Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
38a0c2641e4...18.exe
windows7-x64
108a0c2641e4...18.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Pwgen.dll
windows7-x64
3Pwgen.dll
windows10-2004-x64
3_.js
windows7-x64
3_.js
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03/11/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Pwgen.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Pwgen.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
_.js
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
_.js
Resource
win10v2004-20241007-en
General
-
Target
8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe
-
Size
244KB
-
MD5
8a0c2641e45b3c5b473f69183c57cbf0
-
SHA1
8553f089e9d0b2eed4b7a1674ae568e4bc803db6
-
SHA256
14543e3fca12e0f56f2b88905ab0103ba4e049be8e9a12be30de38659ba8113c
-
SHA512
36dedb28aaae39019de8d45761377ae9156edece9513a4a9015f585132832049977a841ec7fee17764c0f6eda2afd2db65a369bbfa4686bc8ad09b559b5d2ae0
-
SSDEEP
6144:vkieBa28s1lxE2Xl9Kzh1CAyDDgHpEcHTXRnB8CteHR6+:TO8sbxE219mh1PyDDYWcRBtE
Malware Config
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\# DECRYPT MY FILES #.txt
cerber
http://pmenboeqhyrpvomq.0vgu64.top/7080-8D56-9DDD-006D-F923
http://pmenboeqhyrpvomq.wz139z.top/7080-8D56-9DDD-006D-F923
http://pmenboeqhyrpvomq.r21wmw.top/7080-8D56-9DDD-006D-F923
http://pmenboeqhyrpvomq.pap44w.top/7080-8D56-9DDD-006D-F923
http://pmenboeqhyrpvomq.onion.to/7080-8D56-9DDD-006D-F923
http://pmenboeqhyrpvomq.onion/7080-8D56-9DDD-006D-F923
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\openfiles.exe\"" 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\openfiles.exe\"" openfiles.exe -
Contacts a large (521) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid Process 2984 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\openfiles.lnk 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\openfiles.lnk openfiles.exe -
Executes dropped EXE 4 IoCs
pid Process 2260 openfiles.exe 1784 openfiles.exe 1600 openfiles.exe 1004 openfiles.exe -
Loads dropped DLL 8 IoCs
pid Process 1712 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 1712 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 2792 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 2260 openfiles.exe 2260 openfiles.exe 1600 openfiles.exe 1600 openfiles.exe 1784 openfiles.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\openfiles = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\openfiles.exe\"" 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\openfiles = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\openfiles.exe\"" 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\openfiles = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\openfiles.exe\"" openfiles.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\openfiles = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\openfiles.exe\"" openfiles.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA openfiles.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp2C9C.bmp" openfiles.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1712 set thread context of 2792 1712 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 30 PID 2260 set thread context of 1784 2260 openfiles.exe 38 PID 1600 set thread context of 1004 1600 openfiles.exe 42 -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote-PipelineConfig.xml openfiles.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.html openfiles.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.url openfiles.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\ACADEMIC.ONE openfiles.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\PLANNERS.ONE openfiles.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\DESIGNER.ONE openfiles.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BUSINESS.ONE openfiles.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BLANK.ONE openfiles.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.url openfiles.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.txt openfiles.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.html openfiles.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.txt openfiles.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.vbs openfiles.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote.ini openfiles.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.vbs openfiles.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\forefinger openfiles.exe File opened for modification C:\Windows\ openfiles.exe File opened for modification C:\Windows\forefinger 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe File opened for modification C:\Windows\ 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe File opened for modification C:\Windows\forefinger openfiles.exe File opened for modification C:\Windows\ openfiles.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2984 cmd.exe 2340 PING.EXE 2136 cmd.exe 3028 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x00050000000195ff-49.dat nsis_installer_1 behavioral1/files/0x00050000000195ff-49.dat nsis_installer_2 -
Kills process with taskkill 2 IoCs
pid Process 2708 taskkill.exe 1752 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\openfiles.exe\"" openfiles.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\openfiles.exe\"" 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop openfiles.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76A05B61-99AC-11EF-95F7-72BC2935A1B8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{767582A1-99AC-11EF-95F7-72BC2935A1B8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000b0a01a5c0b272efdc75826dc8eef3268b4f80bfa7f586000511a03b6edcadd16000000000e80000000020000200000009fd98607ce9b77de397be06b9a0e9fe95e7309158f0b7fe11266783415596c0a20000000099f0706b4399657e03b6ad357f7ed953cb11e71b41e6ee5e5ede1befd8436a5400000007c096826014be26f282ee105d14bead6bb04472be237638d8f652a0a6b49e153bc7f6776b4f73fe2f0afcd64f7334f2d67fb5c7db152b187ed42bd26c9a6bbf1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603be439b92ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3028 PING.EXE 2340 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe 1784 openfiles.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2792 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe Token: SeDebugPrivilege 2708 taskkill.exe Token: SeDebugPrivilege 1784 openfiles.exe Token: SeDebugPrivilege 1004 openfiles.exe Token: 33 2116 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2116 AUDIODG.EXE Token: 33 2116 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2116 AUDIODG.EXE Token: SeDebugPrivilege 1752 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2800 iexplore.exe 2800 iexplore.exe 1876 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2800 iexplore.exe 2800 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2800 iexplore.exe 2800 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 1876 iexplore.exe 1876 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2792 1712 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2792 1712 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2792 1712 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2792 1712 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2792 1712 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2792 1712 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2792 1712 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2792 1712 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2792 1712 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2792 1712 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2792 1712 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2260 2792 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2260 2792 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2260 2792 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2260 2792 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2984 2792 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 33 PID 2792 wrote to memory of 2984 2792 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 33 PID 2792 wrote to memory of 2984 2792 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 33 PID 2792 wrote to memory of 2984 2792 8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe 33 PID 2984 wrote to memory of 2708 2984 cmd.exe 35 PID 2984 wrote to memory of 2708 2984 cmd.exe 35 PID 2984 wrote to memory of 2708 2984 cmd.exe 35 PID 2984 wrote to memory of 2708 2984 cmd.exe 35 PID 2984 wrote to memory of 2340 2984 cmd.exe 37 PID 2984 wrote to memory of 2340 2984 cmd.exe 37 PID 2984 wrote to memory of 2340 2984 cmd.exe 37 PID 2984 wrote to memory of 2340 2984 cmd.exe 37 PID 2260 wrote to memory of 1784 2260 openfiles.exe 38 PID 2260 wrote to memory of 1784 2260 openfiles.exe 38 PID 2260 wrote to memory of 1784 2260 openfiles.exe 38 PID 2260 wrote to memory of 1784 2260 openfiles.exe 38 PID 2260 wrote to memory of 1784 2260 openfiles.exe 38 PID 2260 wrote to memory of 1784 2260 openfiles.exe 38 PID 2260 wrote to memory of 1784 2260 openfiles.exe 38 PID 2260 wrote to memory of 1784 2260 openfiles.exe 38 PID 2260 wrote to memory of 1784 2260 openfiles.exe 38 PID 2260 wrote to memory of 1784 2260 openfiles.exe 38 PID 2260 wrote to memory of 1784 2260 openfiles.exe 38 PID 1224 wrote to memory of 1600 1224 taskeng.exe 41 PID 1224 wrote to memory of 1600 1224 taskeng.exe 41 PID 1224 wrote to memory of 1600 1224 taskeng.exe 41 PID 1224 wrote to memory of 1600 1224 taskeng.exe 41 PID 1600 wrote to memory of 1004 1600 openfiles.exe 42 PID 1600 wrote to memory of 1004 1600 openfiles.exe 42 PID 1600 wrote to memory of 1004 1600 openfiles.exe 42 PID 1600 wrote to memory of 1004 1600 openfiles.exe 42 PID 1600 wrote to memory of 1004 1600 openfiles.exe 42 PID 1600 wrote to memory of 1004 1600 openfiles.exe 42 PID 1600 wrote to memory of 1004 1600 openfiles.exe 42 PID 1600 wrote to memory of 1004 1600 openfiles.exe 42 PID 1600 wrote to memory of 1004 1600 openfiles.exe 42 PID 1600 wrote to memory of 1004 1600 openfiles.exe 42 PID 1600 wrote to memory of 1004 1600 openfiles.exe 42 PID 1784 wrote to memory of 2800 1784 openfiles.exe 43 PID 1784 wrote to memory of 2800 1784 openfiles.exe 43 PID 1784 wrote to memory of 2800 1784 openfiles.exe 43 PID 1784 wrote to memory of 2800 1784 openfiles.exe 43 PID 1784 wrote to memory of 2172 1784 openfiles.exe 44 PID 1784 wrote to memory of 2172 1784 openfiles.exe 44 PID 1784 wrote to memory of 2172 1784 openfiles.exe 44 PID 1784 wrote to memory of 2172 1784 openfiles.exe 44 PID 2800 wrote to memory of 2936 2800 iexplore.exe 45 PID 2800 wrote to memory of 2936 2800 iexplore.exe 45 PID 2800 wrote to memory of 2936 2800 iexplore.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\openfiles.exe"C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\openfiles.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\openfiles.exe"C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\openfiles.exe"4⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:472065 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:2172
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:1892
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "openfiles.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\openfiles.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2136 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "openfiles.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3028
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe" > NUL3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2340
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {04D80716-8CD6-4FCD-9102-FB25325BEBD0} S-1-5-21-2039016743-699959520-214465309-1000:PIDEURYY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\openfiles.exeC:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\openfiles.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\openfiles.exeC:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\openfiles.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1852
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:1576
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2116
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5679041737ce618ad6ee6d601e9d808a5
SHA18e3e7d729bfb109735e301088f53f67931590db9
SHA2569a3c8f3358fba81e444fc5630ed5bd52e60ef7e8f4839c2198e4380717bc9ba7
SHA51218349d3f88eefc771645643d8c79ba75039eef2f0e3f11b280ed07e98840f9047c751af3d89b6e94c2ed0a937b244e8ce0ded040e65424451ebc8615840f4201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ed50c2823fd357c9c7344fb0025de0
SHA131917c51a03fabaa11d18f9fb46e02ba0116ad6f
SHA256c3dda9375f63c5f770e0792e4ffcf63072b8d4ac4560a4cb926100799f17be4f
SHA512b553231d97bbaaca48409f06a8ba2c2e73ddac6519f6ad9e1fb409179f620bde93283751a9414d9f08df5ee6494009d3aced59aa8fd7c98cf25be4433ee7cbea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5661db164d36d64a2d0bcc1f8a6389ab0
SHA16ad0777fc2bef3ee0d0b533e5018c2793f40dd0c
SHA256364160ec860b7e1ceea945a2a1d84059cb435a380be6fa0b6815a1b64abb9936
SHA512c168eb5c070dddc1a780549e789b1f9e61227c9e6825cf5d091d814b4be06c3e1265f6135839414b89a1f13a993eab525770235ade18ce816fa12111e9555be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582989a2e84f46cc24cd13187295b103b
SHA116084a465b86a7528041dc0abdcd7d2bf2d13a15
SHA2568d05095c8b7099e85ab41e32e4200537a71148cca9398365b8db6b28b7f2dd8f
SHA51293e3b9b0289d2e605202a3881a36fd5f01e5246fbffd98873e35f2116f842be1fcb3463d32bf8be53a1a4697f298b02946bc314af679a37289b55f70c328221d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54242afcc130458d169f14c483978ae90
SHA109c419c4015b0d7b6ced6744e413bc782275be7d
SHA2567a102c595a40e6d93285b32e316a3e259e3de1cbacc2eec7ee2b107758cb00fc
SHA5120cab6eb6f97259d070113c977d98d39060867772bbbfee4c71b2ce2bc966d5c6c4c3e1c0a477fbf0b98e0332559efd140531e19fda5cf7fd006ac450aa85c806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a94ef2361a4d9c2622f7bca114b96b0
SHA1967365c546c4066e44638689579a79287ef5bde9
SHA256c8874d1d0ac42fc711529f120a0c1ea9471d6690d71c4f61e4ecdc27500e2b54
SHA512c6beb4a152bc06aff58289e2a6e5f6fb65f7a8b6a79c9b776ea8ea10da5c73c30329e255fbb6e8e261519de6cf57989ff46d0e2ff82b2828a79213531ce2f0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b0eeaca0599d5616fb46e4801e4bee
SHA1080450fa6c10fa5e8e6d0e6d9899fdf477c29bf2
SHA256d48f0551a48bdd3f5ad34cdd582925a95f5b55805ac5a39671bb7e83b7832a5c
SHA51279e17dc08235f037cb921a058d554d205644ccc3fd0c3e8dff5d9f9b08409a0c4f425d55f4364c1463ec953bce7bce1bc68954527f6a4184ae7ce3d35b3c14aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3eb675172a9fa07fd215b543768c5ba
SHA158d284b06553ddd8c7f15684dd4a6294b837eb06
SHA256c6ba2845c9ea8ff1bacaf437a12cc55743355516c08ab3603ebf8594f0927509
SHA51228fe4137fa480a8f4496a25778cddd14869ac7d530b92763ea1f13824bd76768e68c76d799be565be0328d658d831d63246c3574e49b68ea775891928722f363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eae8499f5545d02f310b5b6b471be67
SHA14181c9365f6b5dfc622ef423d0eddca06544d4a2
SHA256905f5000ba997161724fcaffa44708d3bf43d151f175b0f489fa6ec2025ab7fe
SHA51273d3e8c950427733221b89241c3a7f9f3c45fb6682dd4c5044539cb72bef39c57c28504d1205fe666b0711e0a097d1e14255720dd65741f9ef05d7e76b393ee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b58914f312a2a501a9e96a6dc936216d
SHA142406a67afcd2bb9d6f075552388742aeb5c1568
SHA256b417281ed586c9b964bc4fd7360853909d24b9a3991a9875c60c16b058330c70
SHA5127a3748bb6cf5f74527bdf46218ae75acf813aec78a3412a75928f8c33942a8da93011e4138a368cf56afe8792e64c17e9cb3cce62fd51ccfb7ed9843d384bd57
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{767582A1-99AC-11EF-95F7-72BC2935A1B8}.dat
Filesize6KB
MD579703bb1a4c00c8ed2f7b20994dc2248
SHA16a8ab532a28267ea3f6ec40d6350628964cb1885
SHA256cea14b74e8292ef61ef74cdcb2eaf14305e59d2c587fcc7c2dfe4e7498861acf
SHA5127f04514b56af367da143322072c73fd1d81daa6a57730475196a786392ae5d6ed7e6a11459bf78852d27c8fa9c6bc8114f312775f87b6b64abc3d68123880d71
-
Filesize
922B
MD5b327f714f4ca746733f335129136f01e
SHA19e73ebaf229d43dba61da0fba7392039d99cde0b
SHA256e1fa52366cfb7518c1269a6d52de74b567a0c352a141725a7f35abca022dee1b
SHA51286cd7acd2e692ddd4f07073b973b4ff18cc4d31faff54d320a8421eeb265059279f7c28a22112e23cee03e1d2cb37b9a1a329a2b21df7d89acfe9a842c320d69
-
Filesize
4KB
MD53a55f29d68c69ba9d51ba990c1826c00
SHA12ef1871466f55111c8c3e2d65e5f684b48ea30fa
SHA256dd2792ec4cebb647c5b4b7775c78862cecc42d87d72492642183a5f4b26ece19
SHA5126904e53751209bf12d19a04859be41fe19a7e58a88d41e24edd083a661884ff303956be9c22af94d422c8786e2dc1a624a4eace3d93c6d0ae838d2194c37c84c
-
Filesize
77B
MD54ab96999f28ba4b075188be03072b6dd
SHA12a1293003921b5bd6f4751f02d27090293d12245
SHA256c9d43500b918ad58d7cc10cc98f73b0fd8de3743074b9c9b38f3f8657ab3cd3d
SHA5121ee024ceadae616900cc460b9210bde8c799e9e10229312fccd039fbc0f9c114d3ad148e3f120d25356e9ca7c07be69cea4aad7e28fe892f69809b8bc7390f38
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
27B
MD517534ee83a92a2d70abce2aa260abe12
SHA1aab0ac99816678115277832badc6ee7ffa690b43
SHA25653141538145b0c46ed3eb1f8dbdc1d8badb1061cfe6865232fee384bcb4d0b91
SHA512ddbb134b0d53df5c1872930cd8108a5fbaf6d1dd850987303d1a6a7faf7653a71ac0008798f0e30e360d3d82d475b24ddfd5d8e0e088528fa9580dc8ab6c032f
-
Filesize
27B
MD5aea56e4cc048a9d3ff31445372d346a1
SHA129ac5ffe91a926df97e1a3e04a0c76a22a6f5c8b
SHA256500ebdba5c37298efc86410f21dda65d2c0e59771605cd647694879de03533fa
SHA51215d93c0e845eeaa4d010077a0032c4dc765f71895089b3c04a2bd6315373e43ca473e65caefa8927a973a664093d585c58295ed7ad708cb20f9b8452de317920
-
Filesize
148KB
MD5705eb958cf1355f374f8f081ef0d63e0
SHA1c1668f3b82647b3193c144c97b51b651a9265979
SHA256f7279b4d4e75835d0e72a32363135f1cd5d9234eb72d15f930523b61c4bb738d
SHA5120ea24b3bf10035dac53f7d558ce8ab8f89ce7e72fc1b078cf687734d9bc66d4b4e01718727812068e59e562fc175be50d49b9ae98266e91bc5324a9c66e09f3d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD570a12429f0b20c26d121a2538099aca4
SHA1e6796ed228fa4691314bc99c2754a8d76512d1a8
SHA2560e86911736d8eec310a61888c9a2e954d4c95814514b4256af2802a55a1df779
SHA512f225b2cb7fd132a8437dd758f79bf8a2b5d2575798412337be9f8a9afca1cea807a769aa1a07d30fc44ba0d3208ae666ca4debfbac56328a491d50e24c866f26
-
Filesize
3KB
MD5122a8a2fa7fcb0dd3fc16f837feac89c
SHA181abf451ed1adb6951d8c0b067bf53047cf59480
SHA256ca3cc76ac417d68ac6fc56022e5c0225a54e04ed05ee66acb01be6eaacc8de57
SHA512aa5c44fd4f596c5233b96eb7874b3cd7a395af61479ecb5c7bd5d4a84c3a104c06754dd718d4fe3b31efa0f506789523f7278ad77e355de7001583b50f4bc0a6
-
Filesize
2KB
MD5411d77c4da856563aba36bcbacc83879
SHA1868e7e0ff63120a2dafb22e036d066dc6ade0ed3
SHA2561e2333b01209da29895e2f51fc836996bd61f42a61c00a613d663c628e173e19
SHA5120d10206144f681be4b5b9de9973b69752e04d8ec61c82bf19461e8076ed42e25a89c5915c92a8e6bd534fc97ac51d4382dc5327764b45e7119229afa58b438b5
-
Filesize
197B
MD56c0fb6fd9810560e7b438cdf662c2734
SHA126304263ffc6724e5bd5a0dc440d74f233bc2fa2
SHA256bff0a0f00c9adb0ac7bcc8421882b4bcd0fb5b47d278ed64cd661ec7dce51cde
SHA512d85b9b780ef0ecac44e9af6ca0c766c04dcbc22cf3bf65efd23395806042d8cdadebbe088d21a0be75b37b2c6ddeb7aa726483c9b139d4284ef6b51101ca8c8b
-
Filesize
2KB
MD54cb40bdad1a43c4fb89f7b4400076efc
SHA1ab2a3689957a412dbd3cd7f83e5aa35d44055941
SHA2561bb2e1d63f0787ad9a0e0ad8b3987c42f74d873211f440e6338f78bfa62d4ee0
SHA5120e444c130721fa155e28af88b21c0badced98ea2f1fd0df915cf07e4cf4b6d364e24a5babff81ad3246c5839595df520dc3e4d9a13635903f0e5ab4dc795a840
-
Filesize
2KB
MD5440ff2d813de32dce6a8eac522c6e69b
SHA10fc65a6d0eb99abecc95579307d0d9b35c8267a1
SHA2564af8f0f40f8d0470bca784bf1f5401acc268f06d9c8b25650cc92f65c78826e5
SHA51266ac4515c6a12bd8707e019da569b6edbb76b82cd48b2a4dcfbe21dcc1f9b36a7d961c6faf3c7c4737ae165fcab3fee2b947d751ff98683613c5236f1d14f502
-
Filesize
2KB
MD5e61986880dbf11a3f9c9e73ba1a5f821
SHA17ba2b4bc224e0f135b165ee164783513d791ebc4
SHA25615abed0f08ce04c57be1b84c3b76eeaa86cd4a7079896f20c652035246a23e06
SHA512eb707225978681ab2a2c70a7ce4f47a88c743e15bad91103dc96afb8951e8355b8cffdff7b2de1c26b661a35735740891cc64ecdb98de0c9ebd797de2b102a7a
-
Filesize
1KB
MD561bb87909569420e9d889bd076a11aef
SHA1668909823ee96cd46b76ffb4aba97e2335dd65da
SHA256386b26bffa39406bea409f57f8d332a590856554373b073b7b5b340d5e68eaca
SHA512fc873eb58c1a25f830ff3571b863c0da371f751d75052d3e77d1b94bb5ccead606ca19aaa73621467bbbc86aef817cfb9c9150f04af18f1c87846fc31f81f03d
-
Filesize
10KB
MD585a2537961eba0230243fa9464449938
SHA13562ad28daabe3d01999a1967ec28c4e061d297e
SHA256d7ea0cad3a0fd6368761b3884b45c5d72c856d3e2ec773aae79de10c69fe6346
SHA5129c0b86018f7aff7cd2e4365882943e734e5a7c332b3f638cf3956e82bdd8702739dd0e38e8ce2de847873d860c97a4dca43f035b1b7a7f5c3e946a288c2ed9e3
-
Filesize
90B
MD5b3ee31e8cc2b6e0b945675031bc0caf2
SHA10c504d784d854cd497d7f841febc360e456d7a0b
SHA2565211d823ae2b6870d08b45a40c97f0636e6ed0e43a0fbfe257bea2d50dc41ae7
SHA512feeb059ed8a62d9d600d7e833c4f3bb216ba15cfc79548896ac4c179c5b4bac4bff058b7ec2c0f2d71fb21e999b8e4ace6cf0ccd8cbd28e5a1e07e01478a4837
-
Filesize
213B
MD51c2a24505278e661eca32666d4311ce5
SHA1d1deb57023bbe38a33f0894b6a9a7bbffbfdeeee
SHA2563f0dc6126cf33e7aa725df926a1b7d434eaf62a69f42e1b8ae4c110fd3572628
SHA512ce866f2c4b96c6c7c090f4bf1708bfebdfcd58ce65a23bdc124a13402ef4941377c7e286e6156a28bd229e422685454052382f1f532545bc2edf07be4861b36c
-
Filesize
1KB
MD5365b2ba7e36680f9d288a7b374204360
SHA11e1005746bfa7c69c68f997f07b8fe4934aefb13
SHA256440778e897399deef7f9a1f0de80f80ce8a4e37ab1fee9347418e44ec48d26a9
SHA512ff5690dfbca1d43f2a930a7fd2a52f65df9477e5a0c28362b25e7bde6292263b88f03167dd4a876fb16e5ecc79f8f66fe6d3624c3a7f92880eb4b6627eb6e857
-
Filesize
19KB
MD57cc26d81e2b54007df0997d4a42f7329
SHA1d806891a6e39899457ac688bd3fe1d6ed9c05442
SHA25654d952cf7ba33fa2cab20c607c4dd255a3b3ae75a56d846869d9169602cdbecd
SHA512cbfd4af940c9c3edf295235530e296ad95fc2f4a1b008bd1d246f8edfd15f801720ea0d8213788ba3d9d57355fbda7749a8d2e6cf14f54a1e8efea9a13897ec8
-
Filesize
34KB
MD5eab0c0a99549fe4fc568b20331d1db27
SHA14cc1a151bf4ef04be4c41278e42f11dd44f937c6
SHA256246696d31993da811c210de7455d9158d0f4e0e3f75ef4367a1fb43c7fe27764
SHA512094d6a63af23ae2ca54dfaf4ce59ae9c266c7de34e60828e4c5f636ab256be17da99061ce2965b99c4cce7a58f4f0c05ab09d38dcd0c2aba31d8b26d70ae7d55
-
Filesize
11KB
MD56f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1b6ac111dfb0d1fc75ad09c56bde7830232395785
SHA256b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
SHA512a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
Filesize
244KB
MD58a0c2641e45b3c5b473f69183c57cbf0
SHA18553f089e9d0b2eed4b7a1674ae568e4bc803db6
SHA25614543e3fca12e0f56f2b88905ab0103ba4e049be8e9a12be30de38659ba8113c
SHA51236dedb28aaae39019de8d45761377ae9156edece9513a4a9015f585132832049977a841ec7fee17764c0f6eda2afd2db65a369bbfa4686bc8ad09b559b5d2ae0