2756 ntoskrnl.exe 33 PID 2756 wrote to memory of 2888 2756 ntoskrnl.exe 33 PID 2688 wrote to memory of 2916 2688 cmd.exe 39 PID 2688 wrote to memory of 2916 2688 cmd.exe 39 PID 2688 wrote to memory of 2916 2688 cmd.exe 39 PID 2688 wrote to memory of 2916 2688 cmd.exe 39 PID 2756 wrote to memory of 2336 2756 ntoskrnl.exe 40 PID 2756 wrote to memory of 2336 2756 ntoskrnl.exe 40 PID 2756 wrote to memory of 2336 2756 ntoskrnl.exe 40 PID 2756 wrote to memory of 2336 2756 ntoskrnl.exe 40 PID 2756 wrote to memory of 2880 2756 ntoskrnl.exe 42 PID 2756 wrote to memory of 2880 2756 ntoskrnl.exe 42 PID 2756 wrote to memory of 2880 2756 ntoskrnl.exe 42 PID 2756 wrote to memory of 2880 2756 ntoskrnl.exe 42 PID 2756 wrote to memory of 2212 2756 ntoskrnl.exe 44 PID 2756 wrote to memory of 2212 2756 ntoskrnl.exe 44 PID 2756 wrote to memory of 2212 2756 ntoskrnl.exe 44 PID 2756 wrote to memory of 2212 2756 ntoskrnl.exe 44 PID 2756 wrote to memory of 2596 2756 ntoskrnl.exe 47 PID 2756 wrote to memory of 2596 2756 ntoskrnl.exe 47 PID 2756 wrote to memory of 2596 2756 ntoskrnl.exe 47 PID 2756 wrote to memory of 2596 2756 ntoskrnl.exe 47 PID 2756 wrote to memory of 2916 2756 ntoskrnl.exe 48 PID 2756 wrote to memory of 2916 2756 ntoskrnl.exe 48 PID 2756 wrote to memory of 2916 2756 ntoskrnl.exe 48 PID 2756 wrote to memory of 2916 2756 ntoskrnl.exe 48 PID 2596 wrote to memory of 1912 2596 iexplore.exe 49 PID 2596 wrote to memory of 1912 2596 iexplore.exe 49 PID 2596 wrote to memory of 1912 2596 iexplore.exe 49 PID 2596 wrote to memory of 1912 2596 iexplore.exe 49 PID 2596 wrote to memory of 2836 2596 iexplore.exe 50 PID 2596 wrote to memory of 2836 2596 iexplore.exe 50 PID 2596 wrote to memory of 2836 2596 iexplore.exe 50 PID 2596 wrote to memory of 2836 2596 iexplore.exe 50 PID 2756 wrote to memory of 2800 2756 ntoskrnl.exe 51 PID 2756 wrote to memory of 2800 2756 ntoskrnl.exe 51 PID 2756 wrote to memory of 2800 2756 ntoskrnl.exe 51 PID 2756 wrote to memory of 2800 2756 ntoskrnl.exe 51 PID 2756 wrote to memory of 2948 2756 ntoskrnl.exe 55 PID 2756 wrote to memory of 2948 2756 ntoskrnl.exe 55 PID 2756 wrote to memory of 2948 2756 ntoskrnl.exe 55 PID 2756 wrote to memory of 2948 2756 ntoskrnl.exe 55 PID 2948 wrote to memory of 944 2948 cmd.exe 57 PID 2948 wrote to memory of 944 2948 cmd.exe 57 PID 2948 wrote to memory of 944 2948 cmd.exe 57 PID 2948 wrote to memory of 1496 2948 cmd.exe 58 PID 2948 wrote to memory of 1496 2948 cmd.exe 58 PID 2948 wrote to memory of 1496 2948 cmd.exe 58 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Roaming\{7950FA1F-A216-74FE-80F8-918F1AE2C65E}\ntoskrnl.exe"C:\Users\Admin\AppData\Roaming\{7950FA1F-A216-74FE-80F8-918F1AE2C65E}\ntoskrnl.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2888
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:2880
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:2212
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1912
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:537601 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:2916
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:2800
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "ntoskrnl.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{7950FA1F-A216-74FE-80F8-918F1AE2C65E}\ntoskrnl.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "ntoskrnl.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1496
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe" > NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "046c31b39dfd7efa5529d967d9da0cd2_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2916
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2384
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5081⤵
- Suspicious use of AdjustPrivilegeToken
PID:2380
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD52375fceb89ac1421cc67ab859936c9b2
SHA1d378f9337b94761f87f756eb6b599ca88a8795b8
SHA256dd3e13153d5b24095514f90f064c38d525cc75eb3bd4e21576375546ec62af4b
SHA512bd18bdda17b67cd5116e45b7d7d8608819d5a23f13a4fd7d8bcbf6d0e3978279aa96cc43761ec3f4ad8a1766cb820bce7c2c1643677fcdf8afff33fa7893eddb
-
Filesize
10KB
MD5f56f064759b87181b1b332a17791caf9
SHA1be598df449633b4d350e5a1daf8ee1051b1ee22a
SHA2569ca9a8d69b2e0f72238ce7dab2d9191c8669ed77d138157456b56b8e8f48d667
SHA512dea27686fc23e4e2490c6e9b90fde1854de77d5e685594fa328784878879808c167695d2da46d1267611dfbe038518c28403ec6b679753c4902468ba78c2fd0a
-
Filesize
85B
MD5cc0ccc36fa6bf8a4edc7690d0b02fec5
SHA12b529e070503eb5b5b698e76c8fc04b79dcc7526
SHA2565ba937f901e00b04da5dc46c24c9e8be17cbd984eda3e2b7956228d70f72ae60
SHA512c689505744686141e4ebc4c869d819cae0329ea7ad44b9b0055b3027376c0e1abfe505eab25cabd580f6e295dd6d5c4dff28057b96a02f4007ad434019a99a83
-
Filesize
216B
MD548ac29422570636cae371b68c858b988
SHA1ff86dea198c93a8ae49ee52c6eb919fcbd259aab
SHA2563926b08f205999c2f1a24121117ecfeed31557bf6f0529416f3432321292c6b0
SHA51275019e6fd4b53528aab1af668149540e1bc372e58e4786eda1da75e7c9718dbc274cbf3f37cd38fbe7e618ea9c1b24c2534d18aecfcc3264ec55f83f206faaa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59849422afdc92bf6ea42d3dc12b034ce
SHA14b6ae35518a6a72183210485593f8cf12d12c5c7
SHA2567e0dcaa9ff81e596446839aed9ebbf622a6d32a49edcc3ee439f70b8f29c449e
SHA5123e9afb994501f9b9176fa2d043ddac470624a551196065cb2a6c0d75d1898d400478c658971d54402794f16a51c7d290d3d571bbe1ae5e57bd8baf34d6cfd492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ef5f5881edb138bea73a5232fba4fb2
SHA1037235d9a3d961bd65ea8719132f61fc7c5badd0
SHA25689322824cab94a6c18c585025a8cb992c5df424843d88c79deba3d2c6a8749d4
SHA5127ed56ec688ac7a45132c265f549b994433a87c65fb4e636e370f536c4e5e0d04f5f06947085a08105a36aef217297fd426d91ad3d5dbe2097c0bca5f859a4554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d7b9f284f87230bd169098b472fe513
SHA12b07b8bbdf9aa8c563f003f3a53366a1502851ce
SHA2562de41bbc377b0a2ff3b16e5374afccef83434a76d44c09a8eb9037e30598598e
SHA5127fed91129e2daaee86b917a872d6e0c3a4d859d63796729603caf5eb87e7cd3b997d2e7b4dc76d95413ff328ee0fc68328553ba308c9ad85a2a8de840cfc7c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2778e175bab06153443d57041facc29
SHA12079def34947a32a2c501c84c3256864b96ddeac
SHA256afe39a10047801641ea5fb02462b91edb9db450886f7db73c94744e7a7761f5b
SHA5129aa1f61337ae0d08b8c8bd0a150e7d4e97c977930adb4811d905040088ca36f268473bc3bb89fc547ea66ff8f6fe1a78864d0e45eeaad9c258b651217b759e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7d3db2f382ab908ebec388bdaedbe6
SHA16c8c3450270db5e154985383bcbee5148c44396a
SHA2563aee2ffd777a40f7aa18963531440630c875ea1a19cb19eabe3f8917f2128896
SHA512ead600fa4ada9228b5b41c526c256cbc071edf9b96ef625380aa5ab6960b0ac25cb9ae72699a7661d13b12baeaa06268a556f8dbd1e5e2a5337482ff7983d624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bed88180ace6d47d570d6bc8f4ff79c
SHA100a620e59ad84832185a4e546011591163efef1c
SHA25615236e17ae04ecea62c1a1c5900c3b694b5ce9d40a52f108cf30b89a00be36c9
SHA512e98303af47867ee9341f4f5a891c5b56e83e675d261e1d37cddd320100bd54629b969a7af93a68d61c628af2a72a1cea09934d03e1de5b8bf5ef754d111d8ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57480d5aac14fe6f9efad4c665c12de30
SHA112b02e85e9fb0dbf7d9f2f21f23153c5b6e659cb
SHA256d4d140c11c693ef9c0ddd8a3c578417e7c6bcd9ea5b4f65c97a21e24194baff5
SHA512f66b1153c04b1d19279735ebd6e0ae4d530c998dce908a46ff2573e9378de9286777eab5ae75ccdce6f2cb6f3914a6a219412693d54ee9136f598a5ee630eb1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ff1eec550458fbbc1d231b0ca801af8
SHA12f99a3651aefa2719682f8060de5fff80c0483be
SHA256ff05b02da5805142691d42c5544c86b453d09246d717ef1ec4f1184301d0a0b4
SHA512e4c0f7a9117304a1ca4f6e3dc325daeb7671206bc7a2c01d93d8ede5291fc1e0b71d875f3d5c1b86507b6e97edfe6b8ddedb9620069f9b2a4a1740719f44b480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c1956479ce6fd0828249cda3cc01e78
SHA117e7461a155f9d1ed88f50203070588fcea89a59
SHA2560b5fe45b8f702da9f6466319f5affe6b729adb0705a2be0fdbdc01f8239817f2
SHA512c3f34182f66820c11c3234f95d32cd9033565a6d89f19b859fdb9dffc8ad301a55e63605d83a998eb29cba81ef1cfaac82ea5c16c1a7b985a19228ab09448594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5264f25688490117bf78336d5d8dc7e29
SHA199b959711aafb8991bf9e74dd64380bb329e501f
SHA2567f3bee41dc168ea93148a8f0dd44db831d8912a6b01217b581653ac122f4bcdc
SHA5124a36f82aa5ea3ee2285bcf5a4137b13bfb81f69c8420110592df29b304d89b77c56ba4119f338bd818aab2ffcfcb6524dcae6660d937dae528fffc113ec21c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceb57d3f4f873d2b1b0e13506c12190f
SHA1ba3baf66ddd875c5c8433a70bf11fc16e0463677
SHA256f13e07dc526cdafeb547cfbe308e6f51e0b1e99577453f1b579fff8c5b56245b
SHA512138bab54e1d8ce2b6c18cc5aa5c7e4c5dc840afc090a48e3a29b123ec48f3d419a7b82b8cea35dc5d8bd7e355b724625a852801a3b4e8374be9766fa6312824b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e05c9523a6fe6231e5d2d64e74d3d9
SHA127929f0cd2c55d9cf7d36f557e5570340aa20a38
SHA25676ee1468cce037f1eb644cd4623d3099f8ae394f7ddafdad9bd274e33f2ad189
SHA512a4962e41a530cb9de43e21956daa6f402300369b8768e5b44724a71405909dcfc9ab9054c63c3cd6d91bf65b2981fb96c5c60ac20cd114b331a0e7b661f7247c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500185d02e722e2e45bbb4be0d6f07774
SHA127f70f9bb8fe4c6bd48b8d9553399a10022eff6d
SHA256093ee7c24e9df5512dc31266fc865bd1afc6841d4cb449723581a7805c26f9d2
SHA512bc974100d92ae3b2e7c106ff9dd37c769041f7bc1105b6ececdc0015fbc4a8e3c777e30d52d4b1a38781e5826f86cab011bd8f8029d583489c06777eea92aa02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6d0c813753b9eae6e8b184de26aeb6
SHA167f1c2bb32a5062e3d81fcfb7c8214bfb3342470
SHA256c9e28439664b4e3959f62192bd513677a1a1cf8036fc27b0ad5f7b37b9133189
SHA512649e6e40a76a740343370ead593d3d80992fa9561437d762e6d784f046bf8b99b53200a63fc2023d092f769fa46d460c3c74f7f2e3632ac7249d71c205bbfa5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c6d42e377ce3a7791ba5b589ae4ab1
SHA184a7ccfd1c9b7c7cdd2d3a5ad099596f165817da
SHA25617e238547458a9562353e2fef9c49973c06b3b344e29317ed6e8a69bdef0fa82
SHA5125a369a429bbc876184c451e338be86a2b63af71072e6e2494e3151aefa499751ff2073e8e03e65f7101dc702ecd47d9b3d5b38e6aec6d493f7ef802e6e2df1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5766a90e4dcca249c5e463c1c9647d73a
SHA141926d8f1fdef6a4720fe1e7c6966cf5b0bb387a
SHA2561a59c8c54e31a4d4cd5ee72dd0b407a75b9185b60cf594669fce0fe6b45c7250
SHA5122e9ca277bfbccfafa812ece65fe0bc2d65a199fef48d28e208b892dcf63f6f44948e693de4699aecacb7dffcdf7b26735c2c1f4f0918c7d12e9498b48f9a6d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5267c77415f1a969f01037bff4ad97d43
SHA1adf5b4c94c4d4d0c76a6f6626b7b434f5cea3c9e
SHA2561282a2ee18521ba3c56147d73543735414eea8eae4bbdb53cc2b87ea6884a27f
SHA512b5ef36579ff0ee098e7b64b6846d7c03d42809389813ec9f0b80b294ee3fd707f7379948eb68206d1a93bb4154d2c8a9398a6ac094a39c832155fe3206ab2c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508537733de1623727c5e173fb3ca8d2d
SHA14567077a07d4d119bed46809578b732910e948a4
SHA256b5b74d5f8966e837135b546dbb4278e714f3aa170b2a6c63ff22b8b958f2f06a
SHA5127471dd5a3fec1ccad8031f9613b36a5bba2dff0cdb7790e7b90df6e4ff85b40050778eb2169e9c5870be996916f43b2e92fe63b01dd15aecf0f7b6b68901afaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8666e7f99c06fed137d4b8dd078123c
SHA1379120bedcac0abbb05eee8eb336e757d7c7dc93
SHA256f3c32c0697fdbfcef59c08e25f7bb3b982fb472129331aee90049bae19c729ee
SHA51203e34d0501cc7e2a2bf49a41b4afb9acc3d96370b4a3a241428f6f35832cde18779727fdd353605821e287f4a71d0e63cfb1a7ed6f14dd99960098cdf77e4a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57148b1c22bea05979c37b022e5784eee
SHA10e4ed6298e132b12819310fef8b46e8e2f6a1899
SHA2563394152caa89493f3418ae37c841a103239c264f1959436f698b2041414d2a9b
SHA512d6acde1831759b2185a189280a1ac7c828582c20423e1ac003cd5c51e301aa21bbaf774b0e805cfc46a98ce1304c8298b5fe758c6c625df4d6fb04f2bfcb52fb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD51896c5aa988e4f7b825bad6ffdec82ca
SHA172a8ce53c49fb68d245d00aeb6b05d5dd4e3148f
SHA256b3144079acb55ee75dfb04591120c72c6cc1f5d597c3ede7693b143bc4a836eb
SHA512f5e81564e972b8876482af8ead913da8bbea1f49460a2129703431b9a898cb218ec7331d9314a83b12a0ca2271512713002b2f59583d2e168947039fc732437a
-
Filesize
710KB
MD5046c31b39dfd7efa5529d967d9da0cd2
SHA1a8dcf135677807e411fe238ca3cdb161904f0615
SHA256d01a5d62bb91753fb9ebc8a48b6f1a2aa77af57a53500443e70c98d551f97cbe
SHA512c11c66492e6d20c589bfd41d904782c9a7c9fcd38461e5c7f053cb3d9f4eacacf386eeef1c6b914307c5ef630db5e3a3e8c4ba44bf9711549fbc388334fccc5b