Analysis
-
max time kernel
128s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-10-2024 09:41
Static task
static1
Behavioral task
behavioral1
Sample
6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe
-
Size
392KB
-
MD5
6653ef20d2a3a6ef656d9c886ebabd93
-
SHA1
bb0cc0b05bb70a3d347faa94fb36a35c771b0692
-
SHA256
48ff838a7fe98ec2c5bb59a8a76100047abcfa6db824f4982b8e7fdf2110f05d
-
SHA512
b68b37147ce0d1389d62f5f72ebb616edc7d2ed2aaa484e85f6dc4b6070c9ce973a523e11e311686dc0efb0757fe52dcfa430afb1f48f98ecfdc257c6f3cc360
-
SSDEEP
3072:viHZTdn6oWzjNtxPPnGau7GMuOYHAifZEeKPi6u7KzrN7ivE5oY4KppRsqYaefiU:QZqPtvGauSM4HAifkGOzrN+HKkalM
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.xlfp45.win/2A01-D4E3-782D-0291-9A56
http://cerberhhyed5frqa.slr849.win/2A01-D4E3-782D-0291-9A56
http://cerberhhyed5frqa.ret5kr.win/2A01-D4E3-782D-0291-9A56
http://cerberhhyed5frqa.zgf48j.win/2A01-D4E3-782D-0291-9A56
http://cerberhhyed5frqa.xltnet.win/2A01-D4E3-782D-0291-9A56
http://cerberhhyed5frqa.onion/2A01-D4E3-782D-0291-9A56
Extracted
C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16389) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1636 bcdedit.exe 2024 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{E7F19A57-C953-7B64-1413-296E95479BC0}\\waitfor.exe\"" waitfor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{E7F19A57-C953-7B64-1413-296E95479BC0}\\waitfor.exe\"" 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2276 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\waitfor.lnk 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\waitfor.lnk waitfor.exe -
Executes dropped EXE 1 IoCs
pid Process 980 waitfor.exe -
Loads dropped DLL 3 IoCs
pid Process 2152 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe 2152 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe 980 waitfor.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\waitfor = "\"C:\\Users\\Admin\\AppData\\Roaming\\{E7F19A57-C953-7B64-1413-296E95479BC0}\\waitfor.exe\"" 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\waitfor = "\"C:\\Users\\Admin\\AppData\\Roaming\\{E7F19A57-C953-7B64-1413-296E95479BC0}\\waitfor.exe\"" 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\waitfor = "\"C:\\Users\\Admin\\AppData\\Roaming\\{E7F19A57-C953-7B64-1413-296E95479BC0}\\waitfor.exe\"" waitfor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\waitfor = "\"C:\\Users\\Admin\\AppData\\Roaming\\{E7F19A57-C953-7B64-1413-296E95479BC0}\\waitfor.exe\"" waitfor.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA waitfor.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpAD30.bmp" waitfor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language waitfor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2276 cmd.exe 2752 PING.EXE 2472 cmd.exe 1696 PING.EXE -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2416 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 2740 taskkill.exe 836 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\Desktop 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{E7F19A57-C953-7B64-1413-296E95479BC0}\\waitfor.exe\"" 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\Desktop waitfor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{E7F19A57-C953-7B64-1413-296E95479BC0}\\waitfor.exe\"" waitfor.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0dbb3929d23db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435665627" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CFF2EF51-8F90-11EF-BCE0-DECC44E0FF92} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003660660bbcee04429ffa8774a481caac000000000200000000001066000000010000200000005309f8b45dde3c8e834de86076344706adc7a7464216cabea10998d530b06928000000000e8000000002000020000000ec988621e761091226214990e442d49e9429b1312f3138c1746e119e24cb246e20000000c53974d1f851ad0d229beed932b6c4c3a07a53cac5d6d9efa8d4064b340c0bab40000000a3c8ce08857bd667b443c8682bf6dc5bae8b1c7b82532c9e0f500abea86c6341f1f277bc795a1c1bfa283d94a650e0e5c194409cc5efa4385ec11ac733f3b759 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CFE70871-8F90-11EF-BCE0-DECC44E0FF92} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2752 PING.EXE 1696 PING.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe 980 waitfor.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 2152 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe Token: SeDebugPrivilege 980 waitfor.exe Token: SeDebugPrivilege 2740 taskkill.exe Token: SeBackupPrivilege 2848 vssvc.exe Token: SeRestorePrivilege 2848 vssvc.exe Token: SeAuditPrivilege 2848 vssvc.exe Token: SeIncreaseQuotaPrivilege 2336 wmic.exe Token: SeSecurityPrivilege 2336 wmic.exe Token: SeTakeOwnershipPrivilege 2336 wmic.exe Token: SeLoadDriverPrivilege 2336 wmic.exe Token: SeSystemProfilePrivilege 2336 wmic.exe Token: SeSystemtimePrivilege 2336 wmic.exe Token: SeProfSingleProcessPrivilege 2336 wmic.exe Token: SeIncBasePriorityPrivilege 2336 wmic.exe Token: SeCreatePagefilePrivilege 2336 wmic.exe Token: SeBackupPrivilege 2336 wmic.exe Token: SeRestorePrivilege 2336 wmic.exe Token: SeShutdownPrivilege 2336 wmic.exe Token: SeDebugPrivilege 2336 wmic.exe Token: SeSystemEnvironmentPrivilege 2336 wmic.exe Token: SeRemoteShutdownPrivilege 2336 wmic.exe Token: SeUndockPrivilege 2336 wmic.exe Token: SeManageVolumePrivilege 2336 wmic.exe Token: 33 2336 wmic.exe Token: 34 2336 wmic.exe Token: 35 2336 wmic.exe Token: SeIncreaseQuotaPrivilege 2336 wmic.exe Token: SeSecurityPrivilege 2336 wmic.exe Token: SeTakeOwnershipPrivilege 2336 wmic.exe Token: SeLoadDriverPrivilege 2336 wmic.exe Token: SeSystemProfilePrivilege 2336 wmic.exe Token: SeSystemtimePrivilege 2336 wmic.exe Token: SeProfSingleProcessPrivilege 2336 wmic.exe Token: SeIncBasePriorityPrivilege 2336 wmic.exe Token: SeCreatePagefilePrivilege 2336 wmic.exe Token: SeBackupPrivilege 2336 wmic.exe Token: SeRestorePrivilege 2336 wmic.exe Token: SeShutdownPrivilege 2336 wmic.exe Token: SeDebugPrivilege 2336 wmic.exe Token: SeSystemEnvironmentPrivilege 2336 wmic.exe Token: SeRemoteShutdownPrivilege 2336 wmic.exe Token: SeUndockPrivilege 2336 wmic.exe Token: SeManageVolumePrivilege 2336 wmic.exe Token: 33 2336 wmic.exe Token: 34 2336 wmic.exe Token: 35 2336 wmic.exe Token: SeDebugPrivilege 836 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1604 iexplore.exe 1604 iexplore.exe 536 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1604 iexplore.exe 1604 iexplore.exe 1604 iexplore.exe 1604 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 536 iexplore.exe 536 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2152 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe 980 waitfor.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 980 2152 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe 30 PID 2152 wrote to memory of 980 2152 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe 30 PID 2152 wrote to memory of 980 2152 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe 30 PID 2152 wrote to memory of 980 2152 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2276 2152 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe 31 PID 2152 wrote to memory of 2276 2152 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe 31 PID 2152 wrote to memory of 2276 2152 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe 31 PID 2152 wrote to memory of 2276 2152 6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe 31 PID 980 wrote to memory of 2416 980 waitfor.exe 33 PID 980 wrote to memory of 2416 980 waitfor.exe 33 PID 980 wrote to memory of 2416 980 waitfor.exe 33 PID 980 wrote to memory of 2416 980 waitfor.exe 33 PID 2276 wrote to memory of 2740 2276 cmd.exe 35 PID 2276 wrote to memory of 2740 2276 cmd.exe 35 PID 2276 wrote to memory of 2740 2276 cmd.exe 35 PID 2276 wrote to memory of 2740 2276 cmd.exe 35 PID 2276 wrote to memory of 2752 2276 cmd.exe 39 PID 2276 wrote to memory of 2752 2276 cmd.exe 39 PID 2276 wrote to memory of 2752 2276 cmd.exe 39 PID 2276 wrote to memory of 2752 2276 cmd.exe 39 PID 980 wrote to memory of 2336 980 waitfor.exe 40 PID 980 wrote to memory of 2336 980 waitfor.exe 40 PID 980 wrote to memory of 2336 980 waitfor.exe 40 PID 980 wrote to memory of 2336 980 waitfor.exe 40 PID 980 wrote to memory of 1636 980 waitfor.exe 42 PID 980 wrote to memory of 1636 980 waitfor.exe 42 PID 980 wrote to memory of 1636 980 waitfor.exe 42 PID 980 wrote to memory of 1636 980 waitfor.exe 42 PID 980 wrote to memory of 2024 980 waitfor.exe 44 PID 980 wrote to memory of 2024 980 waitfor.exe 44 PID 980 wrote to memory of 2024 980 waitfor.exe 44 PID 980 wrote to memory of 2024 980 waitfor.exe 44 PID 980 wrote to memory of 1604 980 waitfor.exe 48 PID 980 wrote to memory of 1604 980 waitfor.exe 48 PID 980 wrote to memory of 1604 980 waitfor.exe 48 PID 980 wrote to memory of 1604 980 waitfor.exe 48 PID 980 wrote to memory of 1476 980 waitfor.exe 49 PID 980 wrote to memory of 1476 980 waitfor.exe 49 PID 980 wrote to memory of 1476 980 waitfor.exe 49 PID 980 wrote to memory of 1476 980 waitfor.exe 49 PID 1604 wrote to memory of 3024 1604 iexplore.exe 50 PID 1604 wrote to memory of 3024 1604 iexplore.exe 50 PID 1604 wrote to memory of 3024 1604 iexplore.exe 50 PID 1604 wrote to memory of 3024 1604 iexplore.exe 50 PID 536 wrote to memory of 2624 536 iexplore.exe 52 PID 536 wrote to memory of 2624 536 iexplore.exe 52 PID 536 wrote to memory of 2624 536 iexplore.exe 52 PID 536 wrote to memory of 2624 536 iexplore.exe 52 PID 1604 wrote to memory of 2716 1604 iexplore.exe 53 PID 1604 wrote to memory of 2716 1604 iexplore.exe 53 PID 1604 wrote to memory of 2716 1604 iexplore.exe 53 PID 1604 wrote to memory of 2716 1604 iexplore.exe 53 PID 980 wrote to memory of 2712 980 waitfor.exe 54 PID 980 wrote to memory of 2712 980 waitfor.exe 54 PID 980 wrote to memory of 2712 980 waitfor.exe 54 PID 980 wrote to memory of 2712 980 waitfor.exe 54 PID 980 wrote to memory of 2472 980 waitfor.exe 57 PID 980 wrote to memory of 2472 980 waitfor.exe 57 PID 980 wrote to memory of 2472 980 waitfor.exe 57 PID 980 wrote to memory of 2472 980 waitfor.exe 57 PID 2472 wrote to memory of 836 2472 cmd.exe 59 PID 2472 wrote to memory of 836 2472 cmd.exe 59 PID 2472 wrote to memory of 836 2472 cmd.exe 59 PID 2472 wrote to memory of 1696 2472 cmd.exe 60 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Roaming\{E7F19A57-C953-7B64-1413-296E95479BC0}\waitfor.exe"C:\Users\Admin\AppData\Roaming\{E7F19A57-C953-7B64-1413-296E95479BC0}\waitfor.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2416
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:1636
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:2024
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1604 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1604 CREDAT:537601 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:1476
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:2712
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "waitfor.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{E7F19A57-C953-7B64-1413-296E95479BC0}\waitfor.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "waitfor.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1696
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe" > NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2752
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:536 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:872
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5c09f0da5c4531ccf8336a60f6ede0ac8
SHA1e4dbf1ba2bbbdfba9b644d18d63a61c600a2961f
SHA2564f226a0ac73d48e81b2df40eb3ceb4c99336deec05755cba9ff794a2702dd888
SHA5123e05e91550cad6ae5812446530cd7f1d50a2cbf743cf1447b47ad7d8640f6d57d5cbb6de17abd35600ef4dc0090f62d9aa06dd39f0899e8f4c5414d77e28d3d0
-
Filesize
10KB
MD51ee77169907eaa8c02bc7a6236489497
SHA1170fc62967c3105c831079c40f5070db489c3d4a
SHA256658c1893d6db0e1b9d39bd2e9544892ee9e6dcb915297b08e16e1a0f5de0739d
SHA512f5dd1c5c73f9edf917c9acf43e500175af36d359408e935b09750b6965d63e3114bbbe53042c40088d268b61aa59e8aad6a81e1a6da7a96b4ac6792cd822ea2f
-
Filesize
85B
MD5beb126157f13187dfd6f20552de5af86
SHA1eb90c0db83d2938fdcda53bf48b9cd78a4d058bf
SHA25622735af742fa219d55266bec0a52d216b620039b3f5ef1f720a2dd19a3e4a28c
SHA5122e2c91b0b25855626b53150ca6b3ad5f392d10ad7f0e933ed5a1af5cce2d0f0f156e5295762897f98b4cf9e8231c5e7d2c1998acb9ec3c2aa471f2510da48955
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6847963711efe7d54ee256348d30362
SHA1af114bc22c3913d7cb51ad9d26baa65d427a2304
SHA256f0eea203b95b4c410d0cc10a5ee3c30f74044d455339a64d2b21e34d82ac5448
SHA512477ae39dd0041dc9c842e693824273a913517d313fd013bb700e3a9c95d388f229522a1a0d8e803a1baed267adec032a3ccb6330622b9340195b95ea37f6faa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e384c17493bfce4db7c1924f221785
SHA1253e7cc0287e0ef197d402e384527eaf6e4be182
SHA25602038f88bf4c2b570d25b11c0f9c06c114be30fd21cb2e7f862dabd1e0b78ccc
SHA512f044896a15a3ced17d0b9edacd131ad2737acd2277b5a4a93e4a22bdfc821349f1c9314ffa860fe25925f0214a38f1505d45e1a32d1fc8dac94ec9e1f0a3fd73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f050f65a5d3ab4fb1034d6a32a90dca2
SHA1703ee084c5fc4e9ad98c69cc33869d0763b6fa21
SHA256d3b3564dd4f2b10a73f5217a7f928e137ce1d2343fc4b0f8d11bc5ec26ed7f4a
SHA5124c5cc62aa198aa39d60f5cefa0a520f26edaf7e5b05147fa99720cf932571bb3fad0b7d92298e7355557adcb19a9e78ea76cb0f1a84e439b9c315ff2fea5edf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c6e05ca763df012ddeaac6dbf979666
SHA11c4d72b6e5f948f640c67deb627e16e93e299010
SHA256713bc47480290f9ff1311dbeae1bd526079f45b129bf07869f0500804cd5d003
SHA5124d79942f034afcb1b2df12c0a97414644b197240b1cbd27e1ad555d468a287c9aa866b7f2f1127986be70e4db295dcd77c4c05388035109a8fb0ad99bb5b4a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52076a1579f2c0a0840e18bd6a9736fa9
SHA13ce3dd6546a6f6db3499ab6830045c1825c6c18a
SHA256e3d2718008d77c2908a4d54101cbb7a8610a772dcdba053533ecb2abf1766d69
SHA5120447ca971e9972302eef0fc0de31267412d6a199643b80a8827794451ff425a3b1de1bf0e071d1a578bfaa61e20cc0ac9cb376238ba5ea56c4c1dfa2304e0028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503e1f17df45f7f7d8f24087ed7850c66
SHA1bf9594340d5d44ff600cc05d6a0a205a6a1ae8e7
SHA256c7be8abc4b331b944b15f0d2d17ee69e44a4d24336042e6738ea7427c58d6d03
SHA512fefee60fe0dcc1737075774b40989d41c398ee4e76ebcd2d0a820ffaa5aad3cf3b979b0a1383d81bb1381c87a1caf86cfba3befd2a2ee7da1c341c57c2798eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bded478cb0e89414c2c1028ddcfc1786
SHA1a31c652b079070a55f6c6cc706db97fbab4f9ac3
SHA256a5f1bbce155d586c977d3bc935a43352ac5a91f16fd9b30cffda047760a4606e
SHA512f60da5ef9aa29dd7218a094d352cf3c99caecbdf891c10e235594d87532260dc83da134d28d0fc1a24532f71da8134d73d904b84108846a2398cd6f40a4daec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974cfb92fa1dbf629ee2f8a243f27336
SHA176b2b438c9f6f2fe8b31668f25a6e25003ef1756
SHA256f98f974146a05adc805014ae0a35a6f71fb46267b7a292df631e0c26441b3455
SHA5128e791ac25d66cb825e20f46b876ce16168407c96d4b4d5f2113e4049e0a3b0245e8586da8939ef8920b44dbfd7f6c96f8a837d683d471bd4fec9e8556eee7945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee7f041a03a1500ffe7c597e54711e6
SHA138632ab7981f3a00a36701ed20d13d821e39a76d
SHA256c054eeef2036d43ee336158426a20948d269575ef5ec899f098044b27b268304
SHA512fe85d5a6d0819d7c63e4f47a908ee98c74805c954dee8dcca48656ddda668d7c22c099101dc5ebe9ce1d52c575ca5abcf984ba28779eef7fdf30261d358b2e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c4977ad94310dfa1a3398a3260c918
SHA1a03db4774c25209591e4d8f56b43ad0dd6abe682
SHA256019484d5af0fba527270e478eb2e8dfdcee3337a5d5f058c4e3bf5b5846decf6
SHA51211151d8f73903b337d0ce99996c3719259f0edf163df33f95c58094fe5722500d68656997889f44cbb8f2e26a9827c76c95778aa4c88f4e6ab4bfe3f798a4f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5848b20413f8b0160444ae6cc25d2c435
SHA1477de5ea37d63425ca141dc1dd3f65c8dc7ac8ca
SHA256d506db4b97f3fbdcdfa14bca0d452804f7b97223c4b9787868e310848b459aa6
SHA5125759a56ab56dcdbf90340270d96e547587904f731f6930aa019e6ee00784c0ed1a8479ce672f5bd89d682c15c9f529d58fc432d3b9d227607a373c41602800e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7896e89e289e8800c82ac23ac7bb9d8
SHA13fd95804fb7898f7485d9bd36eca1a135ee79a16
SHA2563990c2adfd6bdeb606bc4224aa048763a589f53b3d0a03aaaddd2336a727651d
SHA5129f6f1465e41ebceca3516f8683525babd9c904d17379d6bf82f6ec41fd99c90fec45263193c9d0a63682bd328f33747103c921e3425b477365e5068369ef52c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fde9ebd93e3f860489890d4239e31028
SHA11396526706d44777b6f2765a8bcbb37947659241
SHA2565380b492dcb26b0fec97a45f896f3ad024c8ca8ed185a4f82712adfa1d80adf9
SHA512b07838f6c5c55b0c8d2442fb9069f2c5c9515a46e62ba063da6ccc2179cf93606dbd8527aa39b185c690ba8384ab5d288dc39f1dde5ae215a0f7f95c485598fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f6704f65a18f83a8575e0b2ef701f0c
SHA1698b14b293d12350257c1e92ce1ed5c7eb4aafc7
SHA256254cacb38aa4a1c0f8753c649b24d952dc2fbafbeb1dcea4bafa109d1bdef523
SHA5120a5d892426d84979cee2489c1e1fffee8c9461b2aae48109b1f62ff405756c0cb8bc2ad85b93133f8fdc9e583fd5be1a7ad5ce5740c05be98958b84c4743516d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9d9b051d9a832c6fb44a2cc2558691f
SHA1015f275c2da25243c9922964ca60b9a861ed5f47
SHA25691acbfbc38ba07b1fe48befc74d20d349160519e53288ecbba1685978b2b5a92
SHA512c8ac884951a17fba66d72bc2c9ca41323cb862e9658708515f8609652480bd40d9f200322f4c37668e36989e3a54cc77923c40eb342f0dc071e7b375fc263bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5410ef30a450153e24fcf728fb3a2ab50
SHA1e7fdb5a38095e1e6d963334da1c79a4f3bfe1ac0
SHA25615e316ee75c75283a7f38db2d0608783201fd5946e8a9b5280025eb49d63eae7
SHA5121d4cf4ac3c53c5e02b40d285ad7e297296ee52578e96fa7ea2b34bf4761ce0c05f831e425ac482c9c40aa66bff9032cf517c2e392ad152bc2ed4e722220ebda4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a86f5b140eaf182cb41d54ac17d9aff
SHA1d4415e1cf5830d0b77ebd10b52adc97872170b86
SHA256aeb4b46f49bf750d5ecbbab75be7921d3a110f7adfc240cfe13023af16b555a8
SHA512743116c4d657ccaa2cabe17abe1615776b75ca1bfd5a555bcf463008a3f0480fedfcfedf61e693d08d2cddd105f185041b787579aac68fdfea757f85d7014472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519496e8348e9d3489e0275021e7ee4e0
SHA1376a62f8f4930f24675d31621ad7fb9d564f07fe
SHA256d9a65079b2310290aa118596544ddc146f47e20a347039b1851e88dd4eeb6bb0
SHA5125d679bb2e34be952623afcdcce11240ee5c9507f523ba988ce27c266162ef04fa05ba89d16eb1009a90d80ff2df8d3788d7a40853d946756292afeddf2c1d8ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f89ac7d74ff6b04ef91b7b0001d50684
SHA1fde58441ede0f0584ed3483288a857d36250ae13
SHA2562e08db45157d2d882bf0a5457faaf8aa91af7fe404ed4946905fe5500012afd9
SHA512311229f67cff2bd8a4af522ad1f552ca07c5cc926703da7f67a5ca71fc565b17cbdd894cc3cc74470f0f4a213d5d651a3f8694cb126b8ecef9ae618cb406cf28
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CFE70871-8F90-11EF-BCE0-DECC44E0FF92}.dat
Filesize5KB
MD594d9ae9eefe3448c927c85899579691a
SHA1f0916dec3921adcde83b86aa4fb8e862d048c1eb
SHA2565d9b62d35cf5769fcb57e6a2cfe251b5b17fa48476ea0a5f6989d9342a21e0ff
SHA51240a07b857257b471632700bc049043930d12582ec8f9bc1a0abd2a8abd16d740f6fa5c934e9bd6760f5c450e9f9e2101288dba98ee8565fba43a05afb56045a5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD5272fb6e32f182f81ce229dfc45cce90c
SHA1d3f29cb7b3282b3f11ccca678301738ed119cdde
SHA256add3bb6ae51b86c1a2b314ae61b78a6116f99d6ca60e3ca4aa61e16a10cecdb7
SHA5124c4024c5c2f6d151db5dc255b2fbd83388a0feaaf09601cedb949acaf06d196cc8161310c8f4c7e0aa50f25d3bd8880c8dc294e6b4d8973fd5863b77b7660d76
-
Filesize
392KB
MD56653ef20d2a3a6ef656d9c886ebabd93
SHA1bb0cc0b05bb70a3d347faa94fb36a35c771b0692
SHA25648ff838a7fe98ec2c5bb59a8a76100047abcfa6db824f4982b8e7fdf2110f05d
SHA512b68b37147ce0d1389d62f5f72ebb616edc7d2ed2aaa484e85f6dc4b6070c9ce973a523e11e311686dc0efb0757fe52dcfa430afb1f48f98ecfdc257c6f3cc360