Analysis
-
max time kernel
132s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 02:47
Static task
static1
Behavioral task
behavioral1
Sample
8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe
-
Size
186KB
-
MD5
8ec363843a850f67ebad036bb4d18efd
-
SHA1
ac856eb04ca1665b10bed5a1757f193ff56aca02
-
SHA256
27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
-
SHA512
800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684
-
SSDEEP
3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.zmvirj.top/704F-F052-8489-029E-D3D7
http://cerberhhyed5frqa.qor499.top/704F-F052-8489-029E-D3D7
http://cerberhhyed5frqa.gkfit9.win/704F-F052-8489-029E-D3D7
http://cerberhhyed5frqa.305iot.win/704F-F052-8489-029E-D3D7
http://cerberhhyed5frqa.dkrti5.win/704F-F052-8489-029E-D3D7
http://cerberhhyed5frqa.onion/704F-F052-8489-029E-D3D7
Extracted
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Contacts a large (16390) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\WerFaultSecure.exe\"" 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\WerFaultSecure.exe\"" WerFaultSecure.exe -
Deletes itself 1 IoCs
pid Process 2420 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\WerFaultSecure.lnk WerFaultSecure.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\WerFaultSecure.lnk 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 2800 WerFaultSecure.exe 1172 WerFaultSecure.exe 2652 WerFaultSecure.exe -
Loads dropped DLL 2 IoCs
pid Process 2112 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 2800 WerFaultSecure.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\WerFaultSecure = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\WerFaultSecure.exe\"" WerFaultSecure.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\WerFaultSecure = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\WerFaultSecure.exe\"" 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\WerFaultSecure = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\WerFaultSecure.exe\"" 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\WerFaultSecure = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\WerFaultSecure.exe\"" WerFaultSecure.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WerFaultSecure.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpF9CA.bmp" WerFaultSecure.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WerFaultSecure.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WerFaultSecure.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WerFaultSecure.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2420 cmd.exe 2620 PING.EXE 2184 cmd.exe 1068 PING.EXE -
Kills process with taskkill 2 IoCs
pid Process 2764 taskkill.exe 2760 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\WerFaultSecure.exe\"" WerFaultSecure.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\WerFaultSecure.exe\"" 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop WerFaultSecure.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436859042" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72C26F51-9A6B-11EF-A742-6E295C7D81A3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72D318F1-9A6B-11EF-A742-6E295C7D81A3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000079830e98bdf259799d7787dbd5479c539f1097393104eb01c9f0b845324b4d50000000000e8000000002000020000000d9b52114956b39efdb69b683316145f6db7b37d42c425da3834e95aaae51433e200000007c7c1f635da39fef7ad6e12fd0c96fae3bd501d4d22a821d32808e53b5a9d7a140000000de722b2037ab493f04b27e65e12af7aca30c85a6513832defff1628cf98fca79895ffd809aa55601a8caffaf9c9b288ddc591335f57af166f99d5564fd97ed2c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01ecd35782edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2620 PING.EXE 1068 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe 2800 WerFaultSecure.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2112 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe Token: SeDebugPrivilege 2800 WerFaultSecure.exe Token: SeDebugPrivilege 2760 taskkill.exe Token: SeDebugPrivilege 1172 WerFaultSecure.exe Token: 33 3012 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3012 AUDIODG.EXE Token: 33 3012 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3012 AUDIODG.EXE Token: SeDebugPrivilege 2652 WerFaultSecure.exe Token: SeDebugPrivilege 2764 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2340 iexplore.exe 624 iexplore.exe 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 624 iexplore.exe 624 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2340 iexplore.exe 2340 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 680 IEXPLORE.EXE 680 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 2112 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 2800 WerFaultSecure.exe 1172 WerFaultSecure.exe 2652 WerFaultSecure.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2800 2112 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2800 2112 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2800 2112 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2800 2112 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2420 2112 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2420 2112 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2420 2112 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2420 2112 8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe 31 PID 2420 wrote to memory of 2760 2420 cmd.exe 33 PID 2420 wrote to memory of 2760 2420 cmd.exe 33 PID 2420 wrote to memory of 2760 2420 cmd.exe 33 PID 2420 wrote to memory of 2760 2420 cmd.exe 33 PID 2420 wrote to memory of 2620 2420 cmd.exe 35 PID 2420 wrote to memory of 2620 2420 cmd.exe 35 PID 2420 wrote to memory of 2620 2420 cmd.exe 35 PID 2420 wrote to memory of 2620 2420 cmd.exe 35 PID 2584 wrote to memory of 1172 2584 taskeng.exe 38 PID 2584 wrote to memory of 1172 2584 taskeng.exe 38 PID 2584 wrote to memory of 1172 2584 taskeng.exe 38 PID 2584 wrote to memory of 1172 2584 taskeng.exe 38 PID 2800 wrote to memory of 2340 2800 WerFaultSecure.exe 39 PID 2800 wrote to memory of 2340 2800 WerFaultSecure.exe 39 PID 2800 wrote to memory of 2340 2800 WerFaultSecure.exe 39 PID 2800 wrote to memory of 2340 2800 WerFaultSecure.exe 39 PID 2800 wrote to memory of 2436 2800 WerFaultSecure.exe 40 PID 2800 wrote to memory of 2436 2800 WerFaultSecure.exe 40 PID 2800 wrote to memory of 2436 2800 WerFaultSecure.exe 40 PID 2800 wrote to memory of 2436 2800 WerFaultSecure.exe 40 PID 2340 wrote to memory of 2348 2340 iexplore.exe 42 PID 2340 wrote to memory of 2348 2340 iexplore.exe 42 PID 2340 wrote to memory of 2348 2340 iexplore.exe 42 PID 2340 wrote to memory of 2348 2340 iexplore.exe 42 PID 624 wrote to memory of 680 624 iexplore.exe 43 PID 624 wrote to memory of 680 624 iexplore.exe 43 PID 624 wrote to memory of 680 624 iexplore.exe 43 PID 624 wrote to memory of 680 624 iexplore.exe 43 PID 2340 wrote to memory of 2908 2340 iexplore.exe 44 PID 2340 wrote to memory of 2908 2340 iexplore.exe 44 PID 2340 wrote to memory of 2908 2340 iexplore.exe 44 PID 2340 wrote to memory of 2908 2340 iexplore.exe 44 PID 2800 wrote to memory of 2748 2800 WerFaultSecure.exe 45 PID 2800 wrote to memory of 2748 2800 WerFaultSecure.exe 45 PID 2800 wrote to memory of 2748 2800 WerFaultSecure.exe 45 PID 2800 wrote to memory of 2748 2800 WerFaultSecure.exe 45 PID 2584 wrote to memory of 2652 2584 taskeng.exe 49 PID 2584 wrote to memory of 2652 2584 taskeng.exe 49 PID 2584 wrote to memory of 2652 2584 taskeng.exe 49 PID 2584 wrote to memory of 2652 2584 taskeng.exe 49 PID 2800 wrote to memory of 2184 2800 WerFaultSecure.exe 51 PID 2800 wrote to memory of 2184 2800 WerFaultSecure.exe 51 PID 2800 wrote to memory of 2184 2800 WerFaultSecure.exe 51 PID 2800 wrote to memory of 2184 2800 WerFaultSecure.exe 51 PID 2184 wrote to memory of 2764 2184 cmd.exe 53 PID 2184 wrote to memory of 2764 2184 cmd.exe 53 PID 2184 wrote to memory of 2764 2184 cmd.exe 53 PID 2184 wrote to memory of 1068 2184 cmd.exe 54 PID 2184 wrote to memory of 1068 2184 cmd.exe 54 PID 2184 wrote to memory of 1068 2184 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\WerFaultSecure.exe"C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\WerFaultSecure.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:472065 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:2436
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:2748
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "WerFaultSecure.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\WerFaultSecure.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "WerFaultSecure.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1068
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe" > NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "8ec363843a850f67ebad036bb4d18efd_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2620
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BED5F6EC-DCE8-4772-B481-A7536CFC6468} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\WerFaultSecure.exeC:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\WerFaultSecure.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1172
-
-
C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\WerFaultSecure.exeC:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\WerFaultSecure.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:2652
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:680
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:1676
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3012
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD51f0fcb32d583589b381b7a6bb24e3cab
SHA1ea0a7700f1999faaa98540d8b8db4d62bee0737d
SHA2561d714570f6628d2a3f6063848c8fbc10db6fec99b7f55fe94420f518a4223ed7
SHA5128a82b4086e28da998c1ddf3a38aa980a690a80905a55a32a59874de72b945272df9fa7a20bfaa71b679705444c3308a6cb2cc81cc866434f1e99800b4a5e77fe
-
Filesize
10KB
MD53e4b9e51be73fdf5041ed22f76475739
SHA16b53cac21de8ecc10161b30db70bb0cbc1854dfd
SHA2569c56d6cc5fa897e40a95919e2597e001dbad75f4399065adc5143828a424eea6
SHA512995546ae0ebc09d6f693a0d824b18498c0eac40eeeb57fa2cf24ce06663f50d5528ebc419fe4f5bdc6a966a16428fcb0bdfb84329667cc23dbb9856d30297917
-
Filesize
85B
MD5de8387d190f58c8d987c5b784ad17a98
SHA1b8fb6a6b42440a1bccf8724abe2b34ae8d3785da
SHA256a992c4915c058dc2ccaec1e57eba57779276396b6b18903dd609aa1e2bb854b3
SHA5125432c7eb68ab9cea36a96a98f0ce6008364392651aaaf75e9dd981bc5fb9af0698e01f98473bf2e0becd84387f579e448130f95a9ad4eb922e5cdf1d3c85fdb1
-
Filesize
225B
MD5f6d629f2a4c0815f005230185bd892fe
SHA11572070cf8773883a6fd5f5d1eb51ec724bbf708
SHA256ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f
SHA512b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527933c3066647d88b0d279d798e1b54e
SHA1e6545cabc07a56415cf965320aeb9278932b989b
SHA25621398b8c500f51f52f08d9898f9e218c07a3f254101156795906987b960820be
SHA512968fbb184e5735d0d5b1bcb1bbeead22cbb3bddb2804cda86a98fd228f48c86726df4358bbce7602a84749b3dec2d68a55940f9893bef823572b0c9f2978793e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548e5518cf0a2dd2ab846acbfc91003a1
SHA14dc64b037cefdf295c2e9954da8da84bce0ee713
SHA2564dc07db3f5ffa17dc92864a30fed78b002f41d8ea068ec04bb53732d33f97b1c
SHA5123ee900e241a5c8eda4e08686cb3b0d8acdeba852543af6abfdfcab687c1294e46c6bb70bcae2141eaeeee0eca052de8031c0f03e5ff0b754bd78089982763550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ee5fd85a2cf6ee5848cd4facda5a9d
SHA17900f730526648fbca09b5a462707d2c0bbcfaab
SHA25694fac243bc0ffe1acce22e178fbeba71842239ddec8708e7061d9447722e84f9
SHA5124ae671f2568634c6173c0d725f832623668862063db09bacc45ec4a7c239f69342f251d167a071b17e627d283f91017a9e5bb981771e4f5e8d4a8a2f6af8fb52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e2b6bf4b56c6f1aeb105d2bb2968db
SHA12fb4ca2241c31b23e01e7a1a73162076c5b2b425
SHA256e3f03fe28e885aea6670abfc257dd84c388d7e0e8139a19b5c3f3d5362125d9d
SHA512b04ea7160a516dfbbd13e42864fa5ef5b2f6e00928172adf8f715d6263acbba5a00f600dac04b97a5df3e44d3833ae6fb60afb131b1739a885498b2affb5d5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc17fb17ca5e3e7ffe7c84f98859edea
SHA1083379136958d75d416baf539bb71fb36d90d552
SHA25604903390079f412719cf85fea2cedd6ac6c65a2fd4e5d547b3d3d3bf3b0e3397
SHA5128e05ece718a4a6d0c2611a33ff51211ce944cfe3bbb164cfcf3e74a5405cab8ae641a4c61edd773e9d99bdebbcb31fdea8afa85942a8a5fe169970f1d4fdeb94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa85369205e3e4b00402cee9d261a9e
SHA1ec1c44fe2b6a8e5e6f9e4451a3f932259c81dbfe
SHA256fb3e85cb86daaaef99c2ad7dd201585b5066a6eef57ebf1f631f7be4db966327
SHA512d9e56f3c76e98c2222eee1cd07ba6a89f26c1f4d2e42e5bc9d583bbf3bbd8a593018162e491d1c5a414ff79b89546302118d94e18ffab20324b40196b563df5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5956212721a98bce787f09a8063cc0538
SHA1d656bb5fce4277e53c45858a652aa7935d401818
SHA2562d54f2982eb0ded7477db7e9c207f4fcf0ce94283f5d8de81ad47f5b5054da61
SHA512beeb0f8af5d94c98cdea465b663b932a82668c16fee550dca727fb0d1a8323f679dbe1d75fe5b062e92c98023939a612dbbaa2298c8751ea7a547edf52da95a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5489a673416a89f9e5919f0d9f51d6a33
SHA1d33d93b60353ff80da817398b3b32691fd636fcc
SHA2565f40eb2bce3e302a2656fb8a79b79fabda1667ee287ce09ddc11ddc0ddcd2dcf
SHA5127a191404c0e7f0a6e1c97ecfdcde8b13b653b49741b0f4c728ce8035b9c30b773ede2846f481fafbe5f1a05a924e9389a044356cd4c73e78d18b9459909c87cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c3acda2e69a8d6e1d2cd82577d9a9cf
SHA1e1d8ba5799c4f0da8af8b105b47a532fe863c644
SHA2560a677381f989c26f168f3dcf8f2cb8c3d14dd40b74c17f85ff5f15329657852d
SHA5129b39ca551e21c1136082c7a005cb0246c7b3bc5bda5f6fe37b8e361272882ff57c971ff3bdcbe1dc75020a82888609bd5f6d38b732145c51b11af9f319d1a1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c40e21b10476e1618b317a53a94235e
SHA110bdaafa4de497b40b64642a5bafa73c0c953d60
SHA2563f6eb7ee3c070d36ed5a250d85683f9ed2812b1a5cee7c436ae4ba5ca96311b0
SHA5127eb9c9b0040308e5507d2f41842f3a77261d3b5edb95fb6230bc7c279aa4916f33f47392e680e976a2e76324dc6771b53ef3d404f17b28413181429c86c34901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a68ac64a3df2356b5f8aa480b65481
SHA175b1d4228b0940ee8be63e230579674686278083
SHA25698a042fb6d677ea0410bdb14b7ad760b67a70646fed901ffde77fe2cd920a177
SHA5122e440d337cb63feeb210b3aaf3d239cdce713daedefccdda044410cab643fd87e7144fdd2c0e19fbbf8dbf47ea098e18422918b87023cce9e7014853e7fc6c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596db58cbee1f402f0456584611d2c168
SHA100064260723a982b7bc745efbf5a520d3aec3190
SHA256cdd5b8e9417503955346412bc5a7804dc1cce63a02c0226d94d0cf1976fa6c3f
SHA5121cb317c6350c65e5b30e9b1644a71ed45080c3ed372e6011ff1343db97d1f49b340003017688efea105880a2f3510fb54ace6ff2fe46ee99c7dae6b8adbc358d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df6cfbb22627c541a75e34376ab74f85
SHA1d0d201b3a6fcc54430e0c616d8dd91a7d2067e4d
SHA256b1aca542c1d6210989ff35396f97535bd71c171950b5eb70ae22d01ce4579d2c
SHA5129a1da22f6ebc0bbed920e4e37818a94892a32e20a79b4d257bd39d1351e6af77c4d8b2046ef78d10dc026fa81cd2aa279160801150f17bc4968902473c6468e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e7a3c3508dd330bb0c36e2dfb97b042
SHA19572ef728aae282f012f15d482b0010f3b81e1e5
SHA2561b0a46ce932bfdf0500de7f5702d01e235fba03f27fb82fe61dfaf6858835cfd
SHA512be076de4c9095579a0038d25f7766ecb79f34fdf50db1cad91aef3e526718a304ea98f25213a0705b950f87b8ec7a7aee5cea3df0025503a9eaab2d6f2dd60ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f3f156a23331d37727a5b00246b9ab
SHA188c069c688b73c76dcb950facac80b178ee84d61
SHA2569cc959ff125658e001d1adf9497b3db99a617bd8ae8427bc9f98b8d4fcd26ac7
SHA512f412659fc4ab12d27e150563f9011622c117a25d32ae0dd3347cc9531c94a347495a09db823ff5327a1ef17f04247027f77f19da47f881cc96d81f94a52fa79c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbe2106b0255b430b12c975e7da9c144
SHA1b78cabf3de324e5c989cbc530efdac4aa654df6f
SHA2567425ccd1f2311f69ef5499da0457c98be0588105f2c4a839840e3d5cd838bf8c
SHA512111b10f296e1c53eb5359e2333deae4fcd2738a22b5247c84bd5c6196bc0afbb445852843d4835b17509b169665c63b93ded1d2cf64443cd94c1ee18d9cce77a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1cf368e2f34dda55cb4b2ae74388c0c
SHA108bd92edcaca98c0b008789f80d26b9956830bf0
SHA256c9a2978223c00b6a4f492294846a0b364a376f066e6ada8a9d33a1398636c9c7
SHA51268e3dd8e492dea881fd26d4b58c446aaa625740a7ffc26618f5aa63fe0560a1c4da64692a8022387316f0cdddcc0d41556cecd0d869ce402f92c10ec9d79c297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55063f395ed33638cfd2c34b78e14b8b0
SHA199ea2bbd23a769c560d24f1664c867643ff455d6
SHA2562b97a8e5317db1d728a27541518693be99ceadde9b4018759755dccf885e635a
SHA512d37326cb72bff1e3449d7998c00445157563b1e406f5a563091dd3569f752f7dac9eeab984d74cb3c7853e4087d07c2797cd7eb7b0572fff4e5be2c4d0d4d3b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ea28ba08f573db33eb143b69135524b
SHA199e0f5d7bce0f67cdd28534be7dfcfc7bd13f256
SHA256984a62cd3e11a0282054c91ab908d04bf91d65ada36b53fd8c643e8db5cb0841
SHA512e7d69aff9b9e6ea9d583868264373d259c77d3fdd6c4bc7099cab540319281bf1d1d464a9b97c87e282c68f7e3fae5cd7329e619e12041520c4246b40ff01af9
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{72C26F51-9A6B-11EF-A742-6E295C7D81A3}.dat
Filesize5KB
MD5fb12dfc90154b8f0b0bf679914cc6d1f
SHA14400da852c63b3ccdf96f3754a5856afba4313ec
SHA25687c413ad3ea0d6725ca26a333d54d5eb5b6f6c1e6e2a22a2a26074fb8f732386
SHA512d1bf952b43f554016d51286777a8b3e5eb69ee1ee0bd478d4d5dcb955f5cfbce7a6f85c72058ebbcab80177f809bdd63c4ab42612e9843f78c93e35027229a41
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD5a0b57abccc0e0a4b1cc62d1793ac4609
SHA1f06393b006e3420988db3bd4a2803d8dcb485dc4
SHA256da967f43c2204d19e71132d3717b6bcb41c41b52d687e43569719838ea3ac5d5
SHA5127e6c74a3d55df989640df92ef2f05d5580f7d7ccaa7fa49853de0773f7602982c444f8b624ff5bf0505c24692009b9c2e8f7b525a1110e2dd9d97ac0c2b94c4a
-
Filesize
186KB
MD58ec363843a850f67ebad036bb4d18efd
SHA1ac856eb04ca1665b10bed5a1757f193ff56aca02
SHA25627233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8
SHA512800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684