Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe
-
Size
332KB
-
MD5
dc56ff2ad208373e7894272128dcfd13
-
SHA1
492b49938fe3b9477d9f650ea81ea44e1bce2c79
-
SHA256
1ec6d16bb03201b4bb5bf1f2912a037e9f0470b9037e04a1cd40081887ad4f0a
-
SHA512
a944e27f309f003e392104bcfb54bb165793c049bc6cddf562296136038571602abcad2ebfb3d20ad62abbb02f95f0954718da052e6b90d05d2fb6873ca7dafe
-
SSDEEP
6144:tBRwPAvE5Ugv5yEMhQzwKSPKx+f2DmkAKLYmbCT597:tCWacQlSPGhmkx0
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\Recovery+ekvaa.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/193CCC969F35A6
http://tes543berda73i48fsdfsd.keratadze.at/193CCC969F35A6
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/193CCC969F35A6
http://xlowfznrg4wf7dli.ONION/193CCC969F35A6
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (887) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation yyqqotqvhigc.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+ekvaa.txt yyqqotqvhigc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+ekvaa.html yyqqotqvhigc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+ekvaa.txt yyqqotqvhigc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+ekvaa.html yyqqotqvhigc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+ekvaa.png yyqqotqvhigc.exe -
Executes dropped EXE 2 IoCs
pid Process 4992 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tpdgdqhsrbfa = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\yyqqotqvhigc.exe\"" yyqqotqvhigc.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2352 set thread context of 2320 2352 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 90 PID 4992 set thread context of 316 4992 yyqqotqvhigc.exe 95 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-125_8wekyb3d8bbwe\Recovery+ekvaa.txt yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\Recovery+ekvaa.html yyqqotqvhigc.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\de.pak yyqqotqvhigc.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\he.pak yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-200_8wekyb3d8bbwe\Win10\MicrosoftSolitaireSmallTile.scale-200.jpg yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\Logo.scale-200_contrast-black.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-white\MedTile.scale-100.png yyqqotqvhigc.exe File opened for modification C:\Program Files\Microsoft Office\root\Recovery+ekvaa.html yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\Recovery+ekvaa.html yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-white\WideTile.scale-100.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\uz-Latn-UZ\Recovery+ekvaa.txt yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\animations\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionGroupSmallTile.scale-100.png yyqqotqvhigc.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\dtplugin\Recovery+ekvaa.html yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-white\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\IDPValueAssets\PCMobileValueProp.png yyqqotqvhigc.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\Recovery+ekvaa.html yyqqotqvhigc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\1033\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\contrast-black\MicrosoftLogo.scale-200.png yyqqotqvhigc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\LEVEL\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\assembly\GAC_MSIL\Microsoft.AnalysisServices.SPClient.Interfaces\13.0.0.0__89845DCD8080CC91\Recovery+ekvaa.txt yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\Bibliography\Recovery+ekvaa.html yyqqotqvhigc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\Recovery+ekvaa.html yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Square150x150Logo.scale-125.png yyqqotqvhigc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\assembly\GAC_MSIL\Microsoft.AnalysisServices.AdomdClient\13.0.0.0__89845DCD8080CC91\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\GamesXboxHubSmallTile.scale-125_contrast-high.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\TinyTile.scale-200_contrast-white.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.scale-150_contrast-black.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\offlineStrings.js yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-60_altform-unplated.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-36.png yyqqotqvhigc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Recovery+ekvaa.html yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Exchange.scale-400.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\AppxMetadata\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\loc_archives\en-gb\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\Assets\Square44x44Logo.scale-100.png yyqqotqvhigc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ku_IQ\LC_MESSAGES\Recovery+ekvaa.txt yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.UI\Recovery+ekvaa.html yyqqotqvhigc.exe File opened for modification C:\Program Files\Windows NT\Accessories\fr-FR\Recovery+ekvaa.html yyqqotqvhigc.exe File opened for modification C:\Program Files\Windows NT\Accessories\Recovery+ekvaa.txt yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteAppList.targetsize-20_altform-unplated.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-white\SmallTile.scale-100.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\powered-by-foursquare.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubMedTile.scale-200.png yyqqotqvhigc.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\Recovery+ekvaa.html yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hu-HU\View3d\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubGameBar.png yyqqotqvhigc.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\Recovery+ekvaa.html yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GamesXboxHubMedTile.scale-200_contrast-white.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\Win10\Recovery+ekvaa.txt yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\osf\Recovery+ekvaa.txt yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\messaging\Recovery+ekvaa.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailAppList.targetsize-36.png yyqqotqvhigc.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\Recovery+ekvaa.txt yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteWideTile.scale-150.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-40_altform-unplated.png yyqqotqvhigc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SplashScreen.scale-200_contrast-black.png yyqqotqvhigc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\yyqqotqvhigc.exe dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe File created C:\Windows\yyqqotqvhigc.exe dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yyqqotqvhigc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yyqqotqvhigc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings yyqqotqvhigc.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4816 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe 316 yyqqotqvhigc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2320 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe Token: SeDebugPrivilege 316 yyqqotqvhigc.exe Token: SeIncreaseQuotaPrivilege 876 WMIC.exe Token: SeSecurityPrivilege 876 WMIC.exe Token: SeTakeOwnershipPrivilege 876 WMIC.exe Token: SeLoadDriverPrivilege 876 WMIC.exe Token: SeSystemProfilePrivilege 876 WMIC.exe Token: SeSystemtimePrivilege 876 WMIC.exe Token: SeProfSingleProcessPrivilege 876 WMIC.exe Token: SeIncBasePriorityPrivilege 876 WMIC.exe Token: SeCreatePagefilePrivilege 876 WMIC.exe Token: SeBackupPrivilege 876 WMIC.exe Token: SeRestorePrivilege 876 WMIC.exe Token: SeShutdownPrivilege 876 WMIC.exe Token: SeDebugPrivilege 876 WMIC.exe Token: SeSystemEnvironmentPrivilege 876 WMIC.exe Token: SeRemoteShutdownPrivilege 876 WMIC.exe Token: SeUndockPrivilege 876 WMIC.exe Token: SeManageVolumePrivilege 876 WMIC.exe Token: 33 876 WMIC.exe Token: 34 876 WMIC.exe Token: 35 876 WMIC.exe Token: 36 876 WMIC.exe Token: SeIncreaseQuotaPrivilege 876 WMIC.exe Token: SeSecurityPrivilege 876 WMIC.exe Token: SeTakeOwnershipPrivilege 876 WMIC.exe Token: SeLoadDriverPrivilege 876 WMIC.exe Token: SeSystemProfilePrivilege 876 WMIC.exe Token: SeSystemtimePrivilege 876 WMIC.exe Token: SeProfSingleProcessPrivilege 876 WMIC.exe Token: SeIncBasePriorityPrivilege 876 WMIC.exe Token: SeCreatePagefilePrivilege 876 WMIC.exe Token: SeBackupPrivilege 876 WMIC.exe Token: SeRestorePrivilege 876 WMIC.exe Token: SeShutdownPrivilege 876 WMIC.exe Token: SeDebugPrivilege 876 WMIC.exe Token: SeSystemEnvironmentPrivilege 876 WMIC.exe Token: SeRemoteShutdownPrivilege 876 WMIC.exe Token: SeUndockPrivilege 876 WMIC.exe Token: SeManageVolumePrivilege 876 WMIC.exe Token: 33 876 WMIC.exe Token: 34 876 WMIC.exe Token: 35 876 WMIC.exe Token: 36 876 WMIC.exe Token: SeBackupPrivilege 3444 vssvc.exe Token: SeRestorePrivilege 3444 vssvc.exe Token: SeAuditPrivilege 3444 vssvc.exe Token: SeIncreaseQuotaPrivilege 3472 WMIC.exe Token: SeSecurityPrivilege 3472 WMIC.exe Token: SeTakeOwnershipPrivilege 3472 WMIC.exe Token: SeLoadDriverPrivilege 3472 WMIC.exe Token: SeSystemProfilePrivilege 3472 WMIC.exe Token: SeSystemtimePrivilege 3472 WMIC.exe Token: SeProfSingleProcessPrivilege 3472 WMIC.exe Token: SeIncBasePriorityPrivilege 3472 WMIC.exe Token: SeCreatePagefilePrivilege 3472 WMIC.exe Token: SeBackupPrivilege 3472 WMIC.exe Token: SeRestorePrivilege 3472 WMIC.exe Token: SeShutdownPrivilege 3472 WMIC.exe Token: SeDebugPrivilege 3472 WMIC.exe Token: SeSystemEnvironmentPrivilege 3472 WMIC.exe Token: SeRemoteShutdownPrivilege 3472 WMIC.exe Token: SeUndockPrivilege 3472 WMIC.exe Token: SeManageVolumePrivilege 3472 WMIC.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2320 2352 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 90 PID 2352 wrote to memory of 2320 2352 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 90 PID 2352 wrote to memory of 2320 2352 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 90 PID 2352 wrote to memory of 2320 2352 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 90 PID 2352 wrote to memory of 2320 2352 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 90 PID 2352 wrote to memory of 2320 2352 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 90 PID 2352 wrote to memory of 2320 2352 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 90 PID 2352 wrote to memory of 2320 2352 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 90 PID 2352 wrote to memory of 2320 2352 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 90 PID 2320 wrote to memory of 4992 2320 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 92 PID 2320 wrote to memory of 4992 2320 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 92 PID 2320 wrote to memory of 4992 2320 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 92 PID 2320 wrote to memory of 3656 2320 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 93 PID 2320 wrote to memory of 3656 2320 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 93 PID 2320 wrote to memory of 3656 2320 dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe 93 PID 4992 wrote to memory of 316 4992 yyqqotqvhigc.exe 95 PID 4992 wrote to memory of 316 4992 yyqqotqvhigc.exe 95 PID 4992 wrote to memory of 316 4992 yyqqotqvhigc.exe 95 PID 4992 wrote to memory of 316 4992 yyqqotqvhigc.exe 95 PID 4992 wrote to memory of 316 4992 yyqqotqvhigc.exe 95 PID 4992 wrote to memory of 316 4992 yyqqotqvhigc.exe 95 PID 4992 wrote to memory of 316 4992 yyqqotqvhigc.exe 95 PID 4992 wrote to memory of 316 4992 yyqqotqvhigc.exe 95 PID 4992 wrote to memory of 316 4992 yyqqotqvhigc.exe 95 PID 316 wrote to memory of 876 316 yyqqotqvhigc.exe 96 PID 316 wrote to memory of 876 316 yyqqotqvhigc.exe 96 PID 316 wrote to memory of 4816 316 yyqqotqvhigc.exe 101 PID 316 wrote to memory of 4816 316 yyqqotqvhigc.exe 101 PID 316 wrote to memory of 4816 316 yyqqotqvhigc.exe 101 PID 316 wrote to memory of 3712 316 yyqqotqvhigc.exe 102 PID 316 wrote to memory of 3712 316 yyqqotqvhigc.exe 102 PID 3712 wrote to memory of 3516 3712 msedge.exe 103 PID 3712 wrote to memory of 3516 3712 msedge.exe 103 PID 316 wrote to memory of 3472 316 yyqqotqvhigc.exe 104 PID 316 wrote to memory of 3472 316 yyqqotqvhigc.exe 104 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 PID 3712 wrote to memory of 4888 3712 msedge.exe 106 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yyqqotqvhigc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" yyqqotqvhigc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc56ff2ad208373e7894272128dcfd13_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\yyqqotqvhigc.exeC:\Windows\yyqqotqvhigc.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\yyqqotqvhigc.exeC:\Windows\yyqqotqvhigc.exe4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:316 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT5⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c1ba46f8,0x7ff8c1ba4708,0x7ff8c1ba47186⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,14057532624536164367,4652875781505509633,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:26⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,14057532624536164367,4652875781505509633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:36⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,14057532624536164367,4652875781505509633,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:86⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14057532624536164367,4652875781505509633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:16⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14057532624536164367,4652875781505509633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:16⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,14057532624536164367,4652875781505509633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:86⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,14057532624536164367,4652875781505509633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:86⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14057532624536164367,4652875781505509633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:16⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14057532624536164367,4652875781505509633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:16⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14057532624536164367,4652875781505509633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:16⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14057532624536164367,4652875781505509633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:16⤵PID:284
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\YYQQOT~1.EXE5⤵
- System Location Discovery: System Language Discovery
PID:5112
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\DC56FF~1.EXE3⤵
- System Location Discovery: System Language Discovery
PID:3656
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3964
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57b384598a7f6f2d892961713aab3591b
SHA123baf40368202fa6bfd55818be4aec3df61ef0e3
SHA256de89fc48d26eaddd88b613ce65bfed0b72bd099117528562399ddeae8842d899
SHA5120d2684d2843e4a7777f60b29696d0b091c934b0b21d5c6c62529e8191cd1c2675e8e859808e4fac054507503089119db2e1a6e5f3e2df69bd7812da287311fb9
-
Filesize
61KB
MD5d1a88f9924832be12bb8f986b10ac4d1
SHA1b632c0d94a86afb94778902d97a0c93764ef629b
SHA2563fcb8a3573ae3049c07a2841031124a8a3a0b8ef12dc917f0909aaa6e52da02c
SHA5124fa76ec23d152aa276451d6c7de13d04eb6621c2c3b35546f72cca034f5bd1b916cdfeff2030c109fbf9a6f7249ba3b156710b8b81d3e5179d70afef6b224442
-
Filesize
1KB
MD563b44ee90acaa11077d3e696d6cab23b
SHA1291ea81e0282ff4dd1dd0382144ce377ee9ce20a
SHA25638601e027db3ea03c63f8012052cd268fd8dbf883f1c812d1beed23ca8ca7073
SHA512db7d42ec50e7a3e8148c87831ff4121db8e7b6692a6ac9e1216693f67893d7eb032df9d0487e04070f3b51e5bd8c1bdf984428dff3586032a3f26a19c0e9d28a
-
Filesize
560B
MD5a586433a59ccd807618e1a2a18d9d2ac
SHA1b4f3706ed2d395f829305f9c338c45601113e7cf
SHA256d280d14dc4af843429eb146474edaec70d7c7ca1c0d37114e102a095babda27e
SHA5128d4065c375ec28ccd24c3dec4fd291895be7d3f5717c4ee011c8a4c8324946683f262443bb97452153f44fdee1b7988c222c55d6574affe4c41e47fbefdf394a
-
Filesize
560B
MD57edfd5285df7c0410d49b8a870515a30
SHA11bdc2c84dd89d95c3763328526677ee53902e16a
SHA256dee1f9f011138bbf18e6e305e9560e18bf9e7f0aa212ae6c95fdeeae5249dda3
SHA512b8b3aee9a546252c1be84c4d6e10ed57c20278281331949358e88735af79779133b0430070c0e339a4622e2027ca2a9d193864f288c68ca6d45acc5adf73abe6
-
Filesize
416B
MD5f13e4ebf9e49ff0ff2fc6af1ff4af0ea
SHA19cfddf97d0bbfc34291933a8a704624a1fe40cf3
SHA2566d28f36e38b38706cbaa673d096781121d41cfe66394da6b8d05cf6991b788e8
SHA512214515eb98fbeab94057ce24a7575b0055f99c05132e99dae83aeb3b02f6d9c529f083fea0baffaba2803bdc0a924c08d9afcfedc93db18ae492399211ad95ca
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
5KB
MD5c9dbb3c7d4bce198ec8cca2d590d07a0
SHA10351ec452454e1bb3863e355ed363789d5b22d5a
SHA2565922b0a495aed822e0f6b4df66fc718cc14fe0f746b680af218819349843835f
SHA512b6378af2401c4acaaea0e2be9de8f6f7bb08ed75f7ca2765c7feb64969818a09e1b73f132f885185bd8111b7a5c2e0fcc7ffb62deb1811dd19539760df24f7d4
-
Filesize
6KB
MD5b794e037a7234c97d921d4abf8766f8c
SHA1381136a934ff7c433b6801db47a59500a33cc5ff
SHA2563427540acdf08fad437f20c0128189cb426c23ff88ccae9100a882ad7e735346
SHA512f810b35ed1452421eca1656fa98be98f523839e663b3a6091788f4a34f866255c14036bb2a196e6f3c991cd8765c2741f964e38ff8ff04143196a1466e45d368
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD515d1b7d0a05b0481d81078f59c1c45ed
SHA1a8eec2db5f929391d14b3b889e46757e386ab0ee
SHA2569fd80c69920ed7237940c0a5668bda977785536879b8977517ac794682f6df75
SHA5126ee9aadb3d18f6f30947b6076eebd606ec6d23495ba1b51da178804f4efe511bef900f0ced023cbf2377f38a20df44892e945d44a3a1dcf6d25ed99a93d81dce
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727656067266351.txt
Filesize77KB
MD57a21b2874f19f749fbc123402df55820
SHA1836da67160cefa4b76035bd374e7a04bf0469efe
SHA2568b5280e9fcdee6f582fc6261096316f3ab976f8bb313cf2343b6570138f6d102
SHA512ac66c25efe2207da821376e33b7c6d9f4bb7e54aef7f52d55951a893d9a459a3fc2bfcbaf7ea4dac006f9a3c648deb1603081122da0c3e1d9b917e1211ef16f6
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727665714398674.txt
Filesize74KB
MD53d44046e33d1438ca228be3d6886aa65
SHA1f9fe365dd364238cd01640960ed2bfe1d8b6f9d8
SHA256bc174a004fde98813ae7b64e5344961aecf342cb8772f11fd02af3f0e7060a77
SHA512c15c33cd530921fcfe6c6325f7a517aebe64f68b32e8996f8b3a1b475b45f8923001535cc6ea541fdb875811f3ad8c0a3e7b81da40dfb0a151dced09b5b16692
-
Filesize
332KB
MD5dc56ff2ad208373e7894272128dcfd13
SHA1492b49938fe3b9477d9f650ea81ea44e1bce2c79
SHA2561ec6d16bb03201b4bb5bf1f2912a037e9f0470b9037e04a1cd40081887ad4f0a
SHA512a944e27f309f003e392104bcfb54bb165793c049bc6cddf562296136038571602abcad2ebfb3d20ad62abbb02f95f0954718da052e6b90d05d2fb6873ca7dafe