Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2024, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
c40b893661bbb99187869568375d63ef_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c40b893661bbb99187869568375d63ef_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c40b893661bbb99187869568375d63ef_JaffaCakes118.exe
-
Size
424KB
-
MD5
c40b893661bbb99187869568375d63ef
-
SHA1
ca533304be2c72b5876d756634b2b3207793260d
-
SHA256
7097913d473590c8fc507d8b8b6eaee8cd9db77888ebb14fc193eafeac039d7a
-
SHA512
bea6153b2a3411a4d2de5da6616dfcbc9a233c1297e0d7b0a7c1c443aa03f04739c9e563027723e16cec8be14f89738167073e17c34b93a4c3baeef368c97333
-
SSDEEP
6144:MsPAYJDo2magV+8GUEmGM41DwAHQmjdN1AUL0yogLpWPoXbftChXW3AxfulDGgB:Hp808fEmLqDwAJjpA+E+blCJxfS6
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\_RECoVERY_+cqcto.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/9795B5E663D32
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/9795B5E663D32
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/9795B5E663D32
http://xlowfznrg4wf7dli.ONION/9795B5E663D32
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (876) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation nfhubvchnxbh.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation c40b893661bbb99187869568375d63ef_JaffaCakes118.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECoVERY_+cqcto.txt nfhubvchnxbh.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECoVERY_+cqcto.html nfhubvchnxbh.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+cqcto.png nfhubvchnxbh.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+cqcto.txt nfhubvchnxbh.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+cqcto.html nfhubvchnxbh.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECoVERY_+cqcto.png nfhubvchnxbh.exe -
Executes dropped EXE 1 IoCs
pid Process 1664 nfhubvchnxbh.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vceejpkocxmh = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\nfhubvchnxbh.exe\"" nfhubvchnxbh.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-white\_RECoVERY_+cqcto.txt nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteAppList.targetsize-24.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Images\SkypeAppList.targetsize-48_altform-unplated_contrast-white.png nfhubvchnxbh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\fr\_RECoVERY_+cqcto.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\TinyTile.scale-125_contrast-black.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNewNoteWideTile.scale-150.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\Doughboy.scale-300.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_RECoVERY_+cqcto.html nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_RECoVERY_+cqcto.txt nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\CortanaApp.ViewElements\_RECoVERY_+cqcto.html nfhubvchnxbh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\_RECoVERY_+cqcto.html nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_RECoVERY_+cqcto.txt nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\_RECoVERY_+cqcto.txt nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptyShare.scale-150.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-30_altform-unplated.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-125_kzf8qxf38zg5c\_RECoVERY_+cqcto.txt nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-32_altform-lightunplated.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteAppList.targetsize-24.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\_RECoVERY_+cqcto.txt nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Exchange.scale-250.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.targetsize-80_contrast-black.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\es\_RECoVERY_+cqcto.txt nfhubvchnxbh.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_18_b81900_40x40.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Date.targetsize-24_contrast-white.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\40.jpg nfhubvchnxbh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_RECoVERY_+cqcto.txt nfhubvchnxbh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_RECoVERY_+cqcto.html nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-white\SmallTile.scale-125.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-96.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\LargeLogo.scale-200_contrast-black.png nfhubvchnxbh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_RECoVERY_+cqcto.png nfhubvchnxbh.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ICE\_RECoVERY_+cqcto.html nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MedTile.scale-100_contrast-white.png nfhubvchnxbh.exe File opened for modification C:\Program Files\dotnet\host\_RECoVERY_+cqcto.txt nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-125_kzf8qxf38zg5c\Assets\Images\SkypeLogo.scale-125.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\8.jpg nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\MixedRealityPortalAppList.scale-125_contrast-white.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-80.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-96_altform-unplated_contrast-white.png nfhubvchnxbh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\_RECoVERY_+cqcto.png nfhubvchnxbh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\sk\_RECoVERY_+cqcto.html nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-80_altform-unplated.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\FetchingMail.scale-200.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-white\_RECoVERY_+cqcto.txt nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\LargeTile.scale-100.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\_RECoVERY_+cqcto.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_RECoVERY_+cqcto.png nfhubvchnxbh.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\_RECoVERY_+cqcto.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pt-BR\_RECoVERY_+cqcto.html nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\animations\OneNoteFRE_Welcome.mp4 nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNotePageWideTile.scale-125.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarAppList.targetsize-60_altform-unplated.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\WideTile.scale-150_contrast-black.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Generic-Light.scale-100.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\en-US\_RECoVERY_+cqcto.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\_RECoVERY_+cqcto.txt nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\ScreenSketchStoreLogo.scale-125_contrast-black.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\EnsoUI\_RECoVERY_+cqcto.html nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.UI\Resources\_RECoVERY_+cqcto.txt nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-20_altform-unplated.png nfhubvchnxbh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\Assets\ValueProp_Unknown.png nfhubvchnxbh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\cardview-addtotable.png nfhubvchnxbh.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\_RECoVERY_+cqcto.html nfhubvchnxbh.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\nfhubvchnxbh.exe c40b893661bbb99187869568375d63ef_JaffaCakes118.exe File opened for modification C:\Windows\nfhubvchnxbh.exe c40b893661bbb99187869568375d63ef_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c40b893661bbb99187869568375d63ef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nfhubvchnxbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings nfhubvchnxbh.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2112 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe 1664 nfhubvchnxbh.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3172 c40b893661bbb99187869568375d63ef_JaffaCakes118.exe Token: SeDebugPrivilege 1664 nfhubvchnxbh.exe Token: SeIncreaseQuotaPrivilege 716 WMIC.exe Token: SeSecurityPrivilege 716 WMIC.exe Token: SeTakeOwnershipPrivilege 716 WMIC.exe Token: SeLoadDriverPrivilege 716 WMIC.exe Token: SeSystemProfilePrivilege 716 WMIC.exe Token: SeSystemtimePrivilege 716 WMIC.exe Token: SeProfSingleProcessPrivilege 716 WMIC.exe Token: SeIncBasePriorityPrivilege 716 WMIC.exe Token: SeCreatePagefilePrivilege 716 WMIC.exe Token: SeBackupPrivilege 716 WMIC.exe Token: SeRestorePrivilege 716 WMIC.exe Token: SeShutdownPrivilege 716 WMIC.exe Token: SeDebugPrivilege 716 WMIC.exe Token: SeSystemEnvironmentPrivilege 716 WMIC.exe Token: SeRemoteShutdownPrivilege 716 WMIC.exe Token: SeUndockPrivilege 716 WMIC.exe Token: SeManageVolumePrivilege 716 WMIC.exe Token: 33 716 WMIC.exe Token: 34 716 WMIC.exe Token: 35 716 WMIC.exe Token: 36 716 WMIC.exe Token: SeIncreaseQuotaPrivilege 716 WMIC.exe Token: SeSecurityPrivilege 716 WMIC.exe Token: SeTakeOwnershipPrivilege 716 WMIC.exe Token: SeLoadDriverPrivilege 716 WMIC.exe Token: SeSystemProfilePrivilege 716 WMIC.exe Token: SeSystemtimePrivilege 716 WMIC.exe Token: SeProfSingleProcessPrivilege 716 WMIC.exe Token: SeIncBasePriorityPrivilege 716 WMIC.exe Token: SeCreatePagefilePrivilege 716 WMIC.exe Token: SeBackupPrivilege 716 WMIC.exe Token: SeRestorePrivilege 716 WMIC.exe Token: SeShutdownPrivilege 716 WMIC.exe Token: SeDebugPrivilege 716 WMIC.exe Token: SeSystemEnvironmentPrivilege 716 WMIC.exe Token: SeRemoteShutdownPrivilege 716 WMIC.exe Token: SeUndockPrivilege 716 WMIC.exe Token: SeManageVolumePrivilege 716 WMIC.exe Token: 33 716 WMIC.exe Token: 34 716 WMIC.exe Token: 35 716 WMIC.exe Token: 36 716 WMIC.exe Token: SeBackupPrivilege 1108 vssvc.exe Token: SeRestorePrivilege 1108 vssvc.exe Token: SeAuditPrivilege 1108 vssvc.exe Token: SeIncreaseQuotaPrivilege 2368 WMIC.exe Token: SeSecurityPrivilege 2368 WMIC.exe Token: SeTakeOwnershipPrivilege 2368 WMIC.exe Token: SeLoadDriverPrivilege 2368 WMIC.exe Token: SeSystemProfilePrivilege 2368 WMIC.exe Token: SeSystemtimePrivilege 2368 WMIC.exe Token: SeProfSingleProcessPrivilege 2368 WMIC.exe Token: SeIncBasePriorityPrivilege 2368 WMIC.exe Token: SeCreatePagefilePrivilege 2368 WMIC.exe Token: SeBackupPrivilege 2368 WMIC.exe Token: SeRestorePrivilege 2368 WMIC.exe Token: SeShutdownPrivilege 2368 WMIC.exe Token: SeDebugPrivilege 2368 WMIC.exe Token: SeSystemEnvironmentPrivilege 2368 WMIC.exe Token: SeRemoteShutdownPrivilege 2368 WMIC.exe Token: SeUndockPrivilege 2368 WMIC.exe Token: SeManageVolumePrivilege 2368 WMIC.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3172 wrote to memory of 1664 3172 c40b893661bbb99187869568375d63ef_JaffaCakes118.exe 85 PID 3172 wrote to memory of 1664 3172 c40b893661bbb99187869568375d63ef_JaffaCakes118.exe 85 PID 3172 wrote to memory of 1664 3172 c40b893661bbb99187869568375d63ef_JaffaCakes118.exe 85 PID 3172 wrote to memory of 2656 3172 c40b893661bbb99187869568375d63ef_JaffaCakes118.exe 86 PID 3172 wrote to memory of 2656 3172 c40b893661bbb99187869568375d63ef_JaffaCakes118.exe 86 PID 3172 wrote to memory of 2656 3172 c40b893661bbb99187869568375d63ef_JaffaCakes118.exe 86 PID 1664 wrote to memory of 716 1664 nfhubvchnxbh.exe 88 PID 1664 wrote to memory of 716 1664 nfhubvchnxbh.exe 88 PID 1664 wrote to memory of 2112 1664 nfhubvchnxbh.exe 107 PID 1664 wrote to memory of 2112 1664 nfhubvchnxbh.exe 107 PID 1664 wrote to memory of 2112 1664 nfhubvchnxbh.exe 107 PID 1664 wrote to memory of 920 1664 nfhubvchnxbh.exe 108 PID 1664 wrote to memory of 920 1664 nfhubvchnxbh.exe 108 PID 920 wrote to memory of 4320 920 msedge.exe 109 PID 920 wrote to memory of 4320 920 msedge.exe 109 PID 1664 wrote to memory of 2368 1664 nfhubvchnxbh.exe 110 PID 1664 wrote to memory of 2368 1664 nfhubvchnxbh.exe 110 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 4528 920 msedge.exe 113 PID 920 wrote to memory of 1288 920 msedge.exe 114 PID 920 wrote to memory of 1288 920 msedge.exe 114 PID 920 wrote to memory of 2292 920 msedge.exe 115 PID 920 wrote to memory of 2292 920 msedge.exe 115 PID 920 wrote to memory of 2292 920 msedge.exe 115 PID 920 wrote to memory of 2292 920 msedge.exe 115 PID 920 wrote to memory of 2292 920 msedge.exe 115 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System nfhubvchnxbh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" nfhubvchnxbh.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c40b893661bbb99187869568375d63ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c40b893661bbb99187869568375d63ef_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\nfhubvchnxbh.exeC:\Windows\nfhubvchnxbh.exe2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1664 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:716
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf5f946f8,0x7ffdf5f94708,0x7ffdf5f947184⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:24⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:34⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:84⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:14⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:14⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:84⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:84⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:14⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:14⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:14⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:14⤵PID:3300
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\NFHUBV~1.EXE3⤵
- System Location Discovery: System Language Discovery
PID:4984
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\C40B89~1.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1496
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5bc90c2eb866e47347c737ec4cfa88614
SHA141ae2ef10da9c24e135e89d47e60dc321e1ae5e2
SHA25682d5d15f016b07d8c0845208eee8b2d1c9b38cd674e6285ae279d59d9c3de462
SHA51296f5d6b6a2d290e7439be53c75fcbf20985dd8b257f0d13d2745641e32d5a8de2f338c6bfe1ed88e34c417499990773886843b8a31af164a8e822f93183dacdc
-
Filesize
63KB
MD51f232cc218887d72a269e089fde2b106
SHA167bde2b218feb71264e907f8324053303a2bee9f
SHA256741412eb08abb880aa2ddc1a0c3a3554d59076002bd94a5f892867d11c7415c2
SHA512ab8a55a1a64283a0b501cd5a3f983c96e997e86128ebbab1bbaca037abb9a66845b1579aa4e6b2e0b15942ebfd81bcd1e15b8ff5db211d7f021d6f6e814a1916
-
Filesize
1KB
MD58c4a8a16f303ea75c9212ecffecd1675
SHA158f20796b27f760fd15879f20fa9744955dcabc5
SHA25632ca60d2f871166a23f766d104167e78e6565878e44ea1122f80cffd610c5d9e
SHA512ff65d220b01c141497048063e3a7791d75e6ca40622ff7e1620d2c6f4555bf9e819d18ab0d269011f572a74fe7da1a8723fba68b4ce56f74c3a1d1028782f05e
-
Filesize
560B
MD523e3d750e666dc2ecb98971ba728bc3a
SHA1bdd77dcfc1f8ae0ed2a67d6b81fc05842d13daa3
SHA256e952bd44b6302136388f24f82613ba2d787fdbae85c57dd01f8c4cf180b1c009
SHA51242c72a16ff89fc65710691ef86c2b1cae8ed2a3db475156a7626b5ba229af1d7c6e2ff17c18d918f903a52e498f4665066c7787ffdadf9c73b63eac22a2854b8
-
Filesize
560B
MD5f60054895a8b9ad7b3dcee00ea82ed29
SHA1ca4f82502dbe38ddfca5dfca1d291b5b876765ee
SHA2568478cd61de902bdbe352c03933ccc9ca363b388262721a6a3e8bf2f4e26a94a9
SHA512a5726a71700f167f79c0ac9c76e5740ab66dc3676bf835315673609231a63c91937c915a01be2542af0cb71dfe387dacc7721a455de95373559cd857b22f73ee
-
Filesize
416B
MD5e5f4e6170a013210108396333758660a
SHA18729206dbdb76058590dc4721b10349aec4567b7
SHA2563b25ed5b2d9ce66fbe87e83a28d3ad6a8c53026e502d34e49563a326db622e8d
SHA512214aa5a10f9c60478ff5a7e161a4ff6378003d98753249cae0d2ed0697536174f2524f4406a451dac5eacce26faf9ddd2f120b726bcd11881e8f40c34841b8d3
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
6KB
MD51f77046432ffd8af9d147dc14235e1e6
SHA10f29572c8a2c1d6d58698a72e1f3b7d7a68532d3
SHA256281d08e37b7ce69be38f3bcfbead7f11cf72890ff09cdac61ca11012d0566d6f
SHA512bc4dbf12b9aade194cb7b0fa421d175839cb1d9b872eb3db3b84917f4debd65f101daedf8082912f704f6016b0f882d16038ceff4ffed0485f6de47f3a657a42
-
Filesize
6KB
MD5b0ab6ba37a66716926524fa528bfdac5
SHA11364fdad6cef954fc9e1c593c36462a3e89b7473
SHA256f4beb9be0cf9c21f71521e5acd6c635043d3a5872597c4ffe9acc7bbf8db5907
SHA5124fadf4f12a4269f4d11d6c2b9a56b1884d1355e3fc7bd01316f5f05ae0126a3401440d1fd6745777bc012fbdf3903435673c9f62a48faf8ee3f793a5c17cb412
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52a80916ed99166aa183eb1939f2cdf2a
SHA136cc76f05afa96af862da1c65e768609e5eadc18
SHA25662758327b7d7fc5c1caed443f3b2038c1fba65491eaa6fe4f200210c7b3c1090
SHA512f3c86ad03c27740c21576e5f06fe3d3df8a2b9f2fde85ae47790d8fe92c39232d2504ac182cd7b5dbe0d2d728ec65f68055d62289f10cd6322011c9ab42ab132
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727662360645001.txt
Filesize77KB
MD541e1898e1bafd3aa780912ad0827a073
SHA14849dde1a0e57cae2c3f8735b6bf68f7417520d9
SHA256f66f8f8360dfe7bf5b28b77cc5a706a6c78c27dfb1804d21e01c2c37987cf66e
SHA512a89a5404da362843f76d276bedff52430fcb78e2a837ef4b3974bf7785701df3cecb8953dc3893f3fb5be84c62f6e90f2807d87a137ed13fb3bfd146efaa3c6a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727663623337830.txt
Filesize47KB
MD5199770f52a8049213386c68cb904b28d
SHA1ed7ccf0fa5bf19e5833510e2fcb2be759d0a801f
SHA2564914dd26634934e5ce48df7841b16d7960d016189e33ef5e10506caa32a3b4af
SHA512374354ffaee4e5777fd2705dbe31a5630fcfeb98535cfe62e6e44cac12ff344ef7b46ced884bf86d30f99a327b8bc369639feab9725f0c8afcbadaaa4a078bd0
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727671211214398.txt
Filesize74KB
MD55e05c783daecdf2ab365aecfed1e6d72
SHA1765b7d1ea4d3a9420eab68b59406eb5b7ed58e15
SHA256ffb3e36038e54e8890acb4cce67753f3422554fb845588473f7afef2fb69f61b
SHA5123ca3750ca88bd524eb5ab9a4efeedb6b82ed75b977250f927df4d1464063376abb32130544224ae280837568c24449f7032e67edefc0b097fa44a31b270a9db4
-
Filesize
424KB
MD5c40b893661bbb99187869568375d63ef
SHA1ca533304be2c72b5876d756634b2b3207793260d
SHA2567097913d473590c8fc507d8b8b6eaee8cd9db77888ebb14fc193eafeac039d7a
SHA512bea6153b2a3411a4d2de5da6616dfcbc9a233c1297e0d7b0a7c1c443aa03f04739c9e563027723e16cec8be14f89738167073e17c34b93a4c3baeef368c97333