Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe
-
Size
356KB
-
MD5
ca85eb1996d4db468a69cc4cc43a598e
-
SHA1
2b6ffcb70c4482e8c90c6a4b05891f8db98eb062
-
SHA256
468950756d28331ea2f2f87e1fbfeda4da535f911170daffc47da958f6289d1a
-
SHA512
dd7502797d24965f14c5a22dc1146121b3ce7cfeea901d88a635e7bdf8761f020a098e2fdb921ac841dc32ce65820379efb9d5f7134650ecc8eb8ce64c945cba
-
SSDEEP
3072:y9U6q94HVacKvR1Pk9LB4MaodiA8v1QSmUJ8TX+:y9U3GlarodiTxmUIu
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.vmfu48.win/6FEC-A386-4201-0063-79D4
http://cerberhhyed5frqa.45tori.win/6FEC-A386-4201-0063-79D4
http://cerberhhyed5frqa.fkr84i.win/6FEC-A386-4201-0063-79D4
http://cerberhhyed5frqa.fkri48.win/6FEC-A386-4201-0063-79D4
http://cerberhhyed5frqa.djre89.win/6FEC-A386-4201-0063-79D4
http://cerberhhyed5frqa.onion/6FEC-A386-4201-0063-79D4
Extracted
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Contacts a large (16390) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1832 bcdedit.exe 1028 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\\wusa.exe\"" ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\\wusa.exe\"" wusa.exe -
Deletes itself 1 IoCs
pid Process 2724 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\wusa.lnk ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\wusa.lnk wusa.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 wusa.exe -
Loads dropped DLL 3 IoCs
pid Process 2860 ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe 2860 ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe 2712 wusa.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\wusa = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\\wusa.exe\"" ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wusa = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\\wusa.exe\"" ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\wusa = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\\wusa.exe\"" wusa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wusa = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\\wusa.exe\"" wusa.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wusa.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpE56F.bmp" wusa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wusa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2724 cmd.exe 2104 PING.EXE 2268 cmd.exe 1764 PING.EXE -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2604 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 2596 taskkill.exe 3928 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\\wusa.exe\"" ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\Desktop wusa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\\wusa.exe\"" wusa.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\Desktop ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409f62b18347db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE6D5471-B376-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003996fad8e0614f4eac689504af3536d100000000020000000000106600000001000020000000a6721f36a5434603c3ef94ad8cf6265efe00b80df9a36bf36d028f893e9a0574000000000e8000000002000020000000179b17e28ee2fc3dacff1e7e3cd17e3c600c2a5942ef743767d715647f21ce6a2000000056693ae222dab87d6196c97671a03ce90d9c5ead9acb3361c58e78e843ee1545400000002abaa8044f93907c8caf2bdd0e027998df93e370f7320e0dc3fffc21e207a56cb22e1cd7a3722a583a1ce21ddce8100bcf018bb50e5bdea8d2c43a4a1c52f9b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE7DFE11-B376-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439612754" iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1764 PING.EXE 2104 PING.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe 2712 wusa.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 2860 ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe Token: SeDebugPrivilege 2712 wusa.exe Token: SeDebugPrivilege 2596 taskkill.exe Token: SeBackupPrivilege 2736 vssvc.exe Token: SeRestorePrivilege 2736 vssvc.exe Token: SeAuditPrivilege 2736 vssvc.exe Token: SeIncreaseQuotaPrivilege 2760 wmic.exe Token: SeSecurityPrivilege 2760 wmic.exe Token: SeTakeOwnershipPrivilege 2760 wmic.exe Token: SeLoadDriverPrivilege 2760 wmic.exe Token: SeSystemProfilePrivilege 2760 wmic.exe Token: SeSystemtimePrivilege 2760 wmic.exe Token: SeProfSingleProcessPrivilege 2760 wmic.exe Token: SeIncBasePriorityPrivilege 2760 wmic.exe Token: SeCreatePagefilePrivilege 2760 wmic.exe Token: SeBackupPrivilege 2760 wmic.exe Token: SeRestorePrivilege 2760 wmic.exe Token: SeShutdownPrivilege 2760 wmic.exe Token: SeDebugPrivilege 2760 wmic.exe Token: SeSystemEnvironmentPrivilege 2760 wmic.exe Token: SeRemoteShutdownPrivilege 2760 wmic.exe Token: SeUndockPrivilege 2760 wmic.exe Token: SeManageVolumePrivilege 2760 wmic.exe Token: 33 2760 wmic.exe Token: 34 2760 wmic.exe Token: 35 2760 wmic.exe Token: SeIncreaseQuotaPrivilege 2760 wmic.exe Token: SeSecurityPrivilege 2760 wmic.exe Token: SeTakeOwnershipPrivilege 2760 wmic.exe Token: SeLoadDriverPrivilege 2760 wmic.exe Token: SeSystemProfilePrivilege 2760 wmic.exe Token: SeSystemtimePrivilege 2760 wmic.exe Token: SeProfSingleProcessPrivilege 2760 wmic.exe Token: SeIncBasePriorityPrivilege 2760 wmic.exe Token: SeCreatePagefilePrivilege 2760 wmic.exe Token: SeBackupPrivilege 2760 wmic.exe Token: SeRestorePrivilege 2760 wmic.exe Token: SeShutdownPrivilege 2760 wmic.exe Token: SeDebugPrivilege 2760 wmic.exe Token: SeSystemEnvironmentPrivilege 2760 wmic.exe Token: SeRemoteShutdownPrivilege 2760 wmic.exe Token: SeUndockPrivilege 2760 wmic.exe Token: SeManageVolumePrivilege 2760 wmic.exe Token: 33 2760 wmic.exe Token: 34 2760 wmic.exe Token: 35 2760 wmic.exe Token: 33 3876 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3876 AUDIODG.EXE Token: 33 3876 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3876 AUDIODG.EXE Token: SeDebugPrivilege 3928 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3440 iexplore.exe 3360 iexplore.exe 3360 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3360 iexplore.exe 3360 iexplore.exe 3440 iexplore.exe 3440 iexplore.exe 3360 iexplore.exe 3360 iexplore.exe 3452 IEXPLORE.EXE 3452 IEXPLORE.EXE 3544 IEXPLORE.EXE 3544 IEXPLORE.EXE 3608 IEXPLORE.EXE 3608 IEXPLORE.EXE 3608 IEXPLORE.EXE 3608 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2860 ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe 2712 wusa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2712 2860 ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe 31 PID 2860 wrote to memory of 2712 2860 ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe 31 PID 2860 wrote to memory of 2712 2860 ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe 31 PID 2860 wrote to memory of 2712 2860 ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe 31 PID 2860 wrote to memory of 2724 2860 ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe 32 PID 2860 wrote to memory of 2724 2860 ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe 32 PID 2860 wrote to memory of 2724 2860 ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe 32 PID 2860 wrote to memory of 2724 2860 ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe 32 PID 2712 wrote to memory of 2604 2712 wusa.exe 34 PID 2712 wrote to memory of 2604 2712 wusa.exe 34 PID 2712 wrote to memory of 2604 2712 wusa.exe 34 PID 2712 wrote to memory of 2604 2712 wusa.exe 34 PID 2724 wrote to memory of 2596 2724 cmd.exe 36 PID 2724 wrote to memory of 2596 2724 cmd.exe 36 PID 2724 wrote to memory of 2596 2724 cmd.exe 36 PID 2724 wrote to memory of 2596 2724 cmd.exe 36 PID 2724 wrote to memory of 2104 2724 cmd.exe 40 PID 2724 wrote to memory of 2104 2724 cmd.exe 40 PID 2724 wrote to memory of 2104 2724 cmd.exe 40 PID 2724 wrote to memory of 2104 2724 cmd.exe 40 PID 2712 wrote to memory of 2760 2712 wusa.exe 41 PID 2712 wrote to memory of 2760 2712 wusa.exe 41 PID 2712 wrote to memory of 2760 2712 wusa.exe 41 PID 2712 wrote to memory of 2760 2712 wusa.exe 41 PID 2712 wrote to memory of 1832 2712 wusa.exe 43 PID 2712 wrote to memory of 1832 2712 wusa.exe 43 PID 2712 wrote to memory of 1832 2712 wusa.exe 43 PID 2712 wrote to memory of 1832 2712 wusa.exe 43 PID 2712 wrote to memory of 1028 2712 wusa.exe 45 PID 2712 wrote to memory of 1028 2712 wusa.exe 45 PID 2712 wrote to memory of 1028 2712 wusa.exe 45 PID 2712 wrote to memory of 1028 2712 wusa.exe 45 PID 2712 wrote to memory of 3360 2712 wusa.exe 48 PID 2712 wrote to memory of 3360 2712 wusa.exe 48 PID 2712 wrote to memory of 3360 2712 wusa.exe 48 PID 2712 wrote to memory of 3360 2712 wusa.exe 48 PID 2712 wrote to memory of 3372 2712 wusa.exe 49 PID 2712 wrote to memory of 3372 2712 wusa.exe 49 PID 2712 wrote to memory of 3372 2712 wusa.exe 49 PID 2712 wrote to memory of 3372 2712 wusa.exe 49 PID 3360 wrote to memory of 3452 3360 iexplore.exe 51 PID 3360 wrote to memory of 3452 3360 iexplore.exe 51 PID 3360 wrote to memory of 3452 3360 iexplore.exe 51 PID 3360 wrote to memory of 3452 3360 iexplore.exe 51 PID 3440 wrote to memory of 3544 3440 iexplore.exe 52 PID 3440 wrote to memory of 3544 3440 iexplore.exe 52 PID 3440 wrote to memory of 3544 3440 iexplore.exe 52 PID 3440 wrote to memory of 3544 3440 iexplore.exe 52 PID 3360 wrote to memory of 3608 3360 iexplore.exe 53 PID 3360 wrote to memory of 3608 3360 iexplore.exe 53 PID 3360 wrote to memory of 3608 3360 iexplore.exe 53 PID 3360 wrote to memory of 3608 3360 iexplore.exe 53 PID 2712 wrote to memory of 3736 2712 wusa.exe 54 PID 2712 wrote to memory of 3736 2712 wusa.exe 54 PID 2712 wrote to memory of 3736 2712 wusa.exe 54 PID 2712 wrote to memory of 3736 2712 wusa.exe 54 PID 2712 wrote to memory of 2268 2712 wusa.exe 58 PID 2712 wrote to memory of 2268 2712 wusa.exe 58 PID 2712 wrote to memory of 2268 2712 wusa.exe 58 PID 2712 wrote to memory of 2268 2712 wusa.exe 58 PID 2268 wrote to memory of 3928 2268 cmd.exe 60 PID 2268 wrote to memory of 3928 2268 cmd.exe 60 PID 2268 wrote to memory of 3928 2268 cmd.exe 60 PID 2268 wrote to memory of 1764 2268 cmd.exe 62 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\wusa.exe"C:\Users\Admin\AppData\Roaming\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\wusa.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2604
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:1832
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:1028
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3360 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3452
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3360 CREDAT:537601 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3608
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:3372
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3736
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "wusa.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\wusa.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "wusa.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1764
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe" > NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "ca85eb1996d4db468a69cc4cc43a598e_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2104
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3440 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3544
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:3804
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3876
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853
-
Filesize
12KB
MD593b41b9522f531fa8a37dd0f1e051c20
SHA1e6c354e77f7b986029fbe4ca568600da9f5063ac
SHA25656e14b016a86f2f56a70edd9e8ccd8c16308cabb3d50bd8a9595d5d46678082a
SHA5129084fff656929da2b3b7ec1722b78460d0a25e3ebdf93a6972637c78f229efa53380ff2f0bae15143dc3601ffbf0728a3fcaf986e6bd8b32894e506fd745bd0f
-
Filesize
10KB
MD56aea2a67df7ded3060a52ae7ff831938
SHA16b6fb0417a292c31be7e5454bacf1e7163b8b3c0
SHA25607ec9e356daacaddd300dbe99fc4092f4661c3ac0bbfd7008fd175f6308160f4
SHA5129b09f3c8611e3c90253e0d59b1b2d628066de4c67725203bff102696ad76e66cc4810ee5c1bbd4a09a67d49053f78ead794794101232b3d42a1c56cf5f725443
-
Filesize
85B
MD51eb0a3389fb9c1a49f182a769e7c0dc6
SHA1f2fc8ae233fa706a20fc6e17635c3819bc897cfa
SHA25675fc3d80f940c2726f576ffe5a6cd57cb62edb15f1004a1f6ffd048093a82aa2
SHA512ccb373dc9fa99cb9c2fceece12dd4cfe15ba688f0724b920661cbe1600108b78cee7134448a664dd6753dc842a228b855c84b210358b699c7583d029d314cc17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56447b4262947e0a12c097eaee63f0b
SHA104bf83d4a0735e1423ad50242c371ea0808f28bd
SHA2564a978124ab2dfc9f5ebec8504a196dacc2fa432b852faaeb868dba96a09126d6
SHA512259c5ae36ce826aad70d63b4656f53436ea78f73b3cd17b0277f70aef1b322f9abc2e49725356fcb4efa01b1f987d12d8e984523f4b737f27baca1a94408ea25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529bf6766dbd69b417a9d92af55cbabc0
SHA1309d0c47e07e92a0dc907e53119fc1d0968954b6
SHA256fcaf407cd516f5f65bde3ae39c23fce17fdefc27ee0c4ba9db5604ce83a0a902
SHA5123c7fa5c5e6dbae4e2c2ed93135b2c44f8f2b71f2c5ed53dd0e1d851cada29e9e4f99c6e2af60c667e6a8fe8e4951a2448ed5c8c144485274bb8f1d5c15983000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0ca81504529b925e39b151e959e4ca
SHA1392f6b111bc9fb7db3dcecfbeed64c7b45a4da3e
SHA25674a338af591c3ed5d3bb0676a2e5b60390a78c588efd754d4f6e594f41e3b728
SHA512c830ff771791c8a415717f3d43713449c497bd17ae10da18eec5a2111ef9502e6728454e44fc80a3a0370f2207161ebba5526722a597cccff84a60500a0b2e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab87344fb15a58f5fcd8ea4bc606636e
SHA13eea80aad047e51bba30d1d50353ea3068b22b57
SHA256edcb030925e01ebcebf01241e4de1e1678569638eff37430fdbd96e9b633ad1e
SHA5125ffb48c002d518b4406b428ecc62e178b67c0578bd2dd6760b62cd3f9436a3e239af55bd20aae8e68f366525059aec85071e57380069aec22a98cd697ae3a2bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5063f1e3ba195e93629fa99bee638f1af
SHA1dabab24eaa5cbcc99747f8f87221e13d1748a72b
SHA256aa767ca99e1e9bdc336b8e6f40c71d08bc1c31539613ee670ff295925da102cd
SHA5124ccdfb15f81eea33eb0415f1a90fee377af6538b8f403397fd15f3699ecf09fa07e371a8e5c43f8b0d3d0fb80f9e2087c8e17b480a175eee0cd540898d5f7860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584e432502acc8d176e71bb0e55907f25
SHA1a78b265b2e6445641751bea217185cdbf943de17
SHA25644d8ba66811db06669dfb1dd349b95630a331c1191053bcd0719b527af318049
SHA51287dcce9392e70cc97f6292e6182c9cfe195516c971546bc1388109fbeded37c5760518f997f4af28247f6295e17a9e094c5ab4b10602133b352632f23f3d7c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56456b280080d7eab77639deefd52f922
SHA12bfb9a4e3ad9afe1eafa27a9fdb2621a39270cb3
SHA25631860a71d1e419f4cfd2e265c32a0de3ad86dc1a995770ca9de4f0abbf0ca11b
SHA5120f4ac7d5fa082faae7e2e829782e8a205154140f884e390b48187072df6016c0a0eee95a046a643cefc2616f60e50e76e3de5c29caed99ca6dfb0f7874b44a17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9400f75e41d8c87b87b08a033c29e6e
SHA1f1dcc740d8e183eb2d0c0a50feb2511205f1f333
SHA256312621d36c1fdadbff04ab47c88de81eade2b1be8848b596df62cc286b09e159
SHA51278b10957cf71037f47795cc83be4e5936e45cf001760e7aafa27b87c102888c31bee89878da9e79315dd188497b441992429b1f25d1efa30cd69272112ab232c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e2ac9289cf9fc8f0ed9ce44a869fe6b
SHA1b046e3fd3a07c008bb6f77664fce301734430bae
SHA256544807329625d9089145c5e8a46ed743f4104fda090f2013f1668095aac6b61c
SHA512f76fb17a1b2d87c4ab86a0317827134da1cecf91e77c78c473e770f2c9f189ba6c22327be1431f621c6f7f24744129a48f611f930aa92fe116e700cc2799a7e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d188fdf18194d27d32c641a3e85f54
SHA1032b7446a0f0cc2fe434661a6697a00b02337f94
SHA256f9799a7503e5f2b8eb1fe39b584c0478f235dd17c0dc26967db8d2e0f13a9a2c
SHA51245cf712e78bf963ef6216dfa6233a51ab7a5e0d61bc768e5ff639d54a737d386629617b6affb605e4540f42807437cb610acc6df500503c3a3c0aa87c14ccec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c2230ffb5a159ac5efe8cb2cec7b7a
SHA182de0760802cc4ac147b48c1360cda30b21881c6
SHA256bf65d2b6006bf2084384cec1eff32dd172270c9e7d036abfee529b71ac629180
SHA512bdf8233577227c9bd73d6c9e8a42fbd9b96e027d961aa20bf67447ac32a6818883ef4544564845966d389f632eec00342131c245e136d944bcaa0435d147f253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506152657d21562577826ffd99fc39dbe
SHA1925888170571528c0dee156f600c0a63fcd4a2d8
SHA256a71700004330bef6c4737740cf176d7a865e5661df96320a5f1dfdb602e53b60
SHA512626ea4b410e07a8026072aea385ab9554eb3d1bd3a0c1ddfb4b48979dc35474515dc853e1d8084081e207d61a100b729bc7156675a7fdd24732dff8be7707a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d35291884b3bf763a93c3c680ae8c577
SHA150e13f658175bcedaacd42b17ca7fe37561ffabd
SHA2567696dfbb436ccf2e2ca2f57ffffa1415f334342ffd93fc3052aaf9c310e502f2
SHA512d5656d775922ec27a2921aaa35ef3869fbf580176b3502f9f0ad20b5173b25524b1713a91ac872e80bb923f570faa0a3bd84537a0cedc387db8f1d76d92633f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5825f06894313b340f9c1592fbdb6ac60
SHA13ae846f7b7424d2c167d1cd6b8fa60cbeef1c1f8
SHA256724e909b889433742aa163860c1975cb93d4374fd299b29b0ab674929260f1a6
SHA5126a2696ab4b3471f0dfccd3fb54f2137c8f1699cc936cb4f1ade9277c2ac627d818db3c839a122fef4a2876d605144324ac6d7ac204436503cd5b435e66644d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522cb50a18cf5e77e0384fe75f300ffb9
SHA1746e338e410eb3909fec877a355efcc5512f4c7c
SHA256f6ffdd0e4d7d09c195d04535ce0430e1dc32d5bfaeff1c753d582464ac56a04f
SHA5124a0c605a416122e2764fbe7debf1d6d2e19c0edd9bb8b58cad620de90f40c4bc2a35dd4ea2810c98b49772a80449140922b50c6778392d25050c2886b630ece9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626795e108ecabfe695b9c062ef3efdd
SHA1a44f151265b717966e2be7282e7e3c1b063c699b
SHA256f952fbf269ca28dfff4d49d2064def2dae9421c861025fa924629425f1ca34a3
SHA512774e697da28658d1027c46a363c7a4b282891efc4a018b0b99fb812b2b5cc73ad7832c615e70ddd885668cf2ee29cc1b9b46934ede8ef33b9e98126adc3d1f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8cdb554ad03358c16408be44d0d7402
SHA1e51c614993bec8ef8bc29d0fdec6fa01f36ccb18
SHA25657c6885a9023a735f0b85333aeb38f3130b6680139cb01a4799d63edeb8d7455
SHA512ee52947f355491dd22d75dddf90fd4f398481e912cff237605bd9e8d92254c1b5b6f386616aa8ff6ed70ae9f01abf791a13055e8bd1521a8a297e3ac033fb0bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a322c835669aa0e9f4aa0865ac1f548
SHA1660593ccd54ba21dc26c0c50007a1b1f4b814327
SHA2567adb470a5c1226e9f74246fdd0b0779135661c5f8690c00434f9779996ebc64a
SHA512b20c6f246204cd722977d83c8c5c8f68900a1f9e79f53c81ac6745c8a3170a11dfa5dd9ae018ee9a2eb631083e3782c5c7383379b9797e4d489b85e62e6c10b0
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{EE6D5471-B376-11EF-B4E2-F64010A3169C}.dat
Filesize5KB
MD535dd11947271b86816c09e8e75918f04
SHA1bcc77b7c9e58e65a16b8dad78c3dd48e6871192e
SHA25623fb327d01e008de963c4b6ce134dde54511a78e711573dfade0884979b40a35
SHA512020af7fcfb43406dafd1a7eba640659c29e404a63ef64610a90d4a5b8c83bce58decd5409064b06655c31ada44b5464ecd99956782c495094e1cf260f9de33fc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD52004ffdf8000c55213282e7eae19ac3f
SHA104a2283c3c974fdfa6e226cc5fbc84c228d5f968
SHA256449ea97d20206713d39e8056101ac5c05d596033228c0ef21cf6ae14357953fe
SHA512295d7d949870ff2185e12bc1911143138895bf3cadb7ae0cae9947a161f958e504db3fb8e78ddef6ad5e96595542ac7d30c46b439fcc8f1f76e4c24d37ae98cb
-
Filesize
356KB
MD5ca85eb1996d4db468a69cc4cc43a598e
SHA12b6ffcb70c4482e8c90c6a4b05891f8db98eb062
SHA256468950756d28331ea2f2f87e1fbfeda4da535f911170daffc47da958f6289d1a
SHA512dd7502797d24965f14c5a22dc1146121b3ce7cfeea901d88a635e7bdf8761f020a098e2fdb921ac841dc32ce65820379efb9d5f7134650ecc8eb8ce64c945cba