Overview
overview
10Static
static
3c7e77a8a2b...18.exe
windows7-x64
10c7e77a8a2b...18.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3SetCursor.dll
windows7-x64
3SetCursor.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 13:23
Static task
static1
Behavioral task
behavioral1
Sample
c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
SetCursor.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SetCursor.dll
Resource
win10v2004-20241007-en
General
-
Target
c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe
-
Size
222KB
-
MD5
c7e77a8a2bddb15c701032fd3d2a9e4b
-
SHA1
c2a4dc1f7ac018da4c364799209d9c6fea17d994
-
SHA256
0d2598069781ff01982d4e4c3cd7e15320be92cf0607e24af73d55d64ffa60f6
-
SHA512
3991e20ea1cf9c14a7ce148ef1efad558cb89228c324a32eb016687b9eb661eb39b551e1a4dbb1f65fc28be7b7ad845b020b173e269a4091bc399464430b8142
-
SSDEEP
3072:YM+9i7SFCIXJZb45x9c/Tui1CRvtbp6tTzYoy1khbgEN5oA+6BMlTH+vckm+PDJg:YMTCPbKOui1ivcTEoTtBXm+Pc0Cpj
Malware Config
Extracted
C:\Users\Admin\Music\# HELP DECRYPT #.txt
http://wjtqjleommc4z46i.nxmu0x.bid/7660-2DE6-2204-0046-1540
http://wjtqjleommc4z46i.whmykv.bid/7660-2DE6-2204-0046-1540
http://wjtqjleommc4z46i.cm5ohx.bid/7660-2DE6-2204-0046-1540
http://wjtqjleommc4z46i.gg4dgp.bid/7660-2DE6-2204-0046-1540
http://wjtqjleommc4z46i.onion.to/7660-2DE6-2204-0046-1540
http://wjtqjleommc4z46i.onion/7660-2DE6-2204-0046-1540
Extracted
C:\Users\Admin\Music\# HELP DECRYPT #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (522) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid Process 2864 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2096 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 2096 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp7214.bmp" c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2096 set thread context of 1920 2096 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 30 -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BUSINESS.ONE c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\DESIGNER.ONE c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\PLANNERS.ONE c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\ACADEMIC.ONE c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# HELP DECRYPT #.html c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# HELP DECRYPT #.txt c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# HELP DECRYPT #.url c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BLANK.ONE c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\emasculations c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2404 PING.EXE -
Kills process with taskkill 1 IoCs
pid Process 2364 taskkill.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439566968" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53B60D11-B30C-11EF-8B3C-EA879B6441F2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701115181947db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53A7C4D1-B30C-11EF-8B3C-EA879B6441F2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf00000000020000000000106600000001000020000000c672c85c4d3c31d985b4386fea2b1becab5b12d7fbf8d0736dc2e235eacd2a44000000000e8000000002000020000000dbaea5ce7bccbd20f190e6a56692fca361accebc2ebe58896d600dcf303be200200000006386f244dfba1140db729b7e5c83b339b93ec2b9fda7c30e659f895fcd282b704000000080218d6d2aa72acbba941caaa6e2bb75c4c1b9a2aabb749e4dcf3e07fdba624691e3b871eff1648d2df2fa0b7b815ced29e6c4db7f1cc3f7c76c2896d634d20e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2404 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 3008 WMIC.exe Token: SeSecurityPrivilege 3008 WMIC.exe Token: SeTakeOwnershipPrivilege 3008 WMIC.exe Token: SeLoadDriverPrivilege 3008 WMIC.exe Token: SeSystemProfilePrivilege 3008 WMIC.exe Token: SeSystemtimePrivilege 3008 WMIC.exe Token: SeProfSingleProcessPrivilege 3008 WMIC.exe Token: SeIncBasePriorityPrivilege 3008 WMIC.exe Token: SeCreatePagefilePrivilege 3008 WMIC.exe Token: SeBackupPrivilege 3008 WMIC.exe Token: SeRestorePrivilege 3008 WMIC.exe Token: SeShutdownPrivilege 3008 WMIC.exe Token: SeDebugPrivilege 3008 WMIC.exe Token: SeSystemEnvironmentPrivilege 3008 WMIC.exe Token: SeRemoteShutdownPrivilege 3008 WMIC.exe Token: SeUndockPrivilege 3008 WMIC.exe Token: SeManageVolumePrivilege 3008 WMIC.exe Token: 33 3008 WMIC.exe Token: 34 3008 WMIC.exe Token: 35 3008 WMIC.exe Token: SeIncreaseQuotaPrivilege 3008 WMIC.exe Token: SeSecurityPrivilege 3008 WMIC.exe Token: SeTakeOwnershipPrivilege 3008 WMIC.exe Token: SeLoadDriverPrivilege 3008 WMIC.exe Token: SeSystemProfilePrivilege 3008 WMIC.exe Token: SeSystemtimePrivilege 3008 WMIC.exe Token: SeProfSingleProcessPrivilege 3008 WMIC.exe Token: SeIncBasePriorityPrivilege 3008 WMIC.exe Token: SeCreatePagefilePrivilege 3008 WMIC.exe Token: SeBackupPrivilege 3008 WMIC.exe Token: SeRestorePrivilege 3008 WMIC.exe Token: SeShutdownPrivilege 3008 WMIC.exe Token: SeDebugPrivilege 3008 WMIC.exe Token: SeSystemEnvironmentPrivilege 3008 WMIC.exe Token: SeRemoteShutdownPrivilege 3008 WMIC.exe Token: SeUndockPrivilege 3008 WMIC.exe Token: SeManageVolumePrivilege 3008 WMIC.exe Token: 33 3008 WMIC.exe Token: 34 3008 WMIC.exe Token: 35 3008 WMIC.exe Token: SeBackupPrivilege 2992 vssvc.exe Token: SeRestorePrivilege 2992 vssvc.exe Token: SeAuditPrivilege 2992 vssvc.exe Token: SeDebugPrivilege 2364 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 984 iexplore.exe 984 iexplore.exe 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 984 iexplore.exe 984 iexplore.exe 984 iexplore.exe 984 iexplore.exe 756 IEXPLORE.EXE 756 IEXPLORE.EXE 2100 iexplore.exe 2100 iexplore.exe 528 IEXPLORE.EXE 528 IEXPLORE.EXE 1348 IEXPLORE.EXE 1348 IEXPLORE.EXE 528 IEXPLORE.EXE 528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2096 wrote to memory of 1920 2096 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 30 PID 2096 wrote to memory of 1920 2096 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 30 PID 2096 wrote to memory of 1920 2096 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 30 PID 2096 wrote to memory of 1920 2096 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 30 PID 2096 wrote to memory of 1920 2096 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 30 PID 2096 wrote to memory of 1920 2096 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 30 PID 2096 wrote to memory of 1920 2096 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 30 PID 2096 wrote to memory of 1920 2096 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 30 PID 2096 wrote to memory of 1920 2096 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 30 PID 2096 wrote to memory of 1920 2096 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 30 PID 2096 wrote to memory of 1920 2096 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 30 PID 1920 wrote to memory of 2856 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 32 PID 1920 wrote to memory of 2856 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 32 PID 1920 wrote to memory of 2856 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 32 PID 1920 wrote to memory of 2856 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 32 PID 2856 wrote to memory of 3008 2856 cmd.exe 34 PID 2856 wrote to memory of 3008 2856 cmd.exe 34 PID 2856 wrote to memory of 3008 2856 cmd.exe 34 PID 1920 wrote to memory of 984 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 40 PID 1920 wrote to memory of 984 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 40 PID 1920 wrote to memory of 984 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 40 PID 1920 wrote to memory of 984 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 40 PID 1920 wrote to memory of 1668 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 41 PID 1920 wrote to memory of 1668 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 41 PID 1920 wrote to memory of 1668 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 41 PID 1920 wrote to memory of 1668 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 41 PID 984 wrote to memory of 756 984 iexplore.exe 42 PID 984 wrote to memory of 756 984 iexplore.exe 42 PID 984 wrote to memory of 756 984 iexplore.exe 42 PID 984 wrote to memory of 756 984 iexplore.exe 42 PID 984 wrote to memory of 528 984 iexplore.exe 44 PID 984 wrote to memory of 528 984 iexplore.exe 44 PID 984 wrote to memory of 528 984 iexplore.exe 44 PID 984 wrote to memory of 528 984 iexplore.exe 44 PID 2100 wrote to memory of 1348 2100 iexplore.exe 45 PID 2100 wrote to memory of 1348 2100 iexplore.exe 45 PID 2100 wrote to memory of 1348 2100 iexplore.exe 45 PID 2100 wrote to memory of 1348 2100 iexplore.exe 45 PID 1920 wrote to memory of 2864 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 47 PID 1920 wrote to memory of 2864 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 47 PID 1920 wrote to memory of 2864 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 47 PID 1920 wrote to memory of 2864 1920 c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe 47 PID 2864 wrote to memory of 2364 2864 cmd.exe 49 PID 2864 wrote to memory of 2364 2864 cmd.exe 49 PID 2864 wrote to memory of 2364 2864 cmd.exe 49 PID 2864 wrote to memory of 2404 2864 cmd.exe 51 PID 2864 wrote to memory of 2404 2864 cmd.exe 51 PID 2864 wrote to memory of 2404 2864 cmd.exe 51 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe"2⤵
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic.exe shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# HELP DECRYPT #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:984 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:756
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:984 CREDAT:537601 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:528
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# HELP DECRYPT #.txt3⤵PID:1668
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\taskkill.exetaskkill /f /im "c7e77a8a2bddb15c701032fd3d2a9e4b_JaffaCakes118.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2404
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2188
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1348
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b14c5865342984255e889edd22b4b7a5
SHA1f4e4ceab55e32658cea49014fca1e22a400249b3
SHA25666c258be554213685464b935edb7f804b2c734c830c1d9805aa5af1d3ae01795
SHA5129a7b2cb0fff8d707e7b091b68f02700f47752ede7227e40c1c177693646a1e0d7c3e0251312c1f460d4bda48479ce9761907bdd0430747eefeb37408e22bc129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eeeb82684e7058e1dcd79dcf33c4a16
SHA1c0e734f957d8090cce41bf825ab67321fa1deff8
SHA2569465ac8a1719c028379b577c23f29e94b9f6b953df996d15869af3eb07c628bf
SHA5126b72655644cc486efcc6fd9c0562bf5e841da5380fb32f2aec802625f2cb8315ad3382ae3f3949fce8d7c8a8fed19e1a2fecd9c43198fef5a6e2ee38af7e5ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c42f0f774589d4e68335a774cd13514c
SHA163977cb130e770ed875bb9f8d9ad6db3d4e2eb53
SHA256ae2005d5c4ee622ac38fbc9a7740b6bb3f718135d8b6486c2f4b52e02b185101
SHA5123d4fe03c43d416795b00d3cd8336a6a2fdc700d9965b2a249ed63ec6032db58084592d6fd8be3598e103d659ea4a570dcd925cc9c4c8d18102ca4c3e824446dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ed219b25cba7b2ddf8fedc8e05ad086
SHA1fe713166b2e117a61f3929c6b1902a57570a4744
SHA256659d74c793d6441f38d412c6196e8ec8dc6aec95b78b26d75f7e4103c1000462
SHA512e9dadc37bd46e3112702fd2ca769966731453d860ae3f00e9aa0774515ae3c48b71add3591c081cc1c5e0cc6866306f0a0b50c5344eab93799126cd35a16acdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526a68f0fcdde06beebabdc3bc255454a
SHA178abea1bb06cb1b20961820e4d2e4e7c1f3a4064
SHA256fb1dcfdc31195091a50816753d6c487291c1623e99fd83367a7c77155639ee0d
SHA5128c9568f4c1b07839db2eed8770d5d9358ad63851ac605909bfedbf51ce7c197e247d9c5c0d7af9f4b8c2c42d7b4d5d753be8dbffc54ada79aef340fd2b77b166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad6b9fddca4bc2530e0e657e640337da
SHA172da5247f560128e125dd039bae60bf32bf2776a
SHA256e2978ab2cb5e3bf42681021677a3531815b2bdc6fadd92c8fa110f1faab17175
SHA512f885b749eccd41702d902331e0db95685fa72b3e1a4ce0fd5791918682807aa00e1b2aa1b45e3114af8682a01c2abf451e377eff7f780b22fad45c482dc4a6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531932c1ca365e956fe76a123a3f569a3
SHA16104209d0dfd45929a9cdf0fc2f62650c1980e7f
SHA256903e506296d6fb6e2dad3cf4fa8d8ac1576e43dba0ffbf4c440bc8431227d98d
SHA512d4096bc4a5d41f7e716fc92746e6fa738ed6104cc2b6c373c45bf88244876349e6a26fd4092c1c7d82e33322f555ca47b4e37101fc93be791428bca1be2af5b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e7ef00f673a7087427483a6f090d75f
SHA1f848c0fe96fc8f4e9aa144d6cccad121492a3941
SHA2569b22784460b07b08d25f375981ca40c4eb1396d718867d4055baff1fbc9777ec
SHA512df6eb0c127f90bf43cf239f5a2a6e4430ec5fc1031c17d8df31c0bcdc046895849adac6ad7281ba69f12930a11ada1f16c9265b3e5ae27bff025b52d0b64132f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2b20c689c6dd38907e40eabf5e880a3
SHA194dabbf7e224d5a562618b832a7cdf1a557e49ce
SHA2561f0b89640ab2f81f2d1ed322e6ef3903f72d8f401586f6fc65832e11690e52d8
SHA5121dc534a418825c9b6e79f3f1949a2d8e1839ae941db4782bb3340911eaf54b62feba13fc3931b1bc4a7c22b54725cc814a78219071f7ccec38e31d18cd546b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56226aeb22abcf3680fc6b0a26aef0449
SHA1b936560deaefb6c0872b491de263411a30e5dca6
SHA2565bef3ad664300935900f56ebd06e971133d8dfaf0ef3ee81ed28886d70772d5e
SHA512ba1a4daf177938c25b4ccbedf7c8a71903e02e360fadf8f12b9997317ee3e016595a1a5bf886f35f684f3d863877a45a7fb1f7a25876658a21fb91130265335d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523e6df64144fc76dce55b0355f813bec
SHA12f529e58eb867dea8a5bbe4fdcac5c98eeab4fb6
SHA2562759deeae753d3c74d20f1222475de1882ec533de8c2b9045a5937470f3db685
SHA5120f2780c35a9ddbcc9250e74c4e967c6c0ae9e8a3b4d7e6dcab619e01587bbffcdae8422f106bccd8be9570b21bd617ee135a994c66eaabfc85dd4162a9f292ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509340839d003dd74a5010e292812844f
SHA1b930728ee5f52611d6c1bea21b5cd063fa7c216b
SHA2569d195705a6acdd38e08fd6e26701f797784e2a37b5b55b12535685714c2d3001
SHA512fd0792381802f92351caaeeededf633db7e143d3e494a518d4a123bfa429b88f13aa04afa2de5a3883dc100c5830ed614e789e3ce919a14b279da7f1430d7b6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a25f2640d3996a55fb8a887aa373454
SHA13abe736d11ae8a37c9d93c2216b96667aba09be4
SHA25689ea7342c8157d1380a9dbfc9102418a6823c40dd41281c3e677c396b02575b0
SHA512b7b2aebcaf49c392b89524475b3c55d9d46b58aab5a368b2e72f44c464d33ba7444642c015f2087c293263d6f8c8f6335a52c7ad04bb947f895e6c646a252d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5036e243b25d1414228231fbb4cd909da
SHA15cf800fb8f31b6645802a93a3b9acbc52750a22b
SHA256af62698f7ce60b90f636e8a3bf09b7bf874356525ab413d0c48e4e77ea9993de
SHA51290ce6882e388c5cacdd654a6359da78abf3906abe62b837ec53a1f35fa00220a437b5b8e8449ad91bde19c17125ee8a319fbca6eb3142fb0e3c403dd6b0785ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e48cc5435b7f3500f1a8751167e42b4
SHA1a95186ce824a40b21ede08edf7a0f00cdc13bcac
SHA25604bf2fdb91117746bf74aaaa0bb725cca1bf6085a263fde8b200684440934ad4
SHA512dd42a5748f6e9ff1a10ae34c83a94015976d00f1adb1df1b4502f846251a2aa821679dee186033cd4221416c1a1d0cfa62884be2fc8fd1d36b1d14b2fa3fa659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4ffccb00b08388cb871f94d13bc7fc2
SHA149bfb00e93aa0dc762f31ccd6e2b1ae5a35784bd
SHA2569315e5d95f6ff9db23566d4d783a44da920752ccc38608f6831bf20d9f5beae0
SHA512b25e632c62b78daeab8af20b6ee50879412acee0f1b37dacdad22ad36cca9f22635fdafdee137e864fdfba709a4b3cb0750ae487780104ac6dd64fb2c452ad22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55404e72a84a936f0a1c004aaee9a8e62
SHA1555a653be2c078e6920e412922a24c338be5b35d
SHA256a6a2fb7351353a5dcc6350dcddc502f228b3aab2d4e893a1eae24e71cdab6552
SHA51213ca7c7844851ac737c94318f50234c5f7d4673dd737f7942e766494a7d1779c78776747434a9bd357bd72218b58c01f792807293aec44672ff78ef29f9746b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537980c189ec2cb583ff89094ea127aa9
SHA15488e1df7dec0e8941db48e980a8eb54022a2f99
SHA2566af53b77ccbbbbef552df9c2b1f8ad7be7089a7f325b19f355743fb6967055f6
SHA5128b189fbcdc4c22f38a194cd8e9d792987f261c0da9f65c088f31b8a2c659d6fcfe177a6f75d29bdb8f10434f15529fec4f1f505c70ba197afbc03815811d7454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533ef158507577ef5fc7bc9794275c117
SHA1d4267a6c4737cd288527c5fbe4430c53b634de44
SHA256fa2957fafda8ac933b068f8faeddced81d4ecf591d476e71e1b083f8524bed79
SHA512aa21787f54e39cfd501c5d85eb1fecd00ce315d8a74deb64d7f1e701badbcea4bd6536e37df2120d83df9927c4206fba223654bac24e230185181da35f90911c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562152de688ac040b0fd6ad09a0f3f570
SHA1d433fb1cbfc0de53f88277962e729295f9dea34e
SHA25623471aab496461a505d60b8aca1473023bad1093842fde18c65aa734c035a712
SHA5128443bb93f3440e622e105a5a0789d27e40e64476f96ace3bacdfdaa21c11aab57ab1150e5ad287b795de5b1074575d44db34d15fc114f8ae69c121cc7eec15fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7119e198ad514592f4f37bbb960724
SHA17d0961b961c5810290d3506c66b7507d3fdbf526
SHA256a9dab4ee046e07165a1a80e9c23292f5f7cb3b9cf0bd9aad4038f5ddd01fb5f8
SHA512bafe3d5cbf30abf1237500c7871ce1efb424357b7a6965aa0d33f3b02caedbe6dd1afa832c749279f83052eb3a34660f36e000d219370536c1a3820c778e2020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD57e2230ebbdf5559222284d1e0286ae48
SHA1c0d57599e65409957460766340c182cb3615735a
SHA256dcd1e0fd28f24d1f9e114f8c2e0aeb28f9676a49e4fb732db433ceeb2b715cdd
SHA512b730d77ceb5cb98650d81424e04ad2c9b739b436f97cab227477bc57faa3cf79bba8fe9c291634831cdcaca6107da0b0710efbcc102e5341c34341d34f0910a0
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{53A7C4D1-B30C-11EF-8B3C-EA879B6441F2}.dat
Filesize6KB
MD5881f381e1f81cedc2d4a175bccc82a38
SHA13b81c82c3f72d26df0240924dd54630e25c01bcc
SHA2567f4c33f204c0e46e0989e658a93e84c9a64d300da49abcf213b75a7f16befa77
SHA512f248fd803393c28e04148a7298a92e234e45327965ab11eb3417aac26598b4772e7a75e1c254f8fc642e4df82568c343822c860ea423311dd1630a5255decb63
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD553d3ecb0cd2596cd97a49d498225b9eb
SHA1bdb84142b64b2ef9454a08ffb8207b2d2098234c
SHA256aebbf7076b60c077fdca77deb28a6ffb8524b8fedcae93d3b155f54dee9289d2
SHA5129904015f0c9bf8e38294eb4a8c40e9ff867bfdd28980c95e164fb179b69a326dc6378d9a5cdd5efc6e58b966db7263775a31cac64f93979c71aca8c912fffe50
-
Filesize
19KB
MD5be06333f7d787a15dfd72351142bb0b3
SHA16b5b90a18c39ff3fdf19d682a13db9a1f2591dec
SHA256ad698985b17f65a7c53e5878ec117cca15cfeb6b11d309ba9209bc6801f7a27b
SHA512e44e5cb10662cf8a7704e7fcea6c9e9dcfdd13838e64c0fbde9a0c0c9734ca029bd29018a79e6a82a9ae91f4a2e085a503f39bb5abd5f5f79f9bddb78cca52d4
-
Filesize
10KB
MD500e709cf8dba669880aa131686cce277
SHA1fc0a85856b47788b7c75a3674af9dc29d3fb6c28
SHA25651bf76670a64eeafd44c8cacaba65a047f6cdc711d0de3c7c4d1fabd778e38ba
SHA512a88b26c6c109ea9850b2067d4ed348d809fca63f4fe3e94d4c8292e7b56d8c0153b8eb36899a64d8784e0bd71b3310def0236e4d2703b238f8f0a836545b14ca
-
Filesize
90B
MD578a9d38d83ade4f5ae059e99cda42b8d
SHA1a1cd160360e62a504e1f5a55a0d6b28dbd9b23d5
SHA25619a98e2a8a78f8f128e982ab646e70b69795c9e832d5156ce5b08d71c3927d31
SHA51297a5d2adffff8c1b8dbe8d918b6d3c2a74eadeaf9e492aae0f30adf1397765d327cc60e76a8b0dc94b90b97fa3868ac2b26391d32ecab78a17d6734dbc359462
-
Filesize
11KB
MD56f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1b6ac111dfb0d1fc75ad09c56bde7830232395785
SHA256b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
SHA512a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
Filesize
32KB
MD552f270f15e2183d4393754eaa0aa5a53
SHA154a7671f255752849f9b232b1151803998c97db2
SHA256036f25a8894f77aef1e7dae6d33897c2e740c3b2510836c05c0845f34da0880e
SHA5121b7ec95ab03009992f75642880b3eaa49b3d5ded0835878f0f8a0c011f1ace1d4aeecdb8e1d003dba90d5d4dc608673adc0dce5095c313721f3fb99c7b45c00d