Resubmissions
04-10-2024 12:49
241004-p2mr1svcrp 1004-10-2024 12:48
241004-p1xwlavcnp 304-10-2024 12:36
241004-ptefnsthqn 10Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 12:36
Static task
static1
Behavioral task
behavioral1
Sample
1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe
-
Size
342KB
-
MD5
1363011ce43fdadbff9360a2e2716731
-
SHA1
d980ddf282aa7170c38caaa4fe73d05cf04d9fe6
-
SHA256
5f5b2501b23fd3efceffa161bb51b9721a10f583e85e10a287faa170d847e1cc
-
SHA512
355c654a7226f6c68367f0ede1f294d84f5f2d8b70757c9c0b20546589971b5534d67b0a99360acca7d5a0251aca0339b55226e859d5d53637a5491533072feb
-
SSDEEP
6144:wlOK1RBZgYK6aOtAOv49cXWF8eM0jF47fodLQdq71wsMrMYNVnL:wT16YKitccXWjTvLQdu1nMrvnL
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+yglwg.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/8EA137C0D3EF97
http://kkd47eh4hdjshb5t.angortra.at/8EA137C0D3EF97
http://ytrest84y5i456hghadefdsd.pontogrot.com/8EA137C0D3EF97
http://xlowfznrg4wf7dli.ONION/8EA137C0D3EF97
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (436) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 352 cmd.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+yglwg.txt cllpxawtbnnx.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+yglwg.html cllpxawtbnnx.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+yglwg.txt cllpxawtbnnx.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+yglwg.html cllpxawtbnnx.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+yglwg.png cllpxawtbnnx.exe -
Executes dropped EXE 1 IoCs
pid Process 2292 cllpxawtbnnx.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\trrkwejxhhls = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\cllpxawtbnnx.exe\"" cllpxawtbnnx.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\Solitaire\de-DE\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\Recovery+yglwg.txt cllpxawtbnnx.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\it-IT\Recovery+yglwg.html cllpxawtbnnx.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bNext.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Defender\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\flyout.css cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\Recovery+yglwg.html cllpxawtbnnx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\base-undocked-3.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\glow.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\settings.css cllpxawtbnnx.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\Recovery+yglwg.txt cllpxawtbnnx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\Recovery+yglwg.html cllpxawtbnnx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\Recovery+yglwg.txt cllpxawtbnnx.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ku_IQ\LC_MESSAGES\Recovery+yglwg.html cllpxawtbnnx.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\Recovery+yglwg.html cllpxawtbnnx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_buttongraphic.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\dial_lrg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\Recovery+yglwg.html cllpxawtbnnx.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\Recovery+yglwg.txt cllpxawtbnnx.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Photo Viewer\es-ES\Recovery+yglwg.txt cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\library.js cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_cloudy.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\id.pak cllpxawtbnnx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\Recovery+yglwg.txt cllpxawtbnnx.exe File opened for modification C:\Program Files\Microsoft Games\Chess\fr-FR\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Mail\ja-JP\Recovery+yglwg.html cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\ja-JP\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\Recovery+yglwg.txt cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\notConnectedStateIcon.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveAnother.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Internet Explorer\en-US\Recovery+yglwg.html cllpxawtbnnx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\Recovery+yglwg.txt cllpxawtbnnx.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\es-ES\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eo\Recovery+yglwg.html cllpxawtbnnx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationUp_SelectionSubpicture.png cllpxawtbnnx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\Passport.wmv cllpxawtbnnx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_winxp_olv.css cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waning-gibbous.png cllpxawtbnnx.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\LC_MESSAGES\Recovery+yglwg.txt cllpxawtbnnx.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\23.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Recovery+yglwg.txt cllpxawtbnnx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\Recovery+yglwg.txt cllpxawtbnnx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\Recovery+yglwg.html cllpxawtbnnx.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\logger\Recovery+yglwg.png cllpxawtbnnx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\Recovery+yglwg.html cllpxawtbnnx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\Recovery+yglwg.html cllpxawtbnnx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\Recovery+yglwg.txt cllpxawtbnnx.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\cllpxawtbnnx.exe 1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe File opened for modification C:\Windows\cllpxawtbnnx.exe 1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cllpxawtbnnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802616415a16db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6CAA7DA1-824D-11EF-93F3-6E739D7B0BBB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434207319" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000032eeea57a5fc514a85405ab035ba36be00000000020000000000106600000001000020000000084704c62031ef877e6770918f92305dd61c3705e28b2264678ce6940b3d06d2000000000e800000000200002000000014acc7ac2145a4ba9af376b97946fc5add98ff4c5408f5079dbf39374b6225a120000000ec405d97217a45de5d5999b43c4eecb1546bdf1d60951c96605bba9c0e29207740000000b48bc049f1d080de87fee4e3aa32b6afe4b958951c7aa54a6f088e4f0a61b422f5e6e8075e0f189d00c86d88d9d0070780af7b8940403e4fd63eee6d0fe74b93 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2044 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe 2292 cllpxawtbnnx.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 2476 1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe Token: SeDebugPrivilege 2292 cllpxawtbnnx.exe Token: SeIncreaseQuotaPrivilege 2708 WMIC.exe Token: SeSecurityPrivilege 2708 WMIC.exe Token: SeTakeOwnershipPrivilege 2708 WMIC.exe Token: SeLoadDriverPrivilege 2708 WMIC.exe Token: SeSystemProfilePrivilege 2708 WMIC.exe Token: SeSystemtimePrivilege 2708 WMIC.exe Token: SeProfSingleProcessPrivilege 2708 WMIC.exe Token: SeIncBasePriorityPrivilege 2708 WMIC.exe Token: SeCreatePagefilePrivilege 2708 WMIC.exe Token: SeBackupPrivilege 2708 WMIC.exe Token: SeRestorePrivilege 2708 WMIC.exe Token: SeShutdownPrivilege 2708 WMIC.exe Token: SeDebugPrivilege 2708 WMIC.exe Token: SeSystemEnvironmentPrivilege 2708 WMIC.exe Token: SeRemoteShutdownPrivilege 2708 WMIC.exe Token: SeUndockPrivilege 2708 WMIC.exe Token: SeManageVolumePrivilege 2708 WMIC.exe Token: 33 2708 WMIC.exe Token: 34 2708 WMIC.exe Token: 35 2708 WMIC.exe Token: SeIncreaseQuotaPrivilege 1488 WMIC.exe Token: SeSecurityPrivilege 1488 WMIC.exe Token: SeTakeOwnershipPrivilege 1488 WMIC.exe Token: SeLoadDriverPrivilege 1488 WMIC.exe Token: SeSystemProfilePrivilege 1488 WMIC.exe Token: SeSystemtimePrivilege 1488 WMIC.exe Token: SeProfSingleProcessPrivilege 1488 WMIC.exe Token: SeIncBasePriorityPrivilege 1488 WMIC.exe Token: SeCreatePagefilePrivilege 1488 WMIC.exe Token: SeBackupPrivilege 1488 WMIC.exe Token: SeRestorePrivilege 1488 WMIC.exe Token: SeShutdownPrivilege 1488 WMIC.exe Token: SeDebugPrivilege 1488 WMIC.exe Token: SeSystemEnvironmentPrivilege 1488 WMIC.exe Token: SeRemoteShutdownPrivilege 1488 WMIC.exe Token: SeUndockPrivilege 1488 WMIC.exe Token: SeManageVolumePrivilege 1488 WMIC.exe Token: 33 1488 WMIC.exe Token: 34 1488 WMIC.exe Token: 35 1488 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1560 iexplore.exe 988 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1560 iexplore.exe 1560 iexplore.exe 716 IEXPLORE.EXE 716 IEXPLORE.EXE 988 DllHost.exe 988 DllHost.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2292 2476 1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe 31 PID 2476 wrote to memory of 2292 2476 1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe 31 PID 2476 wrote to memory of 2292 2476 1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe 31 PID 2476 wrote to memory of 2292 2476 1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe 31 PID 2476 wrote to memory of 352 2476 1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe 32 PID 2476 wrote to memory of 352 2476 1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe 32 PID 2476 wrote to memory of 352 2476 1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe 32 PID 2476 wrote to memory of 352 2476 1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe 32 PID 2292 wrote to memory of 2708 2292 cllpxawtbnnx.exe 34 PID 2292 wrote to memory of 2708 2292 cllpxawtbnnx.exe 34 PID 2292 wrote to memory of 2708 2292 cllpxawtbnnx.exe 34 PID 2292 wrote to memory of 2708 2292 cllpxawtbnnx.exe 34 PID 2292 wrote to memory of 2044 2292 cllpxawtbnnx.exe 39 PID 2292 wrote to memory of 2044 2292 cllpxawtbnnx.exe 39 PID 2292 wrote to memory of 2044 2292 cllpxawtbnnx.exe 39 PID 2292 wrote to memory of 2044 2292 cllpxawtbnnx.exe 39 PID 2292 wrote to memory of 1560 2292 cllpxawtbnnx.exe 40 PID 2292 wrote to memory of 1560 2292 cllpxawtbnnx.exe 40 PID 2292 wrote to memory of 1560 2292 cllpxawtbnnx.exe 40 PID 2292 wrote to memory of 1560 2292 cllpxawtbnnx.exe 40 PID 1560 wrote to memory of 716 1560 iexplore.exe 41 PID 1560 wrote to memory of 716 1560 iexplore.exe 41 PID 1560 wrote to memory of 716 1560 iexplore.exe 41 PID 1560 wrote to memory of 716 1560 iexplore.exe 41 PID 2292 wrote to memory of 1488 2292 cllpxawtbnnx.exe 43 PID 2292 wrote to memory of 1488 2292 cllpxawtbnnx.exe 43 PID 2292 wrote to memory of 1488 2292 cllpxawtbnnx.exe 43 PID 2292 wrote to memory of 1488 2292 cllpxawtbnnx.exe 43 PID 2292 wrote to memory of 908 2292 cllpxawtbnnx.exe 46 PID 2292 wrote to memory of 908 2292 cllpxawtbnnx.exe 46 PID 2292 wrote to memory of 908 2292 cllpxawtbnnx.exe 46 PID 2292 wrote to memory of 908 2292 cllpxawtbnnx.exe 46 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cllpxawtbnnx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" cllpxawtbnnx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1363011ce43fdadbff9360a2e2716731_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\cllpxawtbnnx.exeC:\Windows\cllpxawtbnnx.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2292 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2044
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:716
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\CLLPXA~1.EXE3⤵
- System Location Discovery: System Language Discovery
PID:908
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\136301~1.EXE2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:352
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:988
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD57f806bd23d868ed16f9f7025a450ca4b
SHA16a4f72c3a31b1580888befa74a72957a4894a1c5
SHA256f9654f1d7b2ce3a28c6c5d00fe8a3060366f44584c8367c67a74fbf3183b76ea
SHA512d7202b82884e83f4690515819a225722e21a13f26c0645cfd82764bd226f5f87ee84a9ccffdf8144807b035ad5bc3629f14dcdb1142d26ed4d058818a8850a7a
-
Filesize
63KB
MD5e79c1a29f472de88a559345fc82762cb
SHA1346f8ed0cb16d1f9fedc4ff20e236a021af1f9fb
SHA256729ca28cc2c3cd422b3a6319dc2cc8568aca6cb1418a83d3d2aeb7e7692b637e
SHA512bafb0e4152e362de915f69639cd81e0faa1e51104463d23dc2a640d01de71ded0574de9132afc8f749024298d1a6ba37eae2d2d76cb75a55aed64ca7b011a024
-
Filesize
1KB
MD54b7644fddf0149345bed55f910007b85
SHA167e05c3fdb604154bb20f248cedaff25924851e7
SHA256b3b453097c85db397c34ce21f98532434a7e61f0d254d6f2050a4a0e0be92c68
SHA5126917084431b1875d6869ddc68353d3f00e49c7067b17f0df224b288bd3ceadd6ffcd811975702f78a9f8dcec91b52ad3a952b2a52b29cb37bbdf3e5dea8f631b
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD537f1edc50c635a5d80e5525060cbe858
SHA181c1baebfe871e57dfc6d2450c3e685c80ecafed
SHA256d8b172b6e0ff3878d88308cefc1afdea4df5247813f1ca70e1d197b3076b0af5
SHA51272f258b9cb8032ef4c50e0f41df60e539c3eb95d5b90bddbcaf760e8d92d5caf10e2c9713bda69329833e27d26098353a0073d50637e5354b508a582fd0ac2d4
-
Filesize
109KB
MD5af3483a004f6d5df8614933c9e45cd80
SHA174a5376bd440c8d42fde6d177fb33701d729089d
SHA256468451e179080c802cbf2246c7fca08a7996f6f534b8ae7583200c680536fe5f
SHA5126b5680a0eabdf2b2bcf4f1aa4cbb08020c73f93f06ea1ceda833c2d061213743e9ba027a5611e8875c8623595f17a4d25f8195ab1aa292ad65068d8e10273043
-
Filesize
173KB
MD598a66b93eaa0f58770bfe2478bde5a69
SHA19132d429a57e9575695ab0e35456386883eddbf9
SHA25616143f417ae42462b8e929b1f541368bbf790eadf000020097c5be67cf312ef4
SHA512a78418baa55e4e7c0d36aa1515ef0cdb7a424c4ebad0a104c0009bfaf91d35df90d4481bdd0a9d3e1e5806cea3c2bade1772ef7df2046a63a05e6cbdb429ec29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3fcaab417f90448f7c6898138ad34fd
SHA11f684074b0b4fe5d056c81363b0fe855eb5614d6
SHA2569451365e67f9fc578b969ef507afcb9024d150d01a7f6e1c5c02803cf3957ea6
SHA51201590570f1d0257799bb33934a837ef4181d6b952ad7e9e63e328573026718f48d300008a08c41f49368316d72daafee2355cb441069130239e65cd8ab276b39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da900ab95fbfed37c3d4e9ba2307f8a7
SHA1ee95bab876de3f777000163c4b90288c7642ea1b
SHA25645a4741fa457488bf73f5b0a772d6c41d80d3596e0a860cc96f66fdbc61d5718
SHA51235b5f019f4a6ab118d0860757721a2a961976750624a1deb2c6674d31d8cec5830232bbb1556d9494a40e0286ca91184e9a03a1fb9c5c3f047431935987596aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528cefe8102471ae879d9a315ee8c1d04
SHA153738d3787b6a1da8d0a3212936346e085e13b44
SHA256e4b423edd12a86963746c16e6d19b9c552844f2a41e0addfa816e31680ac4222
SHA512774bf7171b1aa35552927de58d2008dabccf5c6f950425bd93b6fedafaa7ca6a7311fe901521ed0a013ed32f67130b66d6856b07a1252a74cd00306e26682cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c74dc8c7b27d74b058977408ae68506
SHA126058ffdbabc642671bc5489cb299bba1879c4d2
SHA256f7bb6a06bf6f6b11d84385892afc632b370b42f04573e8a0f831b36ea67da707
SHA51255ebceaee74987d94aa1f14eb2110afe6f2e70e2e91a3ed8aa789fde3144330d9895b8d485f774b5e6d79b4cf5a33a17910f0cd80372e7f5ee579e8a36cf5329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4464b82baa65a61cdd71cd129e4473c
SHA1df22eb2e5ac58070bca766f8163bb40055cd577e
SHA256b6d6977acaba3101c1d42ac89ae4030c6c5d6f82e14c7eb15cd3e1dabea6e462
SHA5121f4699551673e3410e0ea293bc18f60f253ccea6ec40dfc228b72a733500b67e46ce8d3d27c778b327c4f605f3b248e4d953fd0854d47f13615f99d280b479fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dba4cf1db7f8a93798c6767347a183d9
SHA14dee479bb7dfc07a16f2edaa5515bbe1ead47570
SHA25604ccfee1d279ab6a8e6dba81702397c8f285e7363e0b50f27c2509ef0a0703dc
SHA5124b6d2b4f5aff506193000654437f034b23c607c2b0a386ff3e52939c96914756526d8a92e6d3276f3ea16ff0ee245a2efaa54159b7b56fa996b6ab1567229bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5674fe2bee40f738bb3af47e301960211
SHA107994de4b60a2c3f4fa149125a0b0e2a53874067
SHA256ed2fabba44d90ea40a01fb5e4dcda3917ac568e0e996635f26fcaf9211c30528
SHA51210d8f040840e466aa3121595bddc78e5bc80c2bf20c89faf841456f9799464eff2a393400c8d3b27be2ede3bdb05ab72ad5577ecd0579cb0b8fffc4cd79f3b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573a80d34908d41561cd5afcfa6db1aea
SHA15a4608cb4ffa785404f648faa686fda4e3a73b44
SHA256a56b8427298b67ebd21a774160276f57b0b61627aa9ccf860cc78f1ecf3b64df
SHA512066bf5ba84632d8f7dd245688153cff9fe51cc0a2264bed64131eee5751a6b0a3a9783089b50f640df9329a61717ea43d8338dc548990756287edf381757e077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a7bdb32eeae338dff1c781c0a926f2
SHA11ebf4628fc6757a95f89f1ceb0d6422d7974c484
SHA2568fb18e5d0ea6eee0149674a897217955e52c666f0d995a61d1233cd79ec2eadc
SHA5123a052fa6b307414ee66518a679587b29647449a4ce2f3ff087bea1ee6e3329825bb3e87ec1c637193c2a9e253c91602e4557d71fb6af95cd442110b1741e90f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd82e0fa2975cdd60b0885cd19b5aabe
SHA18ba8d9fce0f0172cbd5d452792d33154a036581b
SHA2560329dca8fa5519bc69ee0785869b6b2fc1977290648932ee37bd9727d55d83cb
SHA512b88d764cd599cedb3edc64701789eb7d2dc7b9be0aea0d73ff4b73e3fc5a2a057407cc247b5162c7b105a38a5a88f8cf5fc3652ea14a2785cd71a62a2b454c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cada225b0f79dcb0b9dcd20deea5eafd
SHA1f775d005eebcacafd4c6f86a1ca396b0f9231312
SHA2563fedc229b778ed71bfc46704d36befe261049ed7b5e3d4fd30a0fad016fb7c51
SHA512230a36f2d1859d2b0bdc77988017dff7c63a67628198284b74ca05a2e709635380f273ba4dd4bc859f051a371ea87917e719acf9e0562aaf88af4223eadc5b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afa32a7c0d34edd13d289ec068e2638a
SHA15b69991f76b8e873be0dc2a8d9dfcedb257e236a
SHA2562b861a4e2cd9a2888e9d1691610694047358f2bb9d3a6a36299400aa93b47433
SHA5123bebbe52e298300794b83e3ee705775c14cd92c5113a348b14cc069afecb22aecc97c2e8c00391c8f223e5f3f49144184bcdc59f1f48a472315007b5a8304636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5997e8651cdbc14c8acfe0402e74d3f49
SHA1f7f68a038c97ad577028edf89e235c7e151f8043
SHA256c8ecf353d92c9a9619db4c61b4de420293fae59efd222af7502ace874d2fd7b9
SHA5121f0bc880a91c1a945ff9545ccbc9d6be605d2bb56d7f7721e3e5784ff1b8fe8f371b30f7b0ef350420cba7d30e62cd0c352382d282f972596bbabf45a9310261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5530430ff41d9058ff3c127e88b10110b
SHA12d26fe1c96759b2026073ff03e4dd56f730bdba3
SHA256338c9b2c179400d93e11747e758217aa4d7c6a05f7afde765fa252dd8c2c5a9c
SHA5128e03138509ad8e727c5157291d02e21a72df4458cf2337beec2b03aaa1d2e0a20ad5fd453cdba79402186f29ddc52c66128eb16e645282bcd01d2c0b91906269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e3c9f25a6db12b7ddd01f7f79f081e7
SHA1b024d26d65ac5da6a32f02f0aebc5cdb52327024
SHA25602a4234ad348dacac737fe5431cada0b98c9d1396bd5324772ea142fa465af5d
SHA5128ebe7953df3d67b919620fa15cd9f3a18a228146eca254610a69e34cb5a02feb681e5b6f11afbe85a519f47bd31caecbbedc68fd1e279e02e5f43ff086e70de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd75d8dc4dd8b8be627588678924509
SHA17901db7a01869ed4c79420667fa72f38d968c10c
SHA256ae4cc2b80b16f9e19045f69f01d6b9e5638f3465d0663d436cceb9b24fa0b12c
SHA512dcbd36a47312a4491004eab181e27cc1c5a166403ed298636468aab771f819774e8b245744638d44a4c4bb5373ce5335f76adf768e50a706467db1d66061728f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d5d2ac5863d0eabf63bdd28f3955a38
SHA1539268714018db59ca65a369c7fa59a032466ec4
SHA2563a7c9a2536b5d8eda87f8c435e6388274b304afa963e640423565d33c8803243
SHA512b2170a181ef27ff5d59b9b9906b26b0fa87e5defc0f03a6ce69bd52e9f610b025f4e36c88d087418359579343add9805fd78593c7cce0d5f90c51c3edf612a0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca69cc1bcd9b465b5d36136dafaccccc
SHA1f67329e602b0e5a2b992ff6a595527e5fdbdc3fd
SHA256a50e2d6e06b41e61d26ea612e0caf28b12a11855e8a062870de43f24a2233784
SHA512ca0a24da1260c99a2688a74413fcdd9597737d030db57b93e7aa76441f58f9abfe67466442f78f71e6ba32043a850d8ba2789c89598ed6e587502f619e5b48f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f03b6386cd1970ceaac39b93e746e2f
SHA1817c7d4c7c1b917dae92a577050b6a522ffe0674
SHA25646d7985fe10d29bf08143f00bd7b9a527c50dd27b29cfba4a27494d829900c69
SHA512b988e0570ec7270d85058400e3a4cfb7163bd2f10e46646c6b6c407ba9bd6b4c5abfecc2002abce33fc53a1243a9979f39b4ae648c800bb71d23a0fa5cd6831d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565825a2cb93d30c904a2096e07a540fc
SHA10b9822423e993e2b3b69835daff33f472f02a6f8
SHA25680561226c3723eb19732f838b730143f02d29e69f4277dfaccc194992dcfb617
SHA512d410fad97a714d2087edfa766f8dc83efe15972938351ba0af43859ad03624cef8c2d28f40b1905419e325d578299c2867192a02ebd6e6aa66fdd44e0c6f08e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ea55cc0207255e91f2f8b669fb1857
SHA1384d2a005eb9c2d83a82889bed45887f5e70a5e1
SHA256c6fe3db3eb167f94aae283716bc8622d20e02f22f22b8c13606c7606c5e1a1a5
SHA5124f9455956845bdf2c455674c95d5a0c8f4d9a06a14f0ce0243664ffdc09e5e68a5a69cef133188b3a4428d4523d25005c3f09c02a99026650d0df321aa5d9ac3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
342KB
MD51363011ce43fdadbff9360a2e2716731
SHA1d980ddf282aa7170c38caaa4fe73d05cf04d9fe6
SHA2565f5b2501b23fd3efceffa161bb51b9721a10f583e85e10a287faa170d847e1cc
SHA512355c654a7226f6c68367f0ede1f294d84f5f2d8b70757c9c0b20546589971b5534d67b0a99360acca7d5a0251aca0339b55226e859d5d53637a5491533072feb