Analysis
-
max time kernel
137s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 07:26
Static task
static1
Behavioral task
behavioral1
Sample
fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe
-
Size
189KB
-
MD5
fef9344ab43ca53984e45b9de42b07c1
-
SHA1
b816b11ebebcefb845a5ce52bef81d4ab6977174
-
SHA256
27774522cc4848729069300e39654e834e34809f42821d0194ae1f81a412e52d
-
SHA512
ca804be21964c00c6f1e6b6194a1db5515fba86d23ff3b38afc142140e4199d76bfae1e3f420a07f014082026df9532a3864a8b7bade636cad05984229c212d8
-
SSDEEP
3072:o/xkurCTnSOfXJv451a6ahso77pRoh8ottNZOUaWK1vbcHPjjPmxrJTLftFc5zEv:o/uTZFua6af77e7Z69lbxrJXKgaTJO5
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.txt
cerber
http://52uo5k3t73ypjije.b7mciu.top/01D9-9A97-41C8-006D-FA1E
http://52uo5k3t73ypjije.hlu8yz.top/01D9-9A97-41C8-006D-FA1E
http://52uo5k3t73ypjije.thyx30.top/01D9-9A97-41C8-006D-FA1E
http://52uo5k3t73ypjije.h079j8.top/01D9-9A97-41C8-006D-FA1E
http://52uo5k3t73ypjije.onion.to/01D9-9A97-41C8-006D-FA1E
http://52uo5k3t73ypjije.onion/01D9-9A97-41C8-006D-FA1E
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\rasdial.exe\"" fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\rasdial.exe\"" rasdial.exe -
Contacts a large (518) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid Process 2544 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\rasdial.lnk fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\rasdial.lnk rasdial.exe -
Executes dropped EXE 4 IoCs
pid Process 2516 rasdial.exe 1236 rasdial.exe 1556 rasdial.exe 984 rasdial.exe -
Loads dropped DLL 8 IoCs
pid Process 2320 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 2320 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 2636 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 2516 rasdial.exe 2516 rasdial.exe 1556 rasdial.exe 1556 rasdial.exe 1236 rasdial.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\rasdial = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\rasdial.exe\"" fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\rasdial = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\rasdial.exe\"" fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\rasdial = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\rasdial.exe\"" rasdial.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\rasdial = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\rasdial.exe\"" rasdial.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rasdial.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp8A07.bmp" rasdial.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2320 set thread context of 2636 2320 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 28 PID 2516 set thread context of 1236 2516 rasdial.exe 35 PID 1556 set thread context of 984 1556 rasdial.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rasdial.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rasdial.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rasdial.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3024 PING.EXE 2544 cmd.exe 804 PING.EXE 1584 cmd.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0005000000019277-52.dat nsis_installer_1 behavioral1/files/0x0005000000019277-52.dat nsis_installer_2 -
Kills process with taskkill 2 IoCs
pid Process 2560 taskkill.exe 2848 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop rasdial.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\rasdial.exe\"" rasdial.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{24904338-379E-53D6-B3B4-47BAA50F43E4}\\rasdial.exe\"" fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004b934737864b364494d2d1b5fdb024250000000002000000000010660000000100002000000052639bfd0115afc652fb7ef71f9df9b03b60d29958da116068ed8bce0bb4c0f2000000000e8000000002000020000000275a526f7e86f610ac25f339ac0796ebe246b75d58e8ce784e7192c071cdab759000000052ea40c38b776ab47ff04350c0dc25073f4f10924eca4aabbf76f945f6e8044e7507cabd1c86408fe313dccc7908a88002d5539cae57c8c98c5f6a72553a320f2b7a30862b17ed82acb37bbe836205b2462efc6bea641c100493661565997cd5786c3583a5da1ccf988b9ff0e8222c1fd6ed79683a20e0e38f6466c5562abcf683e0abbf5bfe1f54e985d5acf50a685540000000e1bbc927466c1232ff539202782793800fe77bc2866f74aef539ef1b7893e74f3ad36e946e56eb240e529b0eba218b005636475ad2514f33df41b6d0fc689124 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e52d71e751db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE422791-BDDA-11EF-B895-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004b934737864b364494d2d1b5fdb0242500000000020000000000106600000001000020000000dd08f625ac29a49c32ac723998cc525fe9e4598e3ba299b0e829023798a4bcac000000000e8000000002000020000000621fe660dcada12897b2616f456cde134dec9fafcd92c6b7ab1dfa2e619ae61d20000000ce97d61a4816e4c7249adbbdcdca8be1204ae2fb95a0cdbd7f877cafff150e494000000068a53ba7a93e47be9145ac37d2d980b3e7645d8ec412642adfe20e09015a483de2ac5f1a527c3f9e50114340f8c71af1167b7fc2ccce79b8603800a30d8b4b9e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE506FD1-BDDA-11EF-B895-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440755107" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 804 PING.EXE 3024 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe 1236 rasdial.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2636 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe Token: SeDebugPrivilege 2560 taskkill.exe Token: SeDebugPrivilege 1236 rasdial.exe Token: SeDebugPrivilege 984 rasdial.exe Token: SeDebugPrivilege 2848 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 1980 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 2556 iexplore.exe 2556 iexplore.exe 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1980 iexplore.exe 1980 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 264 IEXPLORE.EXE 264 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2636 2320 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 28 PID 2320 wrote to memory of 2636 2320 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 28 PID 2320 wrote to memory of 2636 2320 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 28 PID 2320 wrote to memory of 2636 2320 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 28 PID 2320 wrote to memory of 2636 2320 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 28 PID 2320 wrote to memory of 2636 2320 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 28 PID 2320 wrote to memory of 2636 2320 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 28 PID 2320 wrote to memory of 2636 2320 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 28 PID 2320 wrote to memory of 2636 2320 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 28 PID 2320 wrote to memory of 2636 2320 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 28 PID 2636 wrote to memory of 2516 2636 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 29 PID 2636 wrote to memory of 2516 2636 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 29 PID 2636 wrote to memory of 2516 2636 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 29 PID 2636 wrote to memory of 2516 2636 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 29 PID 2636 wrote to memory of 2544 2636 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2544 2636 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2544 2636 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2544 2636 fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2560 2544 cmd.exe 32 PID 2544 wrote to memory of 2560 2544 cmd.exe 32 PID 2544 wrote to memory of 2560 2544 cmd.exe 32 PID 2544 wrote to memory of 2560 2544 cmd.exe 32 PID 2544 wrote to memory of 804 2544 cmd.exe 34 PID 2544 wrote to memory of 804 2544 cmd.exe 34 PID 2544 wrote to memory of 804 2544 cmd.exe 34 PID 2544 wrote to memory of 804 2544 cmd.exe 34 PID 2516 wrote to memory of 1236 2516 rasdial.exe 35 PID 2516 wrote to memory of 1236 2516 rasdial.exe 35 PID 2516 wrote to memory of 1236 2516 rasdial.exe 35 PID 2516 wrote to memory of 1236 2516 rasdial.exe 35 PID 2516 wrote to memory of 1236 2516 rasdial.exe 35 PID 2516 wrote to memory of 1236 2516 rasdial.exe 35 PID 2516 wrote to memory of 1236 2516 rasdial.exe 35 PID 2516 wrote to memory of 1236 2516 rasdial.exe 35 PID 2516 wrote to memory of 1236 2516 rasdial.exe 35 PID 2516 wrote to memory of 1236 2516 rasdial.exe 35 PID 1324 wrote to memory of 1556 1324 taskeng.exe 40 PID 1324 wrote to memory of 1556 1324 taskeng.exe 40 PID 1324 wrote to memory of 1556 1324 taskeng.exe 40 PID 1324 wrote to memory of 1556 1324 taskeng.exe 40 PID 1556 wrote to memory of 984 1556 rasdial.exe 41 PID 1556 wrote to memory of 984 1556 rasdial.exe 41 PID 1556 wrote to memory of 984 1556 rasdial.exe 41 PID 1556 wrote to memory of 984 1556 rasdial.exe 41 PID 1556 wrote to memory of 984 1556 rasdial.exe 41 PID 1556 wrote to memory of 984 1556 rasdial.exe 41 PID 1556 wrote to memory of 984 1556 rasdial.exe 41 PID 1556 wrote to memory of 984 1556 rasdial.exe 41 PID 1556 wrote to memory of 984 1556 rasdial.exe 41 PID 1556 wrote to memory of 984 1556 rasdial.exe 41 PID 1236 wrote to memory of 2556 1236 rasdial.exe 43 PID 1236 wrote to memory of 2556 1236 rasdial.exe 43 PID 1236 wrote to memory of 2556 1236 rasdial.exe 43 PID 1236 wrote to memory of 2556 1236 rasdial.exe 43 PID 1236 wrote to memory of 1944 1236 rasdial.exe 44 PID 1236 wrote to memory of 1944 1236 rasdial.exe 44 PID 1236 wrote to memory of 1944 1236 rasdial.exe 44 PID 1236 wrote to memory of 1944 1236 rasdial.exe 44 PID 2556 wrote to memory of 1156 2556 iexplore.exe 46 PID 2556 wrote to memory of 1156 2556 iexplore.exe 46 PID 2556 wrote to memory of 1156 2556 iexplore.exe 46 PID 2556 wrote to memory of 1156 2556 iexplore.exe 46 PID 1980 wrote to memory of 264 1980 iexplore.exe 47 PID 1980 wrote to memory of 264 1980 iexplore.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\rasdial.exe"C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\rasdial.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\rasdial.exe"C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\rasdial.exe"4⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1156
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:537601 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:1944
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:1144
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "rasdial.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\rasdial.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1584 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "rasdial.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3024
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe" > NUL3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "fef9344ab43ca53984e45b9de42b07c1_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:804
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7039787E-E38A-44D9-AFE1-BE097DCB8841} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\rasdial.exeC:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\rasdial.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\rasdial.exeC:\Users\Admin\AppData\Roaming\{24904338-379E-53D6-B3B4-47BAA50F43E4}\rasdial.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:264
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:1964
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5d62142318c4e6df23b6f2a7e0fdbc89c
SHA12bed63a311e0086079e924bfcf9c534edeee001f
SHA256a5747fa5e154f06ecd1bcb26325051da5ce902e82791a8a1cfd3f1144a22c4e3
SHA512ff400738c13b61cc6b4b3e4da57d90830ce08d663b3be994b9684acbb297ca8d9f1a2a61a8ec2dbfd236eedf640baa236684a640b80db71b577c604fe51b18d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575273ed518099f2cb55b53b09cc13189
SHA110ff7d333809ef026cc8fb0cd8cfc3cc06ab8117
SHA256d76f3a4e6ff37d141b41aeed5ce06c3bcd883ddc479037440b72755a8fb2e871
SHA5126e3dfb1526eddbe2e0735d991f1d3c01c4e3501832a5e258d2a8efd7076403b2396887bdd40782bf0b864a8a50be7651d169ad33bdfe9e863ddc6d09670046c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b50040aa107f9bbf4201a964295794da
SHA1431be8947e6004fb8417c557353a346834f2c1b7
SHA256dde280aad56b5164d6d8f453486fd80fd1cbd5829afab006cc2549b00ef71470
SHA5124185b3e14b9a75a9c48b0dc2d3dd868803ae61d1cbe956a6cf4ba81c2f918fccf0063b07513a08c2e51019428af33e7cd55720874eadcb1ae5d8ab764a37620c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b464c743107d3deb287d158641c765c5
SHA1693d457eb1bffc823b29d206523a40626e91853a
SHA256e7e2d1e53dc72580cadbd8621fa126bc21adcb5526a22d5fcd6af546abf1a128
SHA512d5a293a96f3740081db25e05cbfead4c67363d5f9c67ff13000f1c3a96f0fe431e02e4d7d170898bc92c26683839a3e96ed8276f60706abdbe2ea18af221fa8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51711624c7b2eadbbf11ec02727e60821
SHA1b2fa09c2b17da1bb86ad8a8b871dda431880b804
SHA256325e35de46b3c29f5a6cae4dc4d2d014865673ffdf377092dcf5ec92506c8fe3
SHA512a55ea22e0f886603590c06e65a91c4fffcff353ea7c772a9dc6077eec6a013f79d056a7377358e3c2c941e37e94e8a248007199ef53220136785e631e3b20146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e9fb030889265e5e688cbb861b3ea5
SHA1516d9de12db0ea917e62704dbcd6975c7a65c438
SHA256a2ee9c004ad2adda8f2f8fba4e22d5994797363fd81fc4c41a1b074d874269b1
SHA512a793f3a8298932062c7a262db63682926c6f3c5ab9449964fb9502df01536a0c6dc8c5fdfc9a52dc5eb8f91e552ebdc0c0ea67b28e1ccdcdedd93cbdb00e9b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba9fd2e4b83eed206d72e8e5d7cb46df
SHA189d4b4bb56d55e0e4701bc45be163641c76673f8
SHA256ea38c026b62c75ae9a226a2449cade58904559b185a5603f2b64e20370722940
SHA51295b84bcbfadf531c2363468d2da7955897fc5559b0f5796937110ff51dd1e90e737a630e47832c0cb16d17c9990ce42e015aee785a419f68d77eb0e26d1bb092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517576d6d9fab071c88d73e654d55e8a7
SHA15ffc3d2d61ec2be2cef2d69436ee031e1627e73f
SHA256f72a08dc49a87ece917ae6925a32efe46dbd8d3f6d5daa3c3c15d111b2c062bb
SHA512b0f91bd5527291d3a4219af0d8702e1d0c638cfec5b971c0e8cfd8869d16608d5fa4523bca5c5450b334a466846ec00fc4b19c6111d3d2e2ff434721f24a1606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f4702cf1c7f6006ec032f1c5d84577
SHA1c9abbc36f844da60b7eb9980951b065fa27f4b0c
SHA25663af173b5ee579490b34565e76b5e3495d7910e58d99cf90e8eff4af476fd472
SHA51221dd5a5cd76341f8e4a2c87deaa13186b9a0dfa6ebf705345b12a712c49fa8fa734a95ebdc9ff329f911d84194c173265502360592c971f2f6d10a3b92ae491a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec1c24dac5d5cf9c7e44e0dfefd5e86
SHA1080b850143b97706dd55776269e6591d80fbfb9c
SHA256c57cdb599acd56a93524b4f801db70ffa148a1f0bf683682aceaba5c0496c0ae
SHA512362bcda37e21de723bf3a458830767d60b41ebd60a20c2e2041b9b5d744e2208704e9d8275101e9bd00e743fd00063da5d189ef17a430e630c3f73afb6f462ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ac2aa7fa9c8e9762be6af4ab69b8a28
SHA19ed3c3cf45ae7f45a8d82ef9c1d6829b69826963
SHA256e9776d9baacf1d8d80fc75ceb232422cc4d602a7dbd6e03cc794be92317efff4
SHA51225bc774dc88b998f72dcf76adb6ef1745360797d338459b549be64bb1d22a162dda2134bc69a78baa2379847d1e724c5a9e0719fc21388ee89ab19242a56237d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f6cc06d460b339b36ef8048e96944e1
SHA1469327c5834c289934113b3aa9c5f7fc8aac683d
SHA2561b4435de2020f9b0ab37d5fff13d20c958c03995afb9ad999c2555f87beedbd4
SHA512541218cc220525dd84ea007063cc839291f41ed6d45ac5665e910cb205789011ff3537d9f3966d02ce4f334697dd9a3e835f9df9d7a9c0a6fcb2ec104758b3b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557eac50584b65cfc9426750148e6ba74
SHA1c3bd564ccd6e9e1b7f260ff93bd35c52346b0f80
SHA2560532ac2f25afaf2e6331086c217868262e72439af49d3e4b459ed29b11788578
SHA512f03b0e1aebe5cbe23881920b4996ae46ff1936b3dc065ac88de5f4d0e2a09da515344d706f1ba619037ea198a49bc9bf488e02730f9c5ea0d0a41ffd2f8cd7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588082c8d1637ad58356b0dfc9f9553d6
SHA12f78a5ca2e4c0292b74e9889cb3ecb31b666f8ae
SHA2568ace3666548aab82fd9da372a0a7d7a16f30801c176de5e1f4923ffb468891e8
SHA512d5934ac6037fdb9220e5fc8e219cf0f69ba4c73c4539fc4039d9fc46c40bef3929d82228038f87e64adc00b23637ecb474dd655e790f4a8d4176151306646a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f536d43a9d68b447d45ea4afed2e76
SHA1eb50d5d61ae2ebfeb5d702e5460110b8f128f1a2
SHA256c34664819ae84718248a75c83c5f6cab6b2ca3466d96fbb8e044b2db7533a778
SHA512cb1e5b1e7cc83e2b539743a0425a123108f562704f1def8d889767731c2ea55a6282a992184676cb976465d0f6dcebdd0b9ab874a7e3620c40accbb3a30e6f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d292bc6b7e582a79104e6a34fc136eca
SHA1e5d09d1626bf4c6527080df981e24cf367d43274
SHA256cd03d2af7905b346565576deb8fc097b6736d14c8ab75cfc6e0f90bff4f80f1d
SHA51283024fae02ab338c8398d1f520a177d2250697611263a62b7f0db66d19ada48f1658f12fad602038a6675a7991db9620fa2930dde6dd0686962a23428fdad51f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb48ff2722c923cd570719d996afdbc
SHA19cbf9aec7be4a5f394859d0e1d1b5c2e78a1e0cd
SHA2569811679856ad1823349a696f9b33252417fc8da79683d52f90214b35593535f8
SHA51204740bbfd573db0d812b6cee536286285aa43076a682cb15da32dfb8fafb6f859aaef6aa40a571b04ab7a5449ff0955da40cb29c57128422c67b04f5111d4c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503bdb0a778dea023ea5413efa982fd2a
SHA18c9469ec8431ae824dfb2fd50035398110bf2899
SHA25632a05d1aac6b1ae5578f71bcb760c69a21c444bbddcc922a51d63ce270bccdfe
SHA5120a757f1a79e229d1516c0a727322b4d38f52c4b5e93a15bdeac1657105bccd2289e28c2d659c05b74046ddb1dd49ef4efbedbcf8ca8eb66dd3ad53bbf17a796e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e14ad201471d088d0d878dd6dfad518
SHA1b90984193afcdb88c5559ab0d67a4adf28c33a65
SHA25640bcb1108fb704fb16d4b3681bb2fdac7a9a56c0a7210905f16582955804b02f
SHA512621fc3eb52fb30bd155b28f99361e78dcc794bbce14d0d55abe69f3100c1b90d6321839d388fe2eb5c4bf5e738e99c00c729c9d868669351086e2e7b70a3a48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5385a8da0e289d37adf7cd9b846046285
SHA1d697c072eafa2889cfc7839f3fd3a24e91749474
SHA256538badfd8f6815293ffc50b7189c872696cd17755abad8d279312d7f93bfe2c4
SHA5129e32ac020d62a6bdfeba7abaa79f7ca2ad7f66982ffa43dfdd94ecee85bec0257daf81867413d986d74f1ec732ec68efb99a7f2c462a4a8310e9923467e9648c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD5fe97ee17f001e5724ef103754fb32f7e
SHA1b12ad571d8201d5584446c20df7302947b94ae5e
SHA256c44863944bc085c1c8af13b0d22d79f44689c0dcaa19dfefcab8532906baf27c
SHA51230cb641808fd1959915a0e1fbcf45da3be5630f1df0a859377737e9651bd56ab1fdf2d94594233f36a093ee74d919a102e3e2ae2a66947c109c9780ed31d10b2
-
Filesize
524B
MD502710317e2ed8cff32667d51f5b66075
SHA14864ad2b003b38295a26301488366d5ab02ce546
SHA256d0807c59413e8607b26eda3f20989ce2baaa57ed387e8754e050ac64df39230b
SHA512698f08773b1cd7702a96dd5a0fd3dc5185abe070dabdc2c2907ab9968bf39cd2ad67ffdec778997e60e3785b56d0ec288b66cfe6a37bfa0f69f2a3be962a1c83
-
Filesize
126KB
MD522ecb073f20fa7aaa0632df14f5413e2
SHA1f4357bd1101d63c09c8ae615760e0ed6457ba1b9
SHA256e15fb74281f181b806253b61bd416ff02b534732bf39c1d01d540ec7a33ccb2e
SHA5122837f49a675a2ab5c703ea387a905894a96961aa4f17ad3ebc3f0c85b95cc8c4ce45681e30da5aef1f7d27d95d7607197d7da05006e813953e8ce978846d67c5
-
Filesize
509B
MD5e48f88be96ebc26dbb0ffcc604997483
SHA199f857985e9eeb3e78b1d07ecf93701349a1772a
SHA25671b97cc87cc10a413bd1ad45e5c131d99acd5053d7a326bbbc8e041b0b1c4926
SHA51286221e10d4626779cda787e3b83e4d5f042660b6e5ea31f43c448fc831b0c6a26ea749699bb9676362984c6e798df1e6bd4a45b6897599e5e17d0efda8949ced
-
Filesize
3KB
MD5c2b143dc4ee1df5f628a40c06c9553a0
SHA101b6854f5204656b7d35681fb7ad871385a6cded
SHA256001902229a1cf8b5774ced9a929320f9f3bbc7cd6ff44c692b317fdf68fbf93e
SHA5128cd0cbe90f17a55b20d1a1a85254dc56322fda6ba5456eaa6a617936b10f724edb72dc490569f2b1b48cf8ba699c6a556b18d782a999d737e7f21553f5a4aa8f
-
Filesize
3KB
MD5c22dce2c95e3fbc8ac2f569b7fb8474a
SHA19e5b1c407424004fa5c0c1d96af96a9b0e10353e
SHA256423cad4eca8206b5b3ef851278a749e5246042e32759abe6b2026d14ed2ba6d6
SHA512f516531af2f75cb949ef6fbd2bd18e12aa07f94e2b7cb1398d0b13033f84c91f32ca28dc76c6e8caa8191c7b115a3cf59fddc241bfb3e244ae50247c6eee69f1
-
Filesize
588B
MD503eeedd6926392057b761444ea01871a
SHA1e3cc8ce79e0625854e1f922ebbe4ba2f44d0248c
SHA256ba6662dd53b64810a0449f9ff4a9ca3a46f2d5ad63ba66507d00988b64bc043e
SHA512c8516e29e3b8a2b9d9f8e43d472cd4d4af6393f5be2cbe59ee6422f7238a3bfb7523c821d9ed1de25136f58905af54b724528e80562f20e2f250927851b17968
-
Filesize
10KB
MD571d66046280ad4b9ca878ba99c682940
SHA1c08d4d20d600c1b5ab246da2229d608416adaa11
SHA256b064f907443ef1d16a3217973bcb21b356112cbc54174e7afcb8931edd738349
SHA512ca720d299df33ad03e6b6338971fd2e3bb774bf00a4f0ff50f1c0d974aa9fdf29951d6599c0f4628ec4e58657de6780d6c030f9724ad81dab353b68b97ec5bd2
-
Filesize
90B
MD596625a9cc00bb525f96eb3684ab85303
SHA1e2a379830f4d6bfeebd9146c940f9cce72cba005
SHA256ae69ed4fa207cefdcb0f35af40bef756b9900de260580df9e4b530edb781a52f
SHA51247a96a297216a2eeafdab4d3c56abc129f1f3d3bff1e5115536ab060144f45abea3d6738e975c9f06428ecbbd1ab9ac22767a2999ded67d84f70eb5dec509fc5
-
Filesize
234B
MD56f84dbf74ef41dc3d861f5fb3e0f45ff
SHA13e5f17e9b9589f33ce6add7f2518a666ff2253a4
SHA256df5f432d7e0d2bd1c4dddb1fabbf1e77bd1065b9020f71abaf1a45fbb950bbb8
SHA5129f9ec25b815be7b20df26244d31848c9a4896b130241b63636d63511a290eaad78d289a9bb04592c0ba31492064671351b4c7359310f03469e27764132a20a5a
-
Filesize
1KB
MD5f56f996fb665bc3a6227bb9cffa78cfd
SHA1decfed40859ad3de844c33fbd90269d0ad1c7088
SHA256ca36cb5b94ceca3eb8e1729c0e136fda983e9ab348ea6d74b1a7231c6f4d66ad
SHA5128a363104ecbf503a2dd4797202805f3c92849135dfac24ae96bcdaa0671482d77870cf46cc52595d572f5a6326d7b7b8944061fb8dcc8d45102212f6bc3469d2
-
Filesize
4KB
MD5a965af7d9d63225f8fbd5947909e941b
SHA15a6ce8d181febfdc105fa87a029f486ad4db05df
SHA2568aa4eb889b983f8cfeaaade7e82f43e716e10b93d1cb22f5d4a84ebe71ea4a70
SHA51207e698cbc5d7c81e9e5990acd23132a45f44133ffa2c8fefbfd0a3b37be67eddc156816f91ded035bd4997cffbc0d578b72cef8e31a136ce02e2b300bbf1eaf9
-
Filesize
5KB
MD5ff31c548bfa9e2d4d2ef741f590c6f4b
SHA1ea436bc092885dd81b6144bfd6c251fd3548cbf2
SHA2560ba2a5720cf7fec2d9e3fdcbfd39167be12920630b285b99ffa4dd7979507ef1
SHA5129710ea43723eaba0b5aff8233db2436467fd65294e4b138269d6e52d2c0d857c44353a64ea1d6a13c676c69d83ba1d915fbf493a9782f2cd5bced72ba73c734f
-
Filesize
4KB
MD5a02394f8f25479ed529c5985951740c8
SHA12721f2ca6d3a943015968eb19b2276af9c01a8b3
SHA2566955aebcd757be32733285604886270e0bd77a2b0c2ce91531b5a17fb0658c06
SHA5122dd6c075877b50e6c7e5f778ace158814e34065844b13437eb0b9a34d7f6365bebea8a3964a44a83373465d28063ecc1ad665fe8d1ba86a0454e6ba0b78d3ad7
-
Filesize
765B
MD5b78fded48dc97b8ed5a456e9889be8c8
SHA12ca874bda004a87b0b0b62fc4e5125378d7070e7
SHA25679e83de442ac0d00e464785d9c9293e2c88ee98a176b304b01857231c603868e
SHA5120b00eb7d3f96435ea0c58d7ad6c59d5e59f9a7e408259e72c79e4dc05364d733ca239c2f44e6343f7fa8da7ec2a04ab144428adda01cc8586b89335e8a3aaf31
-
Filesize
1KB
MD513c9b9e64fdac18c0aa7bd4c6a78748a
SHA13c05eef29faebaa3e7ae3d8e6282eef68dfd4276
SHA2569685dfd1e87f387651a40051fae9816a720ffdb0f90292524088ee815ca87b26
SHA512a4358decf919eff4b97f42533b3d6b83d870f4c1fe0f0bf3884fd8c2ddb02274fe6769c4435e6536a437e2c4a2e935ff7e2714b20bd1330dade381116aa00e43
-
Filesize
826B
MD5d0b4c9740f9346823e21d7dfc5bd9f1b
SHA1019c25a3c797e9bd3c526c73698077ba703712de
SHA256e634695e0e798533dba1ffb41062867c6a43f10393ac0482ac64a5c8eecd6013
SHA5121979573472b0a010f1c7988427a09872dce90a9b9652396c65a45eb26a2a27838369467d1b5f34411f74c1b216b2e70b000d7decf0e04fcad17650d6a1fa07d0
-
Filesize
3KB
MD53e6bfa45474395fcab8c295d63fe0ca1
SHA1532af3f2b90b3b1cbc7fd7401777ae271aff5f74
SHA256973a3d4fd3db35ef04dcd3b99176f9df936f4729b1880c189f39507e97ba8732
SHA512058551c718aeff1749dbac4a6d02ff540a8e29c13a9b15ddaaae64afad0fc78b4a91805a69aa210b7c3f14df31ecf539b866fea276bad9dfb2a05a06c702c653
-
Filesize
973B
MD59dbd18fcb213900b1ee960a53c18fd9c
SHA1ed77794c8c9d5fa6ca6b5c85115ac40ef9c93c7f
SHA25659225283f389298e60ae723d030c29861105379f506c2494522c0baa4e0582ed
SHA5129238616509f1eabfd941d9af8df2a98ac652da86758ac9346b73a9331afdab1caa1def00164d65b02f0fa1445b69d2b2562c2b8327a138eb205c26997d5e9aee
-
Filesize
579B
MD59d4ccffd63ccbfa1ebab9328c85bdbdd
SHA13c3e8ea7850acc45d4c03e888e7db4bb743d757e
SHA25604344cffe2ee8caa003981ca6941c23730a3e6a27ed6bc7a1bb3add804ed04a8
SHA5124291e48c7501591dc3f9e4746c6f852702365698c7c2b34bf9f09565a963a2809ad66161c4da348c0dae51128906c577056bd5bba3b066a92a704359fe055c81
-
Filesize
1KB
MD5b5d4d664346b442cd7d4b6dc5f3657bb
SHA1f3c94cd9c7dd431c75ced3bb4cf72ebf1b9d6770
SHA25675ec11ecca31d2fdbabf59112e63d49857aa0903f06e883559373d061b3e60b3
SHA5127ad300a6f5919aaf897e4fd467937bdb941a33b98b77aebf5c9fb39e7fe0e32beb197e898af6dd0f5e049feae547de6bd30e2fe0cfb1b1dd7ad93ff0eaae3448
-
Filesize
952B
MD519666991fea55b6ce99dcecf85ce420b
SHA12511d4fbfff7c777a1f648bbdb49e68e47b39b94
SHA256362d8efc2b18b4eadd65be44ce7bf25d28e2e17b58f109bb724c2c68517e33c9
SHA51211804caa55ef65220c21f3d5ef85f0853a7199d205b20e415c5d88370f2fabd1608b8dc30e9d5b19a1e003c2e8f5ea91bec9227b77dc0b4e39dbc7fb3b68d19a
-
Filesize
1KB
MD5420be751ebc4ba1db0066cd8abdcd653
SHA11f046369b9e98c4efa5e342b479d32843467197b
SHA2565bbd13fa185a62a97a1eeece5278d87f68333bc22e8aab0c26d10dd17a0b1070
SHA512f8715e5d71570f5d7b81e9bc39efe28de97ecbaa5782559644562da1875adea3ef4693d142378332cfc412077f8530fb9755efa0e98e215e572eae714fc04200
-
Filesize
46B
MD5633d34ead61d11ef8028e7ae3f22f062
SHA1964f641288254491cf203ad9966e145ae04750af
SHA2562798675ce2702d03c99a831e3794f40d08271ccf74856383c41601aa0dd6f502
SHA51265dfbd479b5eb7294899d503440997172e0fc00754e12caf56a26cbd58fa5502351abd8a1970ac132ad3ca55982dec3a231acfd0031232246386dc484c8e5956
-
Filesize
2KB
MD5d47d80f968ae10bff626c4815565999e
SHA1b09bbff21fce34cf4531bd58a12ef245d98a11b8
SHA2569deb0518f60fec26fee7ebc468cf5d9be0dfbead1dae0917daf0fcf32f3428ed
SHA512453221b70d7a2ceb5986726b42d991b0588bb7c3972ed45fa2b723bd19a2c58730d29caaed6ba5ff5f9804a7edc88537a9fe021841809e22e05ef0ac566e62c4
-
Filesize
2KB
MD59c9a95e738765fc608d7c4e76b2f35cb
SHA19dc240f7154d9aaf682906a987f141b3dd4be7e0
SHA2563c33893b88336ee1a3b8371c05ce32b51010b5ec73f67af002d53ca66174534c
SHA512aab54fde37e68017852729846f7fd77db36bd38ba20ad2991ae95c534fa85c518e1d837c308db87c88412877eb5742555f512053b537b16d032d291cc3cc01d1
-
Filesize
930B
MD575d5f9c89892397838677ccff871f32b
SHA12c0364d6abcc9914bbc4a964dd163dcb29a9be5c
SHA256dca82b89990cc34dd9e843dc67189fd5d87e0a29488332573011721daea8ee07
SHA512e346b90d8858f8e6591b17ebbc1ac6e0952dc7bfdd33314b61f23897744153c866fac5fd44fe8f9f3f1df6c9573f83e918cba32c31d2f85c9f80fed4fce474c1
-
Filesize
518B
MD5831f0622bf83e0f5106b5db122509ce0
SHA1447d87d4ce42640f851cb9bae81dd09937bcb090
SHA2566668dbf76737d19a74b9ca9d44e876c495aecd253bd5f62dbad13691dfc1ba6b
SHA51236ecc5f60d4c0ae4f8e83947d88e5e2fa89802f4b10cb602fc5e83fec7c403d30b9c74df73fd87aa2d772a2eb78cdaaf1f323d7d6210607ee026ceef18783e76
-
Filesize
63KB
MD53e11d432933fadcdfb3fb46a980890d8
SHA187de2600ded2c78c5e5c418abd1f492ecda015cf
SHA256d104e85873c2648f0e7a9575412e0404d97dddb258dbf67dff7efe8b91c1544e
SHA512dc315b9fa5a06c86cff5eccc91395044aa09f4b8c3c2a475d3940150023d725e5d2e9345ad5d43f9413c18e1f5b02c58f4a3864e910637ec6214f113c68964be
-
Filesize
62KB
MD57316ffd8413fdf2934837736a562ca8f
SHA1ad2be838259510ba2a626c414b2fd419b6f5bdd6
SHA25686361d15a3ee2a09e80518c4af5f67c2eced91c3c7b19410b62c5120130736cc
SHA51228ac9fc27f1c54f79f8155524188c2ee7afa473e82c6b4bde8e227346c7c35e6b11e42090ab88c0ea6cc01822b6685e80daf31c10958164f60404af1198ba39b
-
Filesize
11KB
MD56f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1b6ac111dfb0d1fc75ad09c56bde7830232395785
SHA256b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
SHA512a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
Filesize
48KB
MD5d850fbd4283334bc6a8214cdee231e05
SHA1164dd2e14e242de3270f2a768d36b729d56e33b4
SHA256e67206ab8bd532b15621cc99c6ea8588e567b4b8b2211ed020ba6d25c166fe1e
SHA51250986b5185b363d0a6b674bb3cd9db4308f2bdcfc4e36eb381a770cbafa6401c96a17e0c6f50a4da0afaabe9d08209547aadd5fa2b165e1346fd6d63a33d3fc4
-
Filesize
189KB
MD5fef9344ab43ca53984e45b9de42b07c1
SHA1b816b11ebebcefb845a5ce52bef81d4ab6977174
SHA25627774522cc4848729069300e39654e834e34809f42821d0194ae1f81a412e52d
SHA512ca804be21964c00c6f1e6b6194a1db5515fba86d23ff3b38afc142140e4199d76bfae1e3f420a07f014082026df9532a3864a8b7bade636cad05984229c212d8