Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 15:08
Static task
static1
Behavioral task
behavioral1
Sample
725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe
-
Size
488KB
-
MD5
725ddfb95fd1c510ccb21871cd9836bd
-
SHA1
3beb5264a7a162896f749f572bb8a967b095c2a9
-
SHA256
24cac290ff15530f6566eb99ca8eef135bd198f1e7f481a59f3c231b0d7e3b5b
-
SHA512
69029d4dfc236f8a5392ee47da08fa1b7401a3b8b97eb688671d06aba401c4817705734c79fcc21642a52172ad02592513c127c98defed873aacdfd85050cef2
-
SSDEEP
12288:dUU7RCmpby4PIrzRxFTuqQ8qZceNsiMkyhU:d19CmCrNxFTuqQhZvi6d
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\_ReCoVeRy_+jcmco.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/5BF6ADFE4BCEBAAA
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/5BF6ADFE4BCEBAAA
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/5BF6ADFE4BCEBAAA
http://xlowfznrg4wf7dli.ONION/5BF6ADFE4BCEBAAA
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (876) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exeklghvwblfxmo.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation klghvwblfxmo.exe -
Drops startup file 6 IoCs
Processes:
klghvwblfxmo.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+jcmco.png klghvwblfxmo.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+jcmco.txt klghvwblfxmo.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+jcmco.html klghvwblfxmo.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+jcmco.png klghvwblfxmo.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+jcmco.txt klghvwblfxmo.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+jcmco.html klghvwblfxmo.exe -
Executes dropped EXE 1 IoCs
Processes:
klghvwblfxmo.exepid process 1624 klghvwblfxmo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
klghvwblfxmo.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mbuydar = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\klghvwblfxmo.exe" klghvwblfxmo.exe -
Drops file in Program Files directory 64 IoCs
Processes:
klghvwblfxmo.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\Ratings\Yelp6.scale-200.png klghvwblfxmo.exe File opened for modification C:\Program Files\Windows Photo Viewer\_ReCoVeRy_+jcmco.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Standard.targetsize-64_contrast-white.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\GenericMailMediumTile.scale-200.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderStoreLogo.contrast-white_scale-100.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-30_altform-lightunplated.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\ShareProvider_CopyLink24x24.scale-100.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\_ReCoVeRy_+jcmco.html klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Voices\en-US\en-US_female_TTS\_ReCoVeRy_+jcmco.txt klghvwblfxmo.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\_ReCoVeRy_+jcmco.txt klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.scale-100_contrast-white.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-black_targetsize-60.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\iadata\_ReCoVeRy_+jcmco.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarAppList.targetsize-48.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-72_altform-unplated.png klghvwblfxmo.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\de.pak klghvwblfxmo.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\_ReCoVeRy_+jcmco.html klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionLargeTile.scale-400.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\_ReCoVeRy_+jcmco.html klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\_ReCoVeRy_+jcmco.txt klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-white\_ReCoVeRy_+jcmco.png klghvwblfxmo.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\_ReCoVeRy_+jcmco.txt klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\bg-BG\_ReCoVeRy_+jcmco.txt klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\_ReCoVeRy_+jcmco.html klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-256_contrast-white.png klghvwblfxmo.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am_ET\_ReCoVeRy_+jcmco.txt klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-96_contrast-white.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-black_targetsize-30.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Advanced-Dark.scale-100.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-24.png klghvwblfxmo.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\_ReCoVeRy_+jcmco.html klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-us\styles\_ReCoVeRy_+jcmco.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Images\SkypeAppList.targetsize-32_altform-unplated_contrast-white.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\AppCore\_ReCoVeRy_+jcmco.txt klghvwblfxmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\_ReCoVeRy_+jcmco.html klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-24_altform-unplated_contrast-black.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-80_altform-unplated.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-black\_ReCoVeRy_+jcmco.html klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\onboarding\_ReCoVeRy_+jcmco.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-30_altform-unplated.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-white\MedTile.scale-100.png klghvwblfxmo.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_ReCoVeRy_+jcmco.html klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\MusicStoreLogo.scale-125_contrast-white.png klghvwblfxmo.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\_ReCoVeRy_+jcmco.txt klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\_ReCoVeRy_+jcmco.html klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-GoogleCloudCache.scale-150.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-black\_ReCoVeRy_+jcmco.html klghvwblfxmo.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Video-48.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square150x150\_ReCoVeRy_+jcmco.html klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-24_altform-unplated.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNewNoteLargeTile.scale-125.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\jscripts\_ReCoVeRy_+jcmco.txt klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\_ReCoVeRy_+jcmco.txt klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SmallTile.scale-125_contrast-black.png klghvwblfxmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\AccessRuntime2019_eula.txt klghvwblfxmo.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\_ReCoVeRy_+jcmco.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\GooglePromoTile.scale-100.png klghvwblfxmo.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\_ReCoVeRy_+jcmco.txt klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-60.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\Assets\xbox_live_logo_white.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-white\_ReCoVeRy_+jcmco.html klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_ReCoVeRy_+jcmco.png klghvwblfxmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\_ReCoVeRy_+jcmco.png klghvwblfxmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\CortanaApp.ViewElements\_ReCoVeRy_+jcmco.txt klghvwblfxmo.exe -
Drops file in Windows directory 2 IoCs
Processes:
725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exedescription ioc process File created C:\Windows\klghvwblfxmo.exe 725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe File opened for modification C:\Windows\klghvwblfxmo.exe 725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
klghvwblfxmo.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings klghvwblfxmo.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 2568 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
klghvwblfxmo.exepid process 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe 1624 klghvwblfxmo.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exeklghvwblfxmo.exeWMIC.exevssvc.exeWMIC.exedescription pid process Token: SeDebugPrivilege 1572 725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe Token: SeDebugPrivilege 1624 klghvwblfxmo.exe Token: SeIncreaseQuotaPrivilege 64 WMIC.exe Token: SeSecurityPrivilege 64 WMIC.exe Token: SeTakeOwnershipPrivilege 64 WMIC.exe Token: SeLoadDriverPrivilege 64 WMIC.exe Token: SeSystemProfilePrivilege 64 WMIC.exe Token: SeSystemtimePrivilege 64 WMIC.exe Token: SeProfSingleProcessPrivilege 64 WMIC.exe Token: SeIncBasePriorityPrivilege 64 WMIC.exe Token: SeCreatePagefilePrivilege 64 WMIC.exe Token: SeBackupPrivilege 64 WMIC.exe Token: SeRestorePrivilege 64 WMIC.exe Token: SeShutdownPrivilege 64 WMIC.exe Token: SeDebugPrivilege 64 WMIC.exe Token: SeSystemEnvironmentPrivilege 64 WMIC.exe Token: SeRemoteShutdownPrivilege 64 WMIC.exe Token: SeUndockPrivilege 64 WMIC.exe Token: SeManageVolumePrivilege 64 WMIC.exe Token: 33 64 WMIC.exe Token: 34 64 WMIC.exe Token: 35 64 WMIC.exe Token: 36 64 WMIC.exe Token: SeIncreaseQuotaPrivilege 64 WMIC.exe Token: SeSecurityPrivilege 64 WMIC.exe Token: SeTakeOwnershipPrivilege 64 WMIC.exe Token: SeLoadDriverPrivilege 64 WMIC.exe Token: SeSystemProfilePrivilege 64 WMIC.exe Token: SeSystemtimePrivilege 64 WMIC.exe Token: SeProfSingleProcessPrivilege 64 WMIC.exe Token: SeIncBasePriorityPrivilege 64 WMIC.exe Token: SeCreatePagefilePrivilege 64 WMIC.exe Token: SeBackupPrivilege 64 WMIC.exe Token: SeRestorePrivilege 64 WMIC.exe Token: SeShutdownPrivilege 64 WMIC.exe Token: SeDebugPrivilege 64 WMIC.exe Token: SeSystemEnvironmentPrivilege 64 WMIC.exe Token: SeRemoteShutdownPrivilege 64 WMIC.exe Token: SeUndockPrivilege 64 WMIC.exe Token: SeManageVolumePrivilege 64 WMIC.exe Token: 33 64 WMIC.exe Token: 34 64 WMIC.exe Token: 35 64 WMIC.exe Token: 36 64 WMIC.exe Token: SeBackupPrivilege 3492 vssvc.exe Token: SeRestorePrivilege 3492 vssvc.exe Token: SeAuditPrivilege 3492 vssvc.exe Token: SeIncreaseQuotaPrivilege 1952 WMIC.exe Token: SeSecurityPrivilege 1952 WMIC.exe Token: SeTakeOwnershipPrivilege 1952 WMIC.exe Token: SeLoadDriverPrivilege 1952 WMIC.exe Token: SeSystemProfilePrivilege 1952 WMIC.exe Token: SeSystemtimePrivilege 1952 WMIC.exe Token: SeProfSingleProcessPrivilege 1952 WMIC.exe Token: SeIncBasePriorityPrivilege 1952 WMIC.exe Token: SeCreatePagefilePrivilege 1952 WMIC.exe Token: SeBackupPrivilege 1952 WMIC.exe Token: SeRestorePrivilege 1952 WMIC.exe Token: SeShutdownPrivilege 1952 WMIC.exe Token: SeDebugPrivilege 1952 WMIC.exe Token: SeSystemEnvironmentPrivilege 1952 WMIC.exe Token: SeRemoteShutdownPrivilege 1952 WMIC.exe Token: SeUndockPrivilege 1952 WMIC.exe Token: SeManageVolumePrivilege 1952 WMIC.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exeklghvwblfxmo.exemsedge.exedescription pid process target process PID 1572 wrote to memory of 1624 1572 725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe klghvwblfxmo.exe PID 1572 wrote to memory of 1624 1572 725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe klghvwblfxmo.exe PID 1572 wrote to memory of 1624 1572 725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe klghvwblfxmo.exe PID 1572 wrote to memory of 4672 1572 725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe cmd.exe PID 1572 wrote to memory of 4672 1572 725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe cmd.exe PID 1572 wrote to memory of 4672 1572 725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe cmd.exe PID 1624 wrote to memory of 64 1624 klghvwblfxmo.exe WMIC.exe PID 1624 wrote to memory of 64 1624 klghvwblfxmo.exe WMIC.exe PID 1624 wrote to memory of 2568 1624 klghvwblfxmo.exe NOTEPAD.EXE PID 1624 wrote to memory of 2568 1624 klghvwblfxmo.exe NOTEPAD.EXE PID 1624 wrote to memory of 2568 1624 klghvwblfxmo.exe NOTEPAD.EXE PID 1624 wrote to memory of 3972 1624 klghvwblfxmo.exe msedge.exe PID 1624 wrote to memory of 3972 1624 klghvwblfxmo.exe msedge.exe PID 3972 wrote to memory of 3036 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 3036 3972 msedge.exe msedge.exe PID 1624 wrote to memory of 1952 1624 klghvwblfxmo.exe WMIC.exe PID 1624 wrote to memory of 1952 1624 klghvwblfxmo.exe WMIC.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4704 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4104 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4104 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4092 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4092 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4092 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4092 3972 msedge.exe msedge.exe PID 3972 wrote to memory of 4092 3972 msedge.exe msedge.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
klghvwblfxmo.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System klghvwblfxmo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" klghvwblfxmo.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\klghvwblfxmo.exeC:\Windows\klghvwblfxmo.exe2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1624 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT3⤵
- Opens file in notepad (likely ransom note)
PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\_ReCoVeRy_.HTM3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff8014146f8,0x7ff801414708,0x7ff8014147184⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:24⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:34⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:84⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:14⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:14⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:84⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:84⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:14⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:14⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:14⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:14⤵PID:1692
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\KLGHVW~1.EXE3⤵PID:4572
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\725DDF~1.EXE2⤵PID:4672
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c3d382314a0d22180e50873032d2cc58
SHA1b4d0e27d3298bb248e41e5bb8983f5a1209f5019
SHA2569d064ba9c3754ba9d6b74203c55f493c27cb7ebf026e25143ae38ee993a7cdac
SHA51213a0e38fd1193e91e385e2aee6f102e88249485c02b1384a1a9115b2e1db20164b3ae58390afb9808eb5ffec2a6c5c32927de43339b59d7cd842407f0bcbae07
-
Filesize
64KB
MD558889052f58593dae23dfca23b4240bd
SHA1656a9982f171e62997172ca1fb996f4c753b3679
SHA256f8286cb320f93ec199834ec07faa97b9c78289bd27cac3fe723998fa85bece58
SHA512165265a47b8e2c1881ce07e932121af15ad8632cb11bfddd0890345b8d871c56fe3c9c27c0c11417de20cfa787f58f57368c0a2ee47e7a0e2ae7d646ffbd4efd
-
Filesize
1KB
MD55826d5cd006678a89b1c15804deec350
SHA1bd5f0b6b06846cf9f6e96730a7735417d9cc8d86
SHA256a62cbc923fe721a9dc856279a154194c294fc1aba5dd930facf45cbf38301387
SHA5122c769cf439e3e86852fcc7c4d1a72b7f471239c4931f2970d6d55814c9d959715283794fcc064f02ccee85b0d3a36872d37d5c1c021d6b24ae8723263cfc9d17
-
Filesize
560B
MD5b988170c798a86c347e5e64e7a302dde
SHA12cf2250b57e56fd5c2c90b7a134fd4242a6777a1
SHA256b5452a8475f131bcc6e993db397cb41fb19aa56d0ec54864338f4338fa9f308d
SHA512670a94562029fade39142b57bc92ee562f4a49d9abc604be50bbc33b5b9a0c8e9c1740f8694d073aff64ee23f871d95dfd54b258603ba530d15d0aeb8739a059
-
Filesize
560B
MD50c1f490520cd16e4e373d5867b4d0759
SHA14690151cf09950c8fffc5107787da6d6b865d180
SHA256faa76e3c122fe1f5119b1e375cdcecfeaf7af8f6f74ad51f6fc6539fb3799ef3
SHA512af1aeb0a3c5263952cbca93051faa22d4476c6e5f72f0b521a6858ca39eaa54059b36016bbfe15a823256d1a46d6a9a35c6d625811bbd7beb34cd0761a1839e4
-
Filesize
416B
MD5e0e18c256634e15b27233bc231084522
SHA1af107157c6bae2f3cfc99b3a166a2a036f2d6341
SHA2562a35dd9f739daad8acd152ad97e81204d8c48a87d8d0b8c9ca8b94bd435cd5b8
SHA512461456a496efc7b8930198160b9a7b732a0748072496768463e788838fce4e2079e2e48cccd453d1d1f42012724493131e934075af59b7cc47517939519af112
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
5KB
MD5654c133474af84d380ec6a2172b81b7d
SHA1afa7a851123119f2fac165666c37a914c3dd7550
SHA2568006814c40d4b79e16bb4f99d863168db0022bac3db89532b66ec3b40a95fced
SHA5125dc04f61e2424cc4fc2da316a4bf1c3da83a05a0b3299154defa6b5158db96a1de72a527fbb9cd0ab14da9c4816245cd25021d87b25ee0d12325360dc02e65f8
-
Filesize
6KB
MD5e8340b60153903ed3488105d6f59bdae
SHA1ba21110be413d69ebd2b08ce8c031baa20098c5c
SHA256464b6679f7fd913d78ca10951c282fa0e48b0fc6578e87e8fddc260f263ae51d
SHA5129cd7177574e375830bea657ce6bd12e5f86815e80d433c0ed1243685430f568714e398d81f486ca3d828ba47f7ad20cd723a7f780320664ba23833a1354a542e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD51de57857e8cec9de825d431f3482a913
SHA102c16bd603549706701fa9494b3d3f30a3f4494c
SHA256356123dc9c2fa2bf191ab7ae5e6b18affa807e2fcbed6329ae33310d4809267b
SHA512bc4ee20970fbbf5a47f6abd364d89d6556ee76831d7d2b493ef35463910a385a65e0133b7bb3f71a104b212161ca94017d38ec607a1fa9b7bf3dec26493c648a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596449526171674.txt
Filesize75KB
MD59aad5d6bc5d90091b994b151ba4b1f2a
SHA189775f2177d4c41904eebc4669f405ebc24df296
SHA25660f20a384aad833b8b030c79f97eb3602f2526de73dbc0be2a54aefc8a2e2e8d
SHA512e91450bfbdbeeb45d355aa33a0059df47930fea57b4153cce33e1b4b1aa65265f9632fb4666c5a37e406488852b125704e6d6379282268d2028ece6ed9dbc1c1
-
Filesize
488KB
MD5725ddfb95fd1c510ccb21871cd9836bd
SHA13beb5264a7a162896f749f572bb8a967b095c2a9
SHA25624cac290ff15530f6566eb99ca8eef135bd198f1e7f481a59f3c231b0d7e3b5b
SHA51269029d4dfc236f8a5392ee47da08fa1b7401a3b8b97eb688671d06aba401c4817705734c79fcc21642a52172ad02592513c127c98defed873aacdfd85050cef2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e