Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 13:40
Static task
static1
Behavioral task
behavioral1
Sample
d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe
-
Size
332KB
-
MD5
d751fee2c28a335e3de105d54f478ea6
-
SHA1
a6a25e2603e735251910adb9f8c032bd7d5a1c9d
-
SHA256
3e877dcafd60525ff6d5ec5dd76a01415afdd321fad8d4f1102b22c71493f603
-
SHA512
a4f897ca7a11974e8d08126ebd98a5a12675de0934f2247e5f320467314ed4a4243804d8d79f4ec54c806b2cf9a537fb241fdc1f755a4546fdb5f948edb78dd3
-
SSDEEP
6144:MM5BqZrr4/U+aJzkJBnd2pmsj/Bg+PHFTuydm8Vcu7cThSkwpA52w6twte9krk5R:MkolWUtJzkJBnd2pmsbSEHd7dvu51Cw3
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\_RECOVERY_+oyyvb.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/9BB8A5F0DA96514D
http://tes543berda73i48fsdfsd.keratadze.at/9BB8A5F0DA96514D
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/9BB8A5F0DA96514D
http://xlowfznrg4wf7dli.ONION/9BB8A5F0DA96514D
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (882) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation yhheorslshpb.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECOVERY_+oyyvb.png yhheorslshpb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECOVERY_+oyyvb.txt yhheorslshpb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECOVERY_+oyyvb.html yhheorslshpb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECOVERY_+oyyvb.png yhheorslshpb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECOVERY_+oyyvb.txt yhheorslshpb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECOVERY_+oyyvb.html yhheorslshpb.exe -
Executes dropped EXE 1 IoCs
pid Process 3936 yhheorslshpb.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qbdyocgqofar = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\yhheorslshpb.exe\"" yhheorslshpb.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_RECOVERY_+oyyvb.html yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNotePageMedTile.scale-200.png yhheorslshpb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\_RECOVERY_+oyyvb.html yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarAppList.targetsize-48.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.UI\Resources\_RECOVERY_+oyyvb.html yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraLargeTile.contrast-black_scale-125.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Scientific.targetsize-64_contrast-white.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\LargeTile.scale-200_contrast-black.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-96_altform-unplated_contrast-black.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\ringless_calls\_RECOVERY_+oyyvb.html yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Generic-Dark.scale-300.png yhheorslshpb.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\_RECOVERY_+oyyvb.html yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-60_altform-lightunplated.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppCS\Assets\_RECOVERY_+oyyvb.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-20_altform-unplated.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\InsiderHubWideTile.scale-125.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Lumia.MagicEdit\Pages\_RECOVERY_+oyyvb.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailAppList.targetsize-64_altform-unplated.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-60_altform-unplated.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_RECOVERY_+oyyvb.txt yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageAppList.targetsize-36_contrast-black.png yhheorslshpb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\_RECOVERY_+oyyvb.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_RECOVERY_+oyyvb.html yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_RECOVERY_+oyyvb.txt yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-256_contrast-white.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\LinkedInboxWideTile.scale-125.png yhheorslshpb.exe File opened for modification C:\Program Files\Windows NT\TableTextService\_RECOVERY_+oyyvb.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\VoiceRecorderLargeTile.contrast-white_scale-200.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\1.jpg yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_RECOVERY_+oyyvb.html yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-40_altform-unplated.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\1850_24x24x32.png yhheorslshpb.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\_RECOVERY_+oyyvb.txt yhheorslshpb.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\assembly\GAC_MSIL\Microsoft.AnalysisServices.SPClient.Interfaces\_RECOVERY_+oyyvb.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\LockScreenLogo.scale-100.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\_RECOVERY_+oyyvb.html yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\_RECOVERY_+oyyvb.html yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Advanced-Light.scale-200.png yhheorslshpb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\_RECOVERY_+oyyvb.html yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\images\FilePdf32x32.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\Attribution\weather_2_travel.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-black\SmallTile.scale-100.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\_RECOVERY_+oyyvb.txt yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-48_altform-unplated_contrast-white.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\es-ES\_RECOVERY_+oyyvb.txt yhheorslshpb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\Landing.svg yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\Assets\_RECOVERY_+oyyvb.txt yhheorslshpb.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\_RECOVERY_+oyyvb.png yhheorslshpb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\_RECOVERY_+oyyvb.html yhheorslshpb.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\_RECOVERY_+oyyvb.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Thumbnails\Sticker_Icon_Skull.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\StoreLogo.scale-200.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Thumbnails\Sticker_Icon_MouseEar.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\AppxMetadata\_RECOVERY_+oyyvb.txt yhheorslshpb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\_RECOVERY_+oyyvb.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\8.jpg yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\Glyph_0xe7e3.png yhheorslshpb.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\_RECOVERY_+oyyvb.png yhheorslshpb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\pt-BR\_RECOVERY_+oyyvb.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Store\AppIcon.targetsize-256_contrast-white.png yhheorslshpb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteAppList.targetsize-36_altform-unplated.png yhheorslshpb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Sort\_RECOVERY_+oyyvb.txt yhheorslshpb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\_RECOVERY_+oyyvb.png yhheorslshpb.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\yhheorslshpb.exe d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe File opened for modification C:\Windows\yhheorslshpb.exe d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yhheorslshpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings yhheorslshpb.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4476 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe 3936 yhheorslshpb.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3272 d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe Token: SeDebugPrivilege 3936 yhheorslshpb.exe Token: SeIncreaseQuotaPrivilege 2940 WMIC.exe Token: SeSecurityPrivilege 2940 WMIC.exe Token: SeTakeOwnershipPrivilege 2940 WMIC.exe Token: SeLoadDriverPrivilege 2940 WMIC.exe Token: SeSystemProfilePrivilege 2940 WMIC.exe Token: SeSystemtimePrivilege 2940 WMIC.exe Token: SeProfSingleProcessPrivilege 2940 WMIC.exe Token: SeIncBasePriorityPrivilege 2940 WMIC.exe Token: SeCreatePagefilePrivilege 2940 WMIC.exe Token: SeBackupPrivilege 2940 WMIC.exe Token: SeRestorePrivilege 2940 WMIC.exe Token: SeShutdownPrivilege 2940 WMIC.exe Token: SeDebugPrivilege 2940 WMIC.exe Token: SeSystemEnvironmentPrivilege 2940 WMIC.exe Token: SeRemoteShutdownPrivilege 2940 WMIC.exe Token: SeUndockPrivilege 2940 WMIC.exe Token: SeManageVolumePrivilege 2940 WMIC.exe Token: 33 2940 WMIC.exe Token: 34 2940 WMIC.exe Token: 35 2940 WMIC.exe Token: 36 2940 WMIC.exe Token: SeIncreaseQuotaPrivilege 2940 WMIC.exe Token: SeSecurityPrivilege 2940 WMIC.exe Token: SeTakeOwnershipPrivilege 2940 WMIC.exe Token: SeLoadDriverPrivilege 2940 WMIC.exe Token: SeSystemProfilePrivilege 2940 WMIC.exe Token: SeSystemtimePrivilege 2940 WMIC.exe Token: SeProfSingleProcessPrivilege 2940 WMIC.exe Token: SeIncBasePriorityPrivilege 2940 WMIC.exe Token: SeCreatePagefilePrivilege 2940 WMIC.exe Token: SeBackupPrivilege 2940 WMIC.exe Token: SeRestorePrivilege 2940 WMIC.exe Token: SeShutdownPrivilege 2940 WMIC.exe Token: SeDebugPrivilege 2940 WMIC.exe Token: SeSystemEnvironmentPrivilege 2940 WMIC.exe Token: SeRemoteShutdownPrivilege 2940 WMIC.exe Token: SeUndockPrivilege 2940 WMIC.exe Token: SeManageVolumePrivilege 2940 WMIC.exe Token: 33 2940 WMIC.exe Token: 34 2940 WMIC.exe Token: 35 2940 WMIC.exe Token: 36 2940 WMIC.exe Token: SeBackupPrivilege 2512 vssvc.exe Token: SeRestorePrivilege 2512 vssvc.exe Token: SeAuditPrivilege 2512 vssvc.exe Token: SeIncreaseQuotaPrivilege 4780 WMIC.exe Token: SeSecurityPrivilege 4780 WMIC.exe Token: SeTakeOwnershipPrivilege 4780 WMIC.exe Token: SeLoadDriverPrivilege 4780 WMIC.exe Token: SeSystemProfilePrivilege 4780 WMIC.exe Token: SeSystemtimePrivilege 4780 WMIC.exe Token: SeProfSingleProcessPrivilege 4780 WMIC.exe Token: SeIncBasePriorityPrivilege 4780 WMIC.exe Token: SeCreatePagefilePrivilege 4780 WMIC.exe Token: SeBackupPrivilege 4780 WMIC.exe Token: SeRestorePrivilege 4780 WMIC.exe Token: SeShutdownPrivilege 4780 WMIC.exe Token: SeDebugPrivilege 4780 WMIC.exe Token: SeSystemEnvironmentPrivilege 4780 WMIC.exe Token: SeRemoteShutdownPrivilege 4780 WMIC.exe Token: SeUndockPrivilege 4780 WMIC.exe Token: SeManageVolumePrivilege 4780 WMIC.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3272 wrote to memory of 3936 3272 d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe 83 PID 3272 wrote to memory of 3936 3272 d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe 83 PID 3272 wrote to memory of 3936 3272 d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe 83 PID 3272 wrote to memory of 4452 3272 d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe 84 PID 3272 wrote to memory of 4452 3272 d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe 84 PID 3272 wrote to memory of 4452 3272 d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe 84 PID 3936 wrote to memory of 2940 3936 yhheorslshpb.exe 86 PID 3936 wrote to memory of 2940 3936 yhheorslshpb.exe 86 PID 3936 wrote to memory of 4476 3936 yhheorslshpb.exe 105 PID 3936 wrote to memory of 4476 3936 yhheorslshpb.exe 105 PID 3936 wrote to memory of 4476 3936 yhheorslshpb.exe 105 PID 3936 wrote to memory of 1480 3936 yhheorslshpb.exe 106 PID 3936 wrote to memory of 1480 3936 yhheorslshpb.exe 106 PID 1480 wrote to memory of 3160 1480 msedge.exe 107 PID 1480 wrote to memory of 3160 1480 msedge.exe 107 PID 3936 wrote to memory of 4780 3936 yhheorslshpb.exe 108 PID 3936 wrote to memory of 4780 3936 yhheorslshpb.exe 108 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 1580 1480 msedge.exe 110 PID 1480 wrote to memory of 2568 1480 msedge.exe 111 PID 1480 wrote to memory of 2568 1480 msedge.exe 111 PID 1480 wrote to memory of 3604 1480 msedge.exe 112 PID 1480 wrote to memory of 3604 1480 msedge.exe 112 PID 1480 wrote to memory of 3604 1480 msedge.exe 112 PID 1480 wrote to memory of 3604 1480 msedge.exe 112 PID 1480 wrote to memory of 3604 1480 msedge.exe 112 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yhheorslshpb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" yhheorslshpb.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\yhheorslshpb.exeC:\Windows\yhheorslshpb.exe2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3936 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4a4b46f8,0x7ffc4a4b4708,0x7ffc4a4b47184⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:24⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:34⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:84⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:14⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:14⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:84⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:84⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:14⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:14⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:14⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:14⤵PID:5116
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\YHHEOR~1.EXE3⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\D751FE~1.EXE2⤵
- System Location Discovery: System Language Discovery
PID:4452
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2912
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD54900927eec690cc56226d7e86f985a45
SHA136557f9124669d21d58711ebdc8dfd795c575818
SHA25647a2479ca056e28e54b75e8baaa80f1fac43597c1d5c1b8312dbcf410766c691
SHA5125ca9ef86f04a250f4cda94bff37160475838eb9beed45e74281c251e581823effa969bd0592b5215cceb1e7699e9a0b2a538a9448c3f30b5d7f9e5ff2b400a91
-
Filesize
62KB
MD5457fc39a3726e1c725e3e09431133d8d
SHA1acde61f67f32bb154c599d8b668c37f302449c07
SHA25641eb1669a4b0ddbfb09a3f624cb5dca876b8175426381f9b049b2c59431e956b
SHA512ac4649e208ecb7c7db7640b3e0fc560f408f2a000a72d51c4862719ed642e3f562f78d5c63a441e4a93c06ad03b30ba5cad47d0bc4940755667952e786d54550
-
Filesize
1KB
MD5b44accb351c5cad27fee1b7ad92721a7
SHA1046ca1852e92b9af75487c6ff0f6af6a70ee6022
SHA2566c9ee6b8409d1524e7a806c981f85a3733f82791761ca0c8f5413a011b0aeef6
SHA512f6989ae4663ed818a7fbe4e0a6af267b46049bc50ad5c11533abd5704a4244bc1c1519b8a704789a88ffedb7e0b4960b33cb130e1451187f2cb3f25f418bfa55
-
Filesize
560B
MD5fe39b26e66ea419f3f901481e0525aa8
SHA14e74b404c321637f61cf51f0417b2686350b8d8d
SHA256fe172b847d29e146e4ca4120d850fe1db5196936dd9a6f5a89d44b82fd58e297
SHA5125b1292c445f9c3f576eb53968eb0da815f736acf7cd4814254d32205fef6a8d93b1dfe14cabe1956b119a23cc71b78fa9a53575ca2684e367e3f30351a42427e
-
Filesize
560B
MD52f9a360c8500dd9039904966e0155db4
SHA1683b44ba56ff67a3fa27f5b114826d62d6e03196
SHA2562ecdaaad74456e1feb026b7e0f3f6380d64fe7a8dda52d623be55e3fbc965daa
SHA5124f4a96220e43497a5e1efa414acfc2bc437b9a0fdfeeba1f90d1ca533299fd9fadbdab427ecb6928014303ed46bf14ded136efa4f60306dc7eaf9d647773bfe3
-
Filesize
416B
MD59f5e1fad33372806364fa1355e3de0de
SHA10bdd3f973e25055d1190f35997bad9768083a587
SHA2564a2db0b01a72eaa692181a7c412f8176779163b0a6e1a6f014eb61c2af6ef394
SHA5128cee7c737e39c47a50fbd0e888b824759e9f6b0ae091c003a491185802eaba64cc57c0fb435d8cc04abf9f9aec93471d3723b49fb0590d27cc4644623e7e8a1d
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
6KB
MD5c8e971ec8ea46ccdc5c4d05055d07298
SHA1db53ce04fc10752f93320bd655119c3f3ade1fb5
SHA256f3b355d96d1f04d7d1a6d8170b51ea20b7b86d808b42c74511978441dbf3c4a4
SHA512ca6c8ef9de4cf9d0c5515095e745bc97a34e6381aab9ea36e1ec2353c318c3c237ce3e8a899e378507e53f0079ad4f74103508324f84134346bb4c8644b34a8e
-
Filesize
5KB
MD5a702893615d5c25dc13dd5d4c7f88bfd
SHA1ee10cff5616b7cd251b79f3d9bc634084b1e3af7
SHA256ab0365bb89beb6a7bbbe4220dbee6cefb907a3011ebe6373be7a97940abaf018
SHA512b938654fbe48dd89018231ff1563b79d753f0403c02c73729cc1f74f62e3b311f5c085882718f398a3c7b93923563086e2a6810a5e7ad2e79f210d1864db0851
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54a243aecf418686508c1738c5a7f0e73
SHA1a2d4eb1124adce308605b04831f7394ce63cfc45
SHA2567e98d83a7b06f7d3d6ecf15eefcd709cdaddb33115d62a234a16d26e0cd09354
SHA512acef779349b635627f2431d3cc4e47d18c5c6d259ed61ead3f7fa816b58d607fce59e1cf01cb9ac12fad3b8d560281dd8d1d576adb9717309bb04eb11d6dcd82
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727662192103813.txt
Filesize77KB
MD5d66cfcfaaac305bb951b78b0e152de09
SHA1a89de96d07ffdbfa26179ade21749565b2f62324
SHA256c05f1c3f70e00da76c6958d541bc625473ef20ab5e12c86d1fde4d0b8668b810
SHA512fc0919ef2b1e918b85d689e66f224a3a661b3567ff774b7a30937f490f8c8d8e633f388b5e2efe0c899566c7ebf0f9d8bdb3ade3d51c9244f0fc821a54885ded
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727663401899668.txt
Filesize47KB
MD58a3864b118193f844b51b5d5c2da9b1f
SHA1d5726397a220eba78071f25116ad91c5830b4531
SHA256c8b4b45bd1b26747c726954bc475b81db7bb97a8591dd888f56636ba1282646d
SHA5127621daa7d633a9bfce7b99273ab5ecab665a3aef515cf1c53761ca24a6f53bdf13b90a6baeb6ab7eda9407bd96932c1bf5aa304816b494d12c5f98e95d8675c6
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727670771168387.txt
Filesize74KB
MD5d9255907b9c272b6cc48d4e34b11d65f
SHA10928402991103d31e54ebda91a192f9a87e24eea
SHA25602486555430b1c14bb6c24447f3626937b3a4b92b2fc5fd307d5dec2ed565255
SHA512027df4ba2b8f0333b30a3162474cac298a0b809e13c4025a58da4005019d9cd6594abe657fb2d7895203836d8a46b30751d39bd43369aa1cc3dd0d0eb3e09d32
-
Filesize
332KB
MD5d751fee2c28a335e3de105d54f478ea6
SHA1a6a25e2603e735251910adb9f8c032bd7d5a1c9d
SHA2563e877dcafd60525ff6d5ec5dd76a01415afdd321fad8d4f1102b22c71493f603
SHA512a4f897ca7a11974e8d08126ebd98a5a12675de0934f2247e5f320467314ed4a4243804d8d79f4ec54c806b2cf9a537fb241fdc1f755a4546fdb5f948edb78dd3