Analysis
-
max time kernel
126s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe
-
Size
313KB
-
MD5
54c1677a604fe3d1ea9f7e597cc74b1e
-
SHA1
7710ec4d4067abc33c5f33c68b59c3d9eaeb0693
-
SHA256
f10e91b83ee6d24a39fa606fe0d99897ef4dad6e3edaa82f610fbb77630f8ea0
-
SHA512
f2e833d7e211b52b4634ace1f1ade91e9f3df14a881c1e6f3881401eee02076cedec63a6170eb91f17698c866de68404bec752bbcff2960b8d280de4d44bf441
-
SSDEEP
3072:Kwrtf8H+INt2Q8fUIS7lYwqPF3vXN+h4QYouDwdMGdThD:Ky+eINt2RfU9lYRPF3vU4QYHDwdFdTR
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.6oifgr.win/4D3B-702C-DEB0-0291-2B39
http://cerberhhyed5frqa.xo59ok.win/4D3B-702C-DEB0-0291-2B39
http://cerberhhyed5frqa.zx34jk.win/4D3B-702C-DEB0-0291-2B39
http://cerberhhyed5frqa.rt4e34.win/4D3B-702C-DEB0-0291-2B39
http://cerberhhyed5frqa.as13fd.win/4D3B-702C-DEB0-0291-2B39
http://cerberhhyed5frqa.onion/4D3B-702C-DEB0-0291-2B39
Extracted
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16390) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1948 bcdedit.exe 668 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\\rdrleakdiag.exe\"" 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\\rdrleakdiag.exe\"" rdrleakdiag.exe -
Deletes itself 1 IoCs
pid Process 2664 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\rdrleakdiag.lnk 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\rdrleakdiag.lnk rdrleakdiag.exe -
Executes dropped EXE 1 IoCs
pid Process 2812 rdrleakdiag.exe -
Loads dropped DLL 2 IoCs
pid Process 2068 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 2812 rdrleakdiag.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\rdrleakdiag = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\\rdrleakdiag.exe\"" 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\rdrleakdiag = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\\rdrleakdiag.exe\"" 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\rdrleakdiag = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\\rdrleakdiag.exe\"" rdrleakdiag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\rdrleakdiag = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\\rdrleakdiag.exe\"" rdrleakdiag.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdrleakdiag.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpE4C4.bmp" rdrleakdiag.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdrleakdiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1748 PING.EXE 2512 cmd.exe 1608 PING.EXE 2664 cmd.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2796 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 2816 taskkill.exe 2420 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\\rdrleakdiag.exe\"" 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop rdrleakdiag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\\rdrleakdiag.exe\"" rdrleakdiag.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000003fb5acd3bf64fcf05ddfd9706b61462ffc6fcb6aef2917d603fab30c827a204d000000000e80000000020000200000001c6567080f203c2c500ed85d48f03785529b144100154621b1e2e4565def5076200000000fe7242e8c07b84c1fa69300601fc5678c5dfb6deb256ad689129e6f96f3896140000000a5ba75910390825193b3a3adac070cf8d6a1823f0d66f4a19fd827dfc94de99fa17d914303b7374aa2ea82e7d117edf827c48d5f351ebecdf8a1a0427817c9c5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435377268" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c5322ffe20db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6C684B21-8CF1-11EF-90A9-D60C98DC526F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6C5C6441-8CF1-11EF-90A9-D60C98DC526F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1748 PING.EXE 1608 PING.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe 2812 rdrleakdiag.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 2068 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe Token: SeDebugPrivilege 2812 rdrleakdiag.exe Token: SeDebugPrivilege 2816 taskkill.exe Token: SeBackupPrivilege 2544 vssvc.exe Token: SeRestorePrivilege 2544 vssvc.exe Token: SeAuditPrivilege 2544 vssvc.exe Token: SeIncreaseQuotaPrivilege 1652 wmic.exe Token: SeSecurityPrivilege 1652 wmic.exe Token: SeTakeOwnershipPrivilege 1652 wmic.exe Token: SeLoadDriverPrivilege 1652 wmic.exe Token: SeSystemProfilePrivilege 1652 wmic.exe Token: SeSystemtimePrivilege 1652 wmic.exe Token: SeProfSingleProcessPrivilege 1652 wmic.exe Token: SeIncBasePriorityPrivilege 1652 wmic.exe Token: SeCreatePagefilePrivilege 1652 wmic.exe Token: SeBackupPrivilege 1652 wmic.exe Token: SeRestorePrivilege 1652 wmic.exe Token: SeShutdownPrivilege 1652 wmic.exe Token: SeDebugPrivilege 1652 wmic.exe Token: SeSystemEnvironmentPrivilege 1652 wmic.exe Token: SeRemoteShutdownPrivilege 1652 wmic.exe Token: SeUndockPrivilege 1652 wmic.exe Token: SeManageVolumePrivilege 1652 wmic.exe Token: 33 1652 wmic.exe Token: 34 1652 wmic.exe Token: 35 1652 wmic.exe Token: SeIncreaseQuotaPrivilege 1652 wmic.exe Token: SeSecurityPrivilege 1652 wmic.exe Token: SeTakeOwnershipPrivilege 1652 wmic.exe Token: SeLoadDriverPrivilege 1652 wmic.exe Token: SeSystemProfilePrivilege 1652 wmic.exe Token: SeSystemtimePrivilege 1652 wmic.exe Token: SeProfSingleProcessPrivilege 1652 wmic.exe Token: SeIncBasePriorityPrivilege 1652 wmic.exe Token: SeCreatePagefilePrivilege 1652 wmic.exe Token: SeBackupPrivilege 1652 wmic.exe Token: SeRestorePrivilege 1652 wmic.exe Token: SeShutdownPrivilege 1652 wmic.exe Token: SeDebugPrivilege 1652 wmic.exe Token: SeSystemEnvironmentPrivilege 1652 wmic.exe Token: SeRemoteShutdownPrivilege 1652 wmic.exe Token: SeUndockPrivilege 1652 wmic.exe Token: SeManageVolumePrivilege 1652 wmic.exe Token: 33 1652 wmic.exe Token: 34 1652 wmic.exe Token: 35 1652 wmic.exe Token: 33 788 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 788 AUDIODG.EXE Token: 33 788 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 788 AUDIODG.EXE Token: SeDebugPrivilege 2420 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3652 iexplore.exe 3652 iexplore.exe 3744 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3652 iexplore.exe 3652 iexplore.exe 3652 iexplore.exe 3652 iexplore.exe 3728 IEXPLORE.EXE 3728 IEXPLORE.EXE 3744 iexplore.exe 3744 iexplore.exe 3840 IEXPLORE.EXE 3840 IEXPLORE.EXE 3860 IEXPLORE.EXE 3860 IEXPLORE.EXE 3840 IEXPLORE.EXE 3840 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2068 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 2812 rdrleakdiag.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2812 2068 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2812 2068 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2812 2068 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2812 2068 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 30 PID 2812 wrote to memory of 2796 2812 rdrleakdiag.exe 32 PID 2812 wrote to memory of 2796 2812 rdrleakdiag.exe 32 PID 2812 wrote to memory of 2796 2812 rdrleakdiag.exe 32 PID 2812 wrote to memory of 2796 2812 rdrleakdiag.exe 32 PID 2068 wrote to memory of 2664 2068 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2664 2068 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2664 2068 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2664 2068 54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2816 2664 cmd.exe 35 PID 2664 wrote to memory of 2816 2664 cmd.exe 35 PID 2664 wrote to memory of 2816 2664 cmd.exe 35 PID 2664 wrote to memory of 2816 2664 cmd.exe 35 PID 2664 wrote to memory of 1748 2664 cmd.exe 39 PID 2664 wrote to memory of 1748 2664 cmd.exe 39 PID 2664 wrote to memory of 1748 2664 cmd.exe 39 PID 2664 wrote to memory of 1748 2664 cmd.exe 39 PID 2812 wrote to memory of 1652 2812 rdrleakdiag.exe 40 PID 2812 wrote to memory of 1652 2812 rdrleakdiag.exe 40 PID 2812 wrote to memory of 1652 2812 rdrleakdiag.exe 40 PID 2812 wrote to memory of 1652 2812 rdrleakdiag.exe 40 PID 2812 wrote to memory of 1948 2812 rdrleakdiag.exe 42 PID 2812 wrote to memory of 1948 2812 rdrleakdiag.exe 42 PID 2812 wrote to memory of 1948 2812 rdrleakdiag.exe 42 PID 2812 wrote to memory of 1948 2812 rdrleakdiag.exe 42 PID 2812 wrote to memory of 668 2812 rdrleakdiag.exe 44 PID 2812 wrote to memory of 668 2812 rdrleakdiag.exe 44 PID 2812 wrote to memory of 668 2812 rdrleakdiag.exe 44 PID 2812 wrote to memory of 668 2812 rdrleakdiag.exe 44 PID 2812 wrote to memory of 3652 2812 rdrleakdiag.exe 47 PID 2812 wrote to memory of 3652 2812 rdrleakdiag.exe 47 PID 2812 wrote to memory of 3652 2812 rdrleakdiag.exe 47 PID 2812 wrote to memory of 3652 2812 rdrleakdiag.exe 47 PID 2812 wrote to memory of 3664 2812 rdrleakdiag.exe 48 PID 2812 wrote to memory of 3664 2812 rdrleakdiag.exe 48 PID 2812 wrote to memory of 3664 2812 rdrleakdiag.exe 48 PID 2812 wrote to memory of 3664 2812 rdrleakdiag.exe 48 PID 3652 wrote to memory of 3728 3652 iexplore.exe 49 PID 3652 wrote to memory of 3728 3652 iexplore.exe 49 PID 3652 wrote to memory of 3728 3652 iexplore.exe 49 PID 3652 wrote to memory of 3728 3652 iexplore.exe 49 PID 3652 wrote to memory of 3840 3652 iexplore.exe 51 PID 3652 wrote to memory of 3840 3652 iexplore.exe 51 PID 3652 wrote to memory of 3840 3652 iexplore.exe 51 PID 3652 wrote to memory of 3840 3652 iexplore.exe 51 PID 3744 wrote to memory of 3860 3744 iexplore.exe 52 PID 3744 wrote to memory of 3860 3744 iexplore.exe 52 PID 3744 wrote to memory of 3860 3744 iexplore.exe 52 PID 3744 wrote to memory of 3860 3744 iexplore.exe 52 PID 2812 wrote to memory of 4004 2812 rdrleakdiag.exe 53 PID 2812 wrote to memory of 4004 2812 rdrleakdiag.exe 53 PID 2812 wrote to memory of 4004 2812 rdrleakdiag.exe 53 PID 2812 wrote to memory of 4004 2812 rdrleakdiag.exe 53 PID 2812 wrote to memory of 2512 2812 rdrleakdiag.exe 57 PID 2812 wrote to memory of 2512 2812 rdrleakdiag.exe 57 PID 2812 wrote to memory of 2512 2812 rdrleakdiag.exe 57 PID 2812 wrote to memory of 2512 2812 rdrleakdiag.exe 57 PID 2512 wrote to memory of 2420 2512 cmd.exe 59 PID 2512 wrote to memory of 2420 2512 cmd.exe 59 PID 2512 wrote to memory of 2420 2512 cmd.exe 59 PID 2512 wrote to memory of 1608 2512 cmd.exe 61 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\rdrleakdiag.exe"C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\rdrleakdiag.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2796
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:1948
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:668
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3652 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3728
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3652 CREDAT:537601 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3840
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:3664
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:4004
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "rdrleakdiag.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\rdrleakdiag.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "rdrleakdiag.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1608
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe" > NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1748
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3860
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:4088
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5001⤵
- Suspicious use of AdjustPrivilegeToken
PID:788
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\# DECRYPT MY FILES #.html
Filesize12KB
MD54a03c4c6893cc22e4a094f1b5789efb3
SHA1614b7a09c269263bbbe09f0f1c53e4e72a6e8f79
SHA256bc123431093c0e9459911757c5f4c01f0f4be38fe34ccd26e3a13c5facf060c4
SHA51223a79af08f243490c6e0645c28a65e160507e2e84859def40d69e438482763b2b6a0fe70c66d21c89d568c10d47afbf75270216f3bfadb57123e07bf40e8341a
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\# DECRYPT MY FILES #.txt
Filesize10KB
MD5dbd4a9d19eb7bb9d54500f3e01423036
SHA19b832c3cd08fd36c87b0176fab316ff61ceef5ff
SHA256eff4e023cb72ff9c06dac8b0f07e776825e2371b11954f0e70ac7f63bc8b6e25
SHA512c1db21097553abb734ceb4638a21ed0b482ff572be5a5d58cf26a9a931934af096a03edc2d8454459ff4318afc20398fd760c8a80dca042808f35f6bfd74bc09
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\# DECRYPT MY FILES #.url
Filesize85B
MD576b9d65813a15e6fdb5103fc2a5ade93
SHA177ff7f6888d2696793fb811d6abe53817da7e6e8
SHA25692df3bb3c0159d2109252dc10848c0914d6244f8cb72edbae85434a155b58557
SHA51226601304a3e9616dad019f991fac55ea628c8534bb5f5c7d9a3675d9aaa9e45ad944bb48c2c5cf1c2101e8ada72174a7ae3d05d5d9b71cd4fca528d27f9099df
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\# DECRYPT MY FILES #.vbs
Filesize216B
MD548ac29422570636cae371b68c858b988
SHA1ff86dea198c93a8ae49ee52c6eb919fcbd259aab
SHA2563926b08f205999c2f1a24121117ecfeed31557bf6f0529416f3432321292c6b0
SHA51275019e6fd4b53528aab1af668149540e1bc372e58e4786eda1da75e7c9718dbc274cbf3f37cd38fbe7e618ea9c1b24c2534d18aecfcc3264ec55f83f206faaa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f500808f9a708ddae2ec762269c62988
SHA166ddf23cf333c77a605ae464b459b2000fd08760
SHA2567f4883c095a4a6c08c935429bca21ac21ce1309a6438ea4200a34aa25acfc5b6
SHA512915165412bee91bd48ff98080c5ebcad8df5415eec80884d7088cab9354dacf3ecb24f3f8892ceb2c207bb63b1a337b0d9f9c2af8b3bb225a5e5b9ad5cf21cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597b69c2cb49a1ebe08c0057c82e3c49a
SHA1207b9cd6aa544128ca8dc7bcf34558def270e281
SHA256213762d2ff5d04aeeb21404c90c45a1e3bbd0c8566e5e6925ffb59f7ef6cd3e3
SHA512c62e8cfe6634a95cb76e39aafebba1f34486f8dd32bc0e9c72cc560567dd5b5346fbec851e4bcf5dcd1ece5ab7352fd97e8ff6dfe58ae9163847596efcadc4d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a3d71976258644e6c6216e1357196c
SHA1d9f6cf004ab34d3fcee25c183dc78f70f9af3dd8
SHA256c4cbb7f757e47f006a2130d33ba6ddb3b395acc363922a8883d2ff17aaa12c10
SHA512fc9e0a3042cf20c349f282370e4af7c1299316690d8cf296875f85596017422feb8a46bfbc0e6dc33b90e4eb1547da0c194e6680d38eb78da425cb0e6b8a803e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a87b8622734d173349cf7ba3dad28a9
SHA12ba61b26307c1afb14333b202e29afb11c68a932
SHA256406c6287a3a3c073154161160abd60e78b6800bf381edaf7653be2bbc789adc3
SHA512591d8adf8f5f052692f62d3124cf8326db9bf0aa4dff3fe29983ab14a3bb3f5bc6f24f13833bedcfa7df85a365250040b76bd3d61c6dbd2d8b43621e1bb0d58d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a8978cdc31a3cd81aff015ef11688da
SHA1232d800d081c5c6bcf5fb815f228b97243b74657
SHA25675c367f10202140e74e3b003973d7704eaa9a3eab13c7da6284da83d3ab1bea4
SHA5123cbc8e07a9f2c0604c1a09823aaf743f9b30665a9a7a8e7f8a6b0b50bcf2d44cc8df92286f3ab09fac9b7d18176b20acd15de6caec9b3b32d81a3dae5e2cbcc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5310d34df0fec03fc41c1d683f28f73
SHA118c6e02b7627637f550e5766abed4acb20b3d545
SHA256d36be20953255209011a05e97e38a3517306a0053a616883760bfbe9799a26d5
SHA512e7155d9b89da87564a8f87906490806b47c66b96465a3ffd4ded5bbf73c671c1e6bcc632894396701f2fdf8b03a47db1a5bb179ecc1683427be0e58bcd5b9e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5502f7ded83796c5794290d0615448c3e
SHA1b9f2caf91fcfb248777ba1975d4dd90fb7d037ff
SHA256734b1fcde26d27aa65d4bd560f9950ba62ed47ebd7ac93a95c6423adf2e7dc21
SHA51210619fd0232b1b2ff777970c66490f67549d112bfd20c38c8f9412c1c8683a844b783f33afac23a107004b19c1cea13b26def5928b8a0f60c0f4d5d6778528aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f66f5b6dea33fb404bb9303f8d70e074
SHA1700136c0dec8e9b84a8887acf83e2513fae3d204
SHA25601f8206660fc71cfd312d76611fa0f95af34dbd72e041da369e8fc4316202138
SHA51261be56a52feb3ab9bbe3da413abf1fd6a8bd09ffe9128637ff41617c20df987e1f6008029554f064c3270c81c768d31bd27157a39502dd4a3958f04981674510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dae3d3dbb23a3fbe344d5b6c40f52c5
SHA10fc063c36c5c9d5d755a181148316ac46d9edddf
SHA25628bb55112487bca05b7f65a954c4d613b3c326027103e73fcad9512c820faa22
SHA5124d51d3b02b00b22c418789c06b90964416ee4af6382dc75a90e8b9362c6b32150ae0f18cd7e0fe303b9622d456f1d0986984f532ca8fedd21e2bc9f3e26fc298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d4f9f0f2e6cf0deb34c0fcfb1b4a655
SHA17d512059e3e545101762b014393bc78f8ea1044a
SHA256e31e69c9edfd98a8122767a77e6fad5364d73203dfb493ea703a2861f07a6017
SHA512ccf0f130517e5fe26ec1427f1cc273d970412941b22e0cfb33bf6109aa5b613fa1589dacc9d0c01f205b4a0cec6f62d2341fb8b7f34e2f67d9acc83a3e28eb16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2dcf6a3615f82817491124a16053f80
SHA148da9760ea4d593d7b6b2db6292433ec3621fa0d
SHA256563379129767fac008f6feb410269d810ee1afce49d984c8601452671653f0b9
SHA5123edabdbe00c8a89f828e1b4436ec365bbe8bce234ce37128694f8f77fe94a150c74f3da8ff4d0d09026cd907c677f172a309be9149ca4f96259ed46f236684a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525b1d11c8b169240c8245bc1003f3dc7
SHA182e25f1eab34073ebb17a6f75c8ba4b5c9043626
SHA256eac931f37883fdea3fc7e6bb7b2dcd04370d482a68698b871b3a9c4d4e523dc0
SHA512bdcdaa5cb8b11488cab4a29c3cf6a157737d85dd4163c21268d6df33fd8c65ea00f5c398cfad3950860c526081e1f7c28d726b1225a8db927c49e10e55dd6ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536a22ebb51cd279cc6aebf24ddaa2e4e
SHA1a19480ba4a7f64a2cbf898fcd3e70b10683a3cb7
SHA256d3a577fdb559e1e2cf9cd3542330340244e767b5cd056d7710935715484b2104
SHA5124832bf2d9b0fee02f2152c1f6066f89f36b9d46a4a64bdd5d9da0a4c21efe6d92d8f06aa67312dd96331fe07c18b7caa951e06dde45a8a3362bc8971d0780b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db26b05b0009c5530d8254ea9789656
SHA106e9358d5d30f5a32e1526af44d8bf5ff1256a35
SHA2561cbaca35dac0b0ed4498c23e3dbc7f8ef04b544b1f0b6f8265599c49cdba423c
SHA51238e0002f2ccb4a4aca99fc9a203d6a789547bb9d77ec61617bce66528689d9f2a7cb9d6a77a4a21bce166b8a56ba8ecd9a3a696d7f4e4f9bfa62394838d5efca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bf85cee2fd6e741d8260d7ee12f7e73
SHA1b3080007324fbc2952c05459eb987e8726e8cc07
SHA2564f27ae7bcf079450942463e4d10a66a7043bf5ac7da5666a4e4f58270b3fe1c7
SHA51260b95d298d86bb32a2cbdf49f6cbcd58c4da9755dd1f1fa2db12d1047ddfb9074c7a5f983ffcc74faea88af112a0aa3937031ae3fa997a67e9a58d7617f4481b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b637aa27bfb0933e6d089a6a0158a2e
SHA1765decf75f0a9d83c4750b01ca9506ecd2fd7b7e
SHA256d941b73fedeac95c0b7e6d31378463431eebcce92c9be95f5ad14e3428188d6d
SHA512ecb8b44d405020f40457efc8f03e59bd9cca5c453236d2fc98fbc22485f2a6ae622d9baa49248649d6bdfa825eaf6a8ebaf020e71fc9315821a0cc47c5516aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a0c8b3cb33eb40552cc11f26aa5f011
SHA15a436885e06aa47d0ebbbff6ae5cc9a90bf0f523
SHA256baa3996fe37929a5fad8bb1b4ad4e91890c97eaa772d0eae4b571d8e4fba6058
SHA51250840189526d72547819994989f08e66f98cf711ba434ffb0bb9ea993515781fad820a6985aad922c4301f7c324ada75eaad34b493f488d3496f4ad32e305421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ade437c05ad4bfa8f58e8ae96ac8a1b7
SHA1be8fd16683fd1560dfc1dd6a4a90266b084312d5
SHA256a89448a3607c48ff938e6eb6ac10646b5c34949befa84735451850f5db5fe085
SHA512469f652631a25539442398d93329e8d10f8c28fb9b7eabaaf62d1c5dfde8b956f4dbc039d55e7552a53117faea41f0c143fea6357d4e30bcbec89a441d3010bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6c3e4a8d4c4aefc55d2744b3d48dd7
SHA11fb7358d2425d991d8796339258c04996c4be902
SHA2563ad3e3ddf822a8495877060c2188eb061ce714e95f06a6eb33e78a8638374326
SHA512e3fef59979576a32f40df098631c36532dd8824001505fd8be5c7490c09c21232fef281b426933da115349ce12b8c768e956f9f7141f211862d7d54bcb963b12
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6C5C6441-8CF1-11EF-90A9-D60C98DC526F}.dat
Filesize5KB
MD5519a26eed0fedc5cd217b52d2e3a8081
SHA13b68032fcba9f5f0c335b9bdbe55af77031fe2c5
SHA25655662edd2b68ff01c7b0d7a5fcf17feea7bdc65d302b75be48c5627c2aae72f2
SHA512013ffa58f8388fa429d4ca34cba69ddc32d6c1cdb2375437723f408631380a12a11b0249d3c0bd0b1f6ebfea8f4a89e97a326334ea17830f730d6bfa8b6a2842
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD5d770d781d0b277931d2cb4b3f18ba60d
SHA1c6c1c9ca25fd5192d2431af1e883bef9a876daec
SHA256c675747a91f4bb03d4f37819e4491c6745a8e2606eebd654c68cb05a240e2e0b
SHA5129cf9044725040db554804628a6f44664a31a9fe67ed7b7da46b1df9f61d502166798619e82e8c77e2db406094e0be5424c774fa84859a3066924ca58783bea2e
-
Filesize
313KB
MD554c1677a604fe3d1ea9f7e597cc74b1e
SHA17710ec4d4067abc33c5f33c68b59c3d9eaeb0693
SHA256f10e91b83ee6d24a39fa606fe0d99897ef4dad6e3edaa82f610fbb77630f8ea0
SHA512f2e833d7e211b52b4634ace1f1ade91e9f3df14a881c1e6f3881401eee02076cedec63a6170eb91f17698c866de68404bec752bbcff2960b8d280de4d44bf441