Overview
overview
10Static
static
3a81ffcb94c...18.exe
windows7-x64
10a81ffcb94c...18.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
343144697095160.js
windows7-x64
343144697095160.js
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 13:46
Static task
static1
Behavioral task
behavioral1
Sample
a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
43144697095160.js
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
43144697095160.js
Resource
win10v2004-20241007-en
General
-
Target
a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe
-
Size
204KB
-
MD5
a81ffcb94c5726d6ffe4deb5fe4e3710
-
SHA1
1a591e00a93298be98678d32b69ca99f14e03e9e
-
SHA256
557890aa4632ea29e35e2ca9eb41bd1136913c167c9e4f3d17483f1431563b14
-
SHA512
81ed860e7e1548336ce41a098a3713a388e1885ab3a0e740e8074b802b00d520c836adf39ec7a97dd36076f9b9d41bd286a5bcd481e207435a3d434830d1e87b
-
SSDEEP
6144:0W+7+eMgWNsT9UpVlNca430rIYqc1jqP+JZm0q:0RXWmT9UVN83fc1GmJZU
Malware Config
Extracted
C:\Users\Admin\Music\@[email protected]
http://52uo5k3t73ypjije.wf9li1.bid/6CBE-95FA-BFC2-0446-82E0
http://52uo5k3t73ypjije.zk95b8.bid/6CBE-95FA-BFC2-0446-82E0
http://52uo5k3t73ypjije.zp9i1l.bid/6CBE-95FA-BFC2-0446-82E0
http://52uo5k3t73ypjije.4c71wg.bid/6CBE-95FA-BFC2-0446-82E0
http://52uo5k3t73ypjije.onion.to/6CBE-95FA-BFC2-0446-82E0
http://52uo5k3t73ypjije.onion/6CBE-95FA-BFC2-0446-82E0
Extracted
C:\Users\Admin\Music\@[email protected]
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (523) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid Process 1952 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1544 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpA90B.bmp" a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1544 set thread context of 2668 1544 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 29 -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\@[email protected] a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\@[email protected] a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\@[email protected] a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BLANK.ONE a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BUSINESS.ONE a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\DESIGNER.ONE a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\PLANNERS.ONE a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\ACADEMIC.ONE a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2308 PING.EXE -
Kills process with taskkill 1 IoCs
pid Process 1808 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438877137" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802ff8f3d240db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000002b3f486b21160b9420ba89ee00542bba6db74f6ec7f1ff05cd9cf9f72172247000000000e8000000002000020000000d17f98fb45795dbf3f9ec0b88155cdeade3eb9c9173cf6f4c9238619e6afeb3b9000000092eb69d495e3ab1e49b4feaaca9f290a31f33e852bad877a0ac3419e3d55e56353f30b0a64b3e707ed62b295fbae953bee4c896f73b269f2b04f73a46dfad77b53d867f17467efdfa73272bd1033d429d91232273c33e9617b1517edcc8c26da5df3f141e311ec8358f1e44e8471a04b90ebadeb146d332f1671211026f23b47de070afece96232353d9265515ed0034400000009bed942cc7c691305985288e36e1e304a486d0d5ce55f30f8673e616331e29e45f329572c84af29272220b4e567c5f45875d2e4854772b1d1045a8edf68025e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{311F84D1-ACC6-11EF-86F5-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000001b6868001a31257cfb477c7de91f215789eb1819fe2841759162a88217a0e479000000000e800000000200002000000022025c507bf7783a3021cb2a3935a621b2082211f0aaf9ab38115c41b09e6b5520000000d3634d254c249bc44e6bdb8b74bdc24deb261fa2958bfafdf48a79805a5b177e400000002a0ca4a2da1336343a9ab4d09f8ee4b916b204aab65d064240a69743ce2bf2e0ad17f9814b710c09bade43e361a75a33706c5feecdcc5520759481924f505770 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{310EDB31-ACC6-11EF-86F5-E699F793024F} = "0" iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2308 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1544 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2528 WMIC.exe Token: SeSecurityPrivilege 2528 WMIC.exe Token: SeTakeOwnershipPrivilege 2528 WMIC.exe Token: SeLoadDriverPrivilege 2528 WMIC.exe Token: SeSystemProfilePrivilege 2528 WMIC.exe Token: SeSystemtimePrivilege 2528 WMIC.exe Token: SeProfSingleProcessPrivilege 2528 WMIC.exe Token: SeIncBasePriorityPrivilege 2528 WMIC.exe Token: SeCreatePagefilePrivilege 2528 WMIC.exe Token: SeBackupPrivilege 2528 WMIC.exe Token: SeRestorePrivilege 2528 WMIC.exe Token: SeShutdownPrivilege 2528 WMIC.exe Token: SeDebugPrivilege 2528 WMIC.exe Token: SeSystemEnvironmentPrivilege 2528 WMIC.exe Token: SeRemoteShutdownPrivilege 2528 WMIC.exe Token: SeUndockPrivilege 2528 WMIC.exe Token: SeManageVolumePrivilege 2528 WMIC.exe Token: 33 2528 WMIC.exe Token: 34 2528 WMIC.exe Token: 35 2528 WMIC.exe Token: SeIncreaseQuotaPrivilege 2528 WMIC.exe Token: SeSecurityPrivilege 2528 WMIC.exe Token: SeTakeOwnershipPrivilege 2528 WMIC.exe Token: SeLoadDriverPrivilege 2528 WMIC.exe Token: SeSystemProfilePrivilege 2528 WMIC.exe Token: SeSystemtimePrivilege 2528 WMIC.exe Token: SeProfSingleProcessPrivilege 2528 WMIC.exe Token: SeIncBasePriorityPrivilege 2528 WMIC.exe Token: SeCreatePagefilePrivilege 2528 WMIC.exe Token: SeBackupPrivilege 2528 WMIC.exe Token: SeRestorePrivilege 2528 WMIC.exe Token: SeShutdownPrivilege 2528 WMIC.exe Token: SeDebugPrivilege 2528 WMIC.exe Token: SeSystemEnvironmentPrivilege 2528 WMIC.exe Token: SeRemoteShutdownPrivilege 2528 WMIC.exe Token: SeUndockPrivilege 2528 WMIC.exe Token: SeManageVolumePrivilege 2528 WMIC.exe Token: 33 2528 WMIC.exe Token: 34 2528 WMIC.exe Token: 35 2528 WMIC.exe Token: SeBackupPrivilege 1728 vssvc.exe Token: SeRestorePrivilege 1728 vssvc.exe Token: SeAuditPrivilege 1728 vssvc.exe Token: SeDebugPrivilege 1808 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1504 iexplore.exe 3040 iexplore.exe 1504 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1504 iexplore.exe 1504 iexplore.exe 3040 iexplore.exe 3040 iexplore.exe 1504 iexplore.exe 1504 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 200 IEXPLORE.EXE 200 IEXPLORE.EXE 200 IEXPLORE.EXE 200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2668 1544 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 29 PID 1544 wrote to memory of 2668 1544 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 29 PID 1544 wrote to memory of 2668 1544 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 29 PID 1544 wrote to memory of 2668 1544 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 29 PID 1544 wrote to memory of 2668 1544 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 29 PID 2668 wrote to memory of 2824 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2824 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2824 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2824 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2528 2824 cmd.exe 32 PID 2824 wrote to memory of 2528 2824 cmd.exe 32 PID 2824 wrote to memory of 2528 2824 cmd.exe 32 PID 2668 wrote to memory of 1504 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 38 PID 2668 wrote to memory of 1504 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 38 PID 2668 wrote to memory of 1504 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 38 PID 2668 wrote to memory of 1504 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 38 PID 2668 wrote to memory of 1700 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 39 PID 2668 wrote to memory of 1700 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 39 PID 2668 wrote to memory of 1700 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 39 PID 2668 wrote to memory of 1700 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 39 PID 1504 wrote to memory of 2520 1504 iexplore.exe 40 PID 1504 wrote to memory of 2520 1504 iexplore.exe 40 PID 1504 wrote to memory of 2520 1504 iexplore.exe 40 PID 1504 wrote to memory of 2520 1504 iexplore.exe 40 PID 3040 wrote to memory of 2532 3040 iexplore.exe 42 PID 3040 wrote to memory of 2532 3040 iexplore.exe 42 PID 3040 wrote to memory of 2532 3040 iexplore.exe 42 PID 3040 wrote to memory of 2532 3040 iexplore.exe 42 PID 1504 wrote to memory of 200 1504 iexplore.exe 43 PID 1504 wrote to memory of 200 1504 iexplore.exe 43 PID 1504 wrote to memory of 200 1504 iexplore.exe 43 PID 1504 wrote to memory of 200 1504 iexplore.exe 43 PID 2668 wrote to memory of 1952 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 44 PID 2668 wrote to memory of 1952 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 44 PID 2668 wrote to memory of 1952 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 44 PID 2668 wrote to memory of 1952 2668 a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe 44 PID 1952 wrote to memory of 1808 1952 cmd.exe 46 PID 1952 wrote to memory of 1808 1952 cmd.exe 46 PID 1952 wrote to memory of 1808 1952 cmd.exe 46 PID 1952 wrote to memory of 2308 1952 cmd.exe 48 PID 1952 wrote to memory of 2308 1952 cmd.exe 48 PID 1952 wrote to memory of 2308 1952 cmd.exe 48 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe"2⤵
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic.exe shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\@[email protected]3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:537601 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:200
-
-
-
C:\Windows\system32\NOTEPAD.EXEPID:1700
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\system32\taskkill.exetaskkill /f /im "a81ffcb94c5726d6ffe4deb5fe4e3710_JaffaCakes118.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2308
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2772
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5fbcef0a15a695bf567974fa8fc261f6e
SHA1161088bebb91afa58366acd86236b542d85d0e29
SHA2565c48c616894a110efe2f4c8a9fc801410e25cb0da7a8c45406dae9c5736ebf65
SHA512eeb4be76a2c5c3589916c94b95e7c30255e28e31938e570b7af0ec31a76c813476182dc5310c38822216f749c4082a4b85f38c3f381e9eb4ff9e61d71a3c672b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5182f2782c0783b0095a1cf00b702c7e2
SHA1e990b28a1b8bcca9d7aef7d3ca230d61f5d4b2e2
SHA2563f44dd628078ae86665f2bff3046d906d1066aad2300adfb03ee8b04f538500a
SHA51243131badfa5901ca14f8d730ecba55d0f0bf104ad142bf8a14e566d47fad3f7d04d8c3436799605278bf4e770c370d4c3bf2c3f4b082ee58a063326a0bdde196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5188de21af4d2f162383c483fec345b80
SHA14c22101087c50a41abe3fcafaa1d857cdb89d618
SHA256207a25af5179cf0f6856aa535ab8d635e9e6be0385d29eccc7259c50a320cbda
SHA5122e7d2b172ec12646ab3696fcb99c5a7306ae5cf8c85bdf826a4ff978a03fd290412c5edf0345e80d75c26f23717c62a449dca6862a4cc55dcdb8551ae3e8972d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0e31365db7fc41589483b3d20ac8cff
SHA16d5af60583ed8eec99875e1719490909927269db
SHA256e15d894643b2a2755597c0699abd0920375496a113c5e8a43064e0f386937bc7
SHA51212dbe4c520a55f08c19f430b7a52f7699b3014793ce58d782f2e962638434ef196a718e028752a788f9eddbc4c51efac3e049f281f34118852041cabd885e468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b748a1ce9d8673426a2580827db5bbd
SHA1cf564483ab34d8e07bc4767e6927690340b7698b
SHA256cebcfab4f43a8003a02e8da2d397f0e5e95d12b59ca86ef7771ccc5f0b9cc369
SHA512acea7a096f474e9e7afbcb0c353ee3f893aa9349ec5cc738667a30ebdd79e88256f7019a0a5ef6153ff69eb28f88789590ab85b05b9756ee840bad3ba0263e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c26f5b81c4b4570c7dbf05ed5498816
SHA14605b08413c6df271412d7114976bedc21dd0622
SHA25641a6229ef177a4b781c2338ccacb83a70a7db81bb6e5fbea15b8c17494bceb2e
SHA512640e9f087297f9cf2f609243f81503927c371f1b91beda98d82c4d24bc913339866bd01f9b490366e9663e5d050e6fea05b8ca8c7580201479cfcf7d4d9896e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc78c9a9b4be1ad0c3fb45262dcc753
SHA160b0e26669e40d5bb592ab56351610a0ba7941b4
SHA2568d8725749fd2572765e9a30c703b8885576a111c3fdd5d15a155bfe24df16ab7
SHA512db995fc6c1596e5ba7d7795ebca552f4184eda711057dfd1678e55001a0911aee151510f3f884f6d4c891c557420f64537568f1721cb2dccd9c685885d29fe01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff47c5e6593c8f03f54c5f08b359de2a
SHA1485e6fb2dee36bf2a2e9d8b32d2d639c083b517f
SHA2563827d8fa534c575bec157a44a0c3b66e0469b69322f9771c28af19c1d075978c
SHA512bc32dd6ed3fd886a7aecf2ff82ae8b2c03717c7f93b4079d3764899eabdf483e8a63518e1cc2677d4660c28bc4e2011e465371d9644f24651570c38e24d809be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5357e961f97bab5226da110c0fad56e25
SHA19c9e8f9db47ab2b04f6418a25bbdaa7047e4fbd0
SHA25677c25ddd82332095e58921e497702d06b62aa3a39118fec4da8b64897741c51d
SHA512212cafe76bb5926586fa5b4628855f4735589bb1be8a9a5eb62a0b49426cfac3a7efff4cef56c84e5dbc9f6827d70f5927e09d568b20091fd6119a5cbcfbb156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bff4b50539714542d3491ee9c287a62e
SHA126b4e47a574c782dc2346d09017045b7b21d2ec5
SHA256b5fcb50e8e53e823c400a53ad7b82166e0b23046bd42ce642520ac4c34cdda6c
SHA512b20c3378f762d9a7ffc36ebfcaca2d9c44917f93e2d8cab24d9927cb6c75ceb91b6d7a8ac1fa1d3a733b8916f4891de6f61aaa4332b8b73a0167d6fd7507f198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58872998fce7af557f95ebce906c22432
SHA1c92f8d1a5f98b4e914b1568f307d454a2ab8d42a
SHA256ff1c9f686eecc583b7b6b5d2c942d2aa279dc68cb6b155510536efa7fb3c5ba1
SHA512580b0ace41994a05f76062beb9b67115321948293fed3fd83f083484dca50f5703b62afdafd9463444b92516426770863d1ded8aef450789e1e1e1408183a62c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d1ec7608019640a808635e9c7a0920
SHA15f0221474f36708dabbc429fded523752f629356
SHA2564f13f17782ace86e17cba9709adce5533355d53abeb08be9277fd7765265957e
SHA5127c8ec1cf9f4cf75f3cbc4ffaa499826a0de423f8430bc2ffa68f0a11af9064e330a71b881227bf2be02d8320f693a88ebe89a7e1b726170ca386eb66a72f08d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51455af9d062034435c498ead1aa9fbbc
SHA1751c912c175a3d400d5bd530f72b9d88d535d436
SHA25623a2c8070c1fb2061f47538647c0776a234d656bdafe3ac27c7488d2b46be8c3
SHA5125729967208ef3c63f8a859458cc9cc2a62c9dd997402590ef3d749e78f43c04a3e957d58449275adc173d69ae443bef960bedb32fd019fcd7e74270fe587c597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee8a3d5d059bb3b022f7fc9d0184bacc
SHA12ec7fc5a5d9baf5a48ad3e626622105d5b62528d
SHA2564a1539b91a58d1e18d1aa35f82666b4f0f54074ae4b5c60358b8fa33bbad816d
SHA512d3dad20c263a10d0a6d6ee3b796cebe266f27bf4bf46e9768a0e12ca2ddc316af4fec9f9029fcb563176b867ba336e2dbc504fd9b9920ac647e1578af2f0bca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be9ee5195bc21e73dfce75794ea69a3e
SHA1486090ec588287ac06934a5b913153fb7e0fc9f0
SHA256923155ce34c36c22fbdd3954ff4f1fe85c6b981182ee291c0ee9ed8dce0f8cec
SHA512117664c0a59b83dcdd6f913fbbf40621d63556c7e3ed6bed23df6188830c878dc40d27067a8a9b5079366db74ca1e061f1245a0fd1be2dfefac1aba0c18fac81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ea47308261696552db5e7b7b2fffba7
SHA17b04366a294622877b8619daf275ca78c583f514
SHA25646386ab6d4f5d4b8a356cdfb7fb500c07e1856e053ad7288f4783b7ad08e6aba
SHA512141563e5af0ad036b7d55270c0cc33be049a68acf4a40cf487fe310d2e5e4832ff1fa3d51fcca4fe615e9542e58514e2a067daf174c1de7b4292a402abb87f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcea2ae8932ba81efd2f5c037caf7968
SHA1720df121eb19facde9080c4628d7a3e17ab4bbbc
SHA25685115ba0c21ffcd82351d2caa0dd4b62452bcd429e07d14e12911036eab9f79b
SHA5120f0690875ad74163cd67aa21fcd98e22e6a3d76bfd11f8e39882e1f35034c774f907e2cf6285096299fc1a6b607c2ce2d627b11311b807d92caedb4c2c142cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c55095de458459f3cfdfe511b90614e
SHA1251d080f9542b26775c2a8f802fa584ae1366417
SHA2567e649a3d511d8119b754e612145ba287f905b08f24b709b5634a8cfa5506f9ec
SHA5126a835cc668f5b8406f2e40ebf108bec38d3648c514c28d38ecface89de83747b232d47e4b93339c7dc5f08416fd4ec4886486908931a7f81c593e882c5cc80b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a73e08807af9155e4fb5233875741cdb
SHA18d682b6e17e705af49d8e2343a949a7faabad7f2
SHA2564d5dfbed6f4ee84cea2267c6467b04f3cc79c34e1b31844fd0730465249e015d
SHA512d0cc8a363518eaa95808947973308d0dbe2eee3ab9abdef81cf424b22b14c5ce641c34b728ef680f71ebf35c6e9b9786bc3fd59ccf446d6caba054431c42ffdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e056e52ac248d47ed22286ea2d57badc
SHA11e67f065e64b1a0217d211bed1f16895e083f1d2
SHA25697bce4c1b0f1a6549841b329747942eeb614687decec64b467a487999c7acc60
SHA5120bc018cfd2fa4e85ffcc1bfc7e5498ae2168fbf2ac9d01a4010d28407e187c3545b2c0c951178c9c67f3a3c1b0d6abe82c0f67c90bab26452e58250898a6210b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5472140b0d6e3afabb3149b49955c2130
SHA1d8490c7b138ab354bcf928b5a1fe27fc7e80355b
SHA256922f3b3c41cc04136219ed6398b705b960eafad775e09e500c8e6e057ef006fa
SHA5128a77e62fd331b798b0288c2496a53de90ca34de37d396c5b54f83da82150bb12a04eccac679096d7c4a6ec3a1f3511027fc8b4ac920c53e03fdbbdf6eac2e192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3b15e0619fbaecc51a3fba1c0c239b9
SHA119f8a721b3351ad3ed1c05cc32d40aac3263d107
SHA25697c4ee9faab87b66deff90c368935c0f0c98f3a349016ffe4ad8afde35e7265e
SHA512cf805b7b536621e219f7e159fc7561ba5d2c3750baffe3ea3be9876ca796d30a7e16e45fa231a94f46f51de88262a75864f7a99ab41b79ff38a6d35e3cd0d5f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553810fb7149419bc9edf21f766799ed5
SHA1eeee606529a8e460cfe4ad8fef2c408270949b30
SHA256c4e44d3c142bc8f168bed43b5ddf6125d2fce37b01ab8d88ae22afc994a22cd2
SHA5128219f45fa639217a4c6b59fbb19e3363143240498892d1e1b4ca80308c1bf74e1b32289c25a2260bb613d70a4d9a890638dbdbb99aa28c394647ff78061bdd77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd9cbb569ef6c3d6536a046f3f086c5
SHA14ca9eb7e98ebe44aa33f70341fe6f1708f5cbfa6
SHA25635fecfd2445b0a18e9c456e9247b85bdcca27206e79917408b7d1e3c109dd593
SHA51235741fcc6ed5fc4a029adf2bf49cd60ecebb0b4df08fd6f042d0b4a40e395c44d43ca2651e6b4a47a85f74224e83028b8116305428ccc9044bb5fcc76675d6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ed599c0694cb2fe1760e05b73207a03c
SHA1d1180de0c9915bbe30c4f2f2bd5fb663b4a24a93
SHA25696a30e761cec678770b3cb7e49697ca8a2813e2442b7bb3eab5527e9cdd9a56a
SHA512b5cb0517916ce7f94aa245da7092effb0b0f4bfe56a940002e96780b8c815ba8336bb0fd36b4065d444a45b482b1bbf88ea5cb4ef370867f065275ea6f3faf1e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{310EDB31-ACC6-11EF-86F5-E699F793024F}.dat
Filesize5KB
MD5017077a5c7776b0b10e0b3679cee172f
SHA14d833b2f23ee8191e971a6e4df8e198b9ca34554
SHA256fcc45dc0733ab9d6bea0b6dc51d5b7807672c6acea9c6a28569fd476a05c9738
SHA51261ba0dc79fb886bcbbd174f6a61fb37aa4446edc51ab54cfeb55003df9e9192bf0037382267a1e57830cb2487c4c010a9c245f8271c8be3ca18efa070cc916a3
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{311F84D1-ACC6-11EF-86F5-E699F793024F}.dat
Filesize3KB
MD57303526ce4edf69154c8f3469e93219c
SHA1a808cf589ab7fb5ab23909bb1ffd96477c0e2c46
SHA256e1bde2435a4f7b14f1de042f314abd431aff9357ad7bdaefd7c94dd329f76aae
SHA5129017c5c752851a3a26cf62b6346c7a551a3dfde925205eca5fd3c06a44e299f17bd2c181b66bcb4d7e65a83e8b7db4108389bd411d951f811d8e003f8e3026d6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\Music\@[email protected]
Filesize19KB
MD5886bbec164c4c7b510feebf09887c476
SHA13e126669795d688992fbe7b2d3c0508f03c9cca9
SHA2567857f4de97621aa1b062e0947144701605b3d9459a6774dfe0880ed9b9aff9b5
SHA512f23a82aeab1778792b223b87992e854c66a3dbacac182e38ca63588c4c1949aaf9f1470891c91a619649f7e9f7c5750ddf85dc0a0c988896e730c485c9ac3d95
-
C:\Users\Admin\Music\@[email protected]
Filesize10KB
MD5a23e72af5cd3ba132bcbb13630483f0a
SHA15af7a50a98d1bb9183fe0dd25a4248919b4050c0
SHA2566a4f8871fd051ed59f85e5f4f34a96b483ce1a826cb3a896f926ecc37f6797a4
SHA512b11113b4c3b4820b09e93f76922bb066ea85e258baeb29b8d0023ca358a8cf61b842d07236be20f798098c036d429d374742f401f0b0aca508c4e94ebfcc83f9
-
C:\Users\Admin\Music\@[email protected]
Filesize90B
MD5fdf3c30aa9d05f50ee26ee1531a6fa76
SHA1dfec778bf6ca09e9ac0f3602f055048167b953b7
SHA25647cfb6b2f78d204cdd27d0ec532e903205590333151df267d09c2d5a69ff070e
SHA5123f79eff03865e91133779a2fcf2d7ff7466f8145da598511f56d06e1db0c350ea165f9d7b8ba60c514fc83800fa504f4ec66d94d58d37fcb2e6c044ea6ea9ecf
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706