Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe
-
Size
376KB
-
MD5
2b4d5982e3909f16967246c9fc4d2451
-
SHA1
2bd2a2d29679fe8cf68ab8f00ae9ed58f1506c06
-
SHA256
535bc699baf41334ad3f15528af60df9a8421533068f3f09ed01df212b40b059
-
SHA512
01d8716520cab4c226135116cc716d5337b54bcfd672fed8ef727b02560ecd1a16c8602bafbdc75fb65eb49f8af9d3add0658c116b9a574fe2183e2f2f9c68cb
-
SSDEEP
6144:6e3rNhMeYq4CGRTs4kadSoKVStcmTVn57CpSCwsUbg62oXd:6Y5hMfqwTsTKcmTV5kINEx+d
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+igjfx.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/9C478A68B158A78
http://kkd47eh4hdjshb5t.angortra.at/9C478A68B158A78
http://ytrest84y5i456hghadefdsd.pontogrot.com/9C478A68B158A78
http://xlowfznrg4wf7dli.ONION/9C478A68B158A78
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (433) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2728 cmd.exe -
Drops startup file 6 IoCs
Processes:
kefgitgwsscb.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+igjfx.png kefgitgwsscb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+igjfx.txt kefgitgwsscb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+igjfx.png kefgitgwsscb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+igjfx.txt kefgitgwsscb.exe -
Executes dropped EXE 2 IoCs
Processes:
kefgitgwsscb.exekefgitgwsscb.exepid process 2768 kefgitgwsscb.exe 2200 kefgitgwsscb.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
kefgitgwsscb.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\rteifsqprcpd = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\kefgitgwsscb.exe\"" kefgitgwsscb.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exekefgitgwsscb.exedescription pid process target process PID 2536 set thread context of 2232 2536 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe PID 2768 set thread context of 2200 2768 kefgitgwsscb.exe kefgitgwsscb.exe -
Drops file in Program Files directory 64 IoCs
Processes:
kefgitgwsscb.exedescription ioc process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\clock.css kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\shuffle_down.png kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\40.png kefgitgwsscb.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\service.js kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\Recovery+igjfx.png kefgitgwsscb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\button-highlight.png kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\cpu.css kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\5.png kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\weather.css kefgitgwsscb.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\library.js kefgitgwsscb.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\203x8subpicture.png kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\slideShow.js kefgitgwsscb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-background.png kefgitgwsscb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Photo Viewer\fr-FR\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_h.png kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\weather.js kefgitgwsscb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\Recovery+igjfx.png kefgitgwsscb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\Recovery+igjfx.png kefgitgwsscb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\PassportMask.wmv kefgitgwsscb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\LC_MESSAGES\Recovery+igjfx.txt kefgitgwsscb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\Recovery+igjfx.txt kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Media Player\en-US\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\RSSFeeds.css kefgitgwsscb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\Recovery+igjfx.png kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\currency.js kefgitgwsscb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_VideoInset.png kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer.png kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Mail\es-ES\Recovery+igjfx.txt kefgitgwsscb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\Recovery+igjfx.png kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Mail\en-US\Recovery+igjfx.png kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\41.png kefgitgwsscb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circleround_glass.png kefgitgwsscb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\Recovery+igjfx.png kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Journal\it-IT\Recovery+igjfx.png kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\Recovery+igjfx.txt kefgitgwsscb.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\Recovery+igjfx.txt kefgitgwsscb.exe File opened for modification C:\Program Files\Microsoft Office\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\Recovery+igjfx.txt kefgitgwsscb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\Recovery+igjfx.png kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\(120DPI)redStateIcon.png kefgitgwsscb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\Recovery+igjfx.png kefgitgwsscb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\controllers.js kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\settings.css kefgitgwsscb.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ca.pak kefgitgwsscb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\Recovery+igjfx.png kefgitgwsscb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\Passport.wmv kefgitgwsscb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Recovery+igjfx.html kefgitgwsscb.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\Recovery+igjfx.txt kefgitgwsscb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\Recovery+igjfx.png kefgitgwsscb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_SelectionSubpicture.png kefgitgwsscb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\1047x576black.png kefgitgwsscb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\Recovery+igjfx.png kefgitgwsscb.exe File opened for modification C:\Program Files\Microsoft Games\More Games\fr-FR\Recovery+igjfx.txt kefgitgwsscb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\Recovery+igjfx.txt kefgitgwsscb.exe -
Drops file in Windows directory 2 IoCs
Processes:
2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exedescription ioc process File created C:\Windows\kefgitgwsscb.exe 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe File opened for modification C:\Windows\kefgitgwsscb.exe 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXE2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exekefgitgwsscb.execmd.exekefgitgwsscb.exeNOTEPAD.EXEDllHost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kefgitgwsscb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kefgitgwsscb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05184065c1adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32140571-864F-11EF-A97E-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000017f96566321d002813ee85b44057ebbf739424a1592b91088fe9b263940ad54e000000000e80000000020000200000001c39f64e0f31045cc7aa15bd071ae6390092b34b0ec32f69e83503789eb9b2f820000000e96366c7a2461e3261f311039e993368a875e87b63dff715aa31d625899aa85040000000f2e927ac02fbf6697aedca672dd237ab9f81b9947489dc4a1c9d81218932979034b9fd40a1b62d55136ae6281c0e4110e53853a05b8536ecfca3c57934492244 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 2724 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
kefgitgwsscb.exepid process 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe 2200 kefgitgwsscb.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
Processes:
2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exekefgitgwsscb.exeWMIC.exeWMIC.exedescription pid process Token: SeDebugPrivilege 2232 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe Token: SeDebugPrivilege 2200 kefgitgwsscb.exe Token: SeIncreaseQuotaPrivilege 2888 WMIC.exe Token: SeSecurityPrivilege 2888 WMIC.exe Token: SeTakeOwnershipPrivilege 2888 WMIC.exe Token: SeLoadDriverPrivilege 2888 WMIC.exe Token: SeSystemProfilePrivilege 2888 WMIC.exe Token: SeSystemtimePrivilege 2888 WMIC.exe Token: SeProfSingleProcessPrivilege 2888 WMIC.exe Token: SeIncBasePriorityPrivilege 2888 WMIC.exe Token: SeCreatePagefilePrivilege 2888 WMIC.exe Token: SeBackupPrivilege 2888 WMIC.exe Token: SeRestorePrivilege 2888 WMIC.exe Token: SeShutdownPrivilege 2888 WMIC.exe Token: SeDebugPrivilege 2888 WMIC.exe Token: SeSystemEnvironmentPrivilege 2888 WMIC.exe Token: SeRemoteShutdownPrivilege 2888 WMIC.exe Token: SeUndockPrivilege 2888 WMIC.exe Token: SeManageVolumePrivilege 2888 WMIC.exe Token: 33 2888 WMIC.exe Token: 34 2888 WMIC.exe Token: 35 2888 WMIC.exe Token: SeIncreaseQuotaPrivilege 2340 WMIC.exe Token: SeSecurityPrivilege 2340 WMIC.exe Token: SeTakeOwnershipPrivilege 2340 WMIC.exe Token: SeLoadDriverPrivilege 2340 WMIC.exe Token: SeSystemProfilePrivilege 2340 WMIC.exe Token: SeSystemtimePrivilege 2340 WMIC.exe Token: SeProfSingleProcessPrivilege 2340 WMIC.exe Token: SeIncBasePriorityPrivilege 2340 WMIC.exe Token: SeCreatePagefilePrivilege 2340 WMIC.exe Token: SeBackupPrivilege 2340 WMIC.exe Token: SeRestorePrivilege 2340 WMIC.exe Token: SeShutdownPrivilege 2340 WMIC.exe Token: SeDebugPrivilege 2340 WMIC.exe Token: SeSystemEnvironmentPrivilege 2340 WMIC.exe Token: SeRemoteShutdownPrivilege 2340 WMIC.exe Token: SeUndockPrivilege 2340 WMIC.exe Token: SeManageVolumePrivilege 2340 WMIC.exe Token: 33 2340 WMIC.exe Token: 34 2340 WMIC.exe Token: 35 2340 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exeDllHost.exepid process 2612 iexplore.exe 2580 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEDllHost.exepid process 2612 iexplore.exe 2612 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2580 DllHost.exe 2580 DllHost.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exekefgitgwsscb.exekefgitgwsscb.exeiexplore.exedescription pid process target process PID 2536 wrote to memory of 2232 2536 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe PID 2536 wrote to memory of 2232 2536 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe PID 2536 wrote to memory of 2232 2536 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe PID 2536 wrote to memory of 2232 2536 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe PID 2536 wrote to memory of 2232 2536 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe PID 2536 wrote to memory of 2232 2536 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe PID 2536 wrote to memory of 2232 2536 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe PID 2536 wrote to memory of 2232 2536 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe PID 2536 wrote to memory of 2232 2536 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe PID 2536 wrote to memory of 2232 2536 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe PID 2536 wrote to memory of 2232 2536 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe PID 2232 wrote to memory of 2768 2232 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe kefgitgwsscb.exe PID 2232 wrote to memory of 2768 2232 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe kefgitgwsscb.exe PID 2232 wrote to memory of 2768 2232 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe kefgitgwsscb.exe PID 2232 wrote to memory of 2768 2232 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe kefgitgwsscb.exe PID 2232 wrote to memory of 2728 2232 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe cmd.exe PID 2232 wrote to memory of 2728 2232 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe cmd.exe PID 2232 wrote to memory of 2728 2232 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe cmd.exe PID 2232 wrote to memory of 2728 2232 2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe cmd.exe PID 2768 wrote to memory of 2200 2768 kefgitgwsscb.exe kefgitgwsscb.exe PID 2768 wrote to memory of 2200 2768 kefgitgwsscb.exe kefgitgwsscb.exe PID 2768 wrote to memory of 2200 2768 kefgitgwsscb.exe kefgitgwsscb.exe PID 2768 wrote to memory of 2200 2768 kefgitgwsscb.exe kefgitgwsscb.exe PID 2768 wrote to memory of 2200 2768 kefgitgwsscb.exe kefgitgwsscb.exe PID 2768 wrote to memory of 2200 2768 kefgitgwsscb.exe kefgitgwsscb.exe PID 2768 wrote to memory of 2200 2768 kefgitgwsscb.exe kefgitgwsscb.exe PID 2768 wrote to memory of 2200 2768 kefgitgwsscb.exe kefgitgwsscb.exe PID 2768 wrote to memory of 2200 2768 kefgitgwsscb.exe kefgitgwsscb.exe PID 2768 wrote to memory of 2200 2768 kefgitgwsscb.exe kefgitgwsscb.exe PID 2768 wrote to memory of 2200 2768 kefgitgwsscb.exe kefgitgwsscb.exe PID 2200 wrote to memory of 2888 2200 kefgitgwsscb.exe WMIC.exe PID 2200 wrote to memory of 2888 2200 kefgitgwsscb.exe WMIC.exe PID 2200 wrote to memory of 2888 2200 kefgitgwsscb.exe WMIC.exe PID 2200 wrote to memory of 2888 2200 kefgitgwsscb.exe WMIC.exe PID 2200 wrote to memory of 2724 2200 kefgitgwsscb.exe NOTEPAD.EXE PID 2200 wrote to memory of 2724 2200 kefgitgwsscb.exe NOTEPAD.EXE PID 2200 wrote to memory of 2724 2200 kefgitgwsscb.exe NOTEPAD.EXE PID 2200 wrote to memory of 2724 2200 kefgitgwsscb.exe NOTEPAD.EXE PID 2200 wrote to memory of 2612 2200 kefgitgwsscb.exe iexplore.exe PID 2200 wrote to memory of 2612 2200 kefgitgwsscb.exe iexplore.exe PID 2200 wrote to memory of 2612 2200 kefgitgwsscb.exe iexplore.exe PID 2200 wrote to memory of 2612 2200 kefgitgwsscb.exe iexplore.exe PID 2612 wrote to memory of 2344 2612 iexplore.exe IEXPLORE.EXE PID 2612 wrote to memory of 2344 2612 iexplore.exe IEXPLORE.EXE PID 2612 wrote to memory of 2344 2612 iexplore.exe IEXPLORE.EXE PID 2612 wrote to memory of 2344 2612 iexplore.exe IEXPLORE.EXE PID 2200 wrote to memory of 2340 2200 kefgitgwsscb.exe WMIC.exe PID 2200 wrote to memory of 2340 2200 kefgitgwsscb.exe WMIC.exe PID 2200 wrote to memory of 2340 2200 kefgitgwsscb.exe WMIC.exe PID 2200 wrote to memory of 2340 2200 kefgitgwsscb.exe WMIC.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
kefgitgwsscb.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System kefgitgwsscb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" kefgitgwsscb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2b4d5982e3909f16967246c9fc4d2451_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\kefgitgwsscb.exeC:\Windows\kefgitgwsscb.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\kefgitgwsscb.exeC:\Windows\kefgitgwsscb.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2200 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT5⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2724
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\2B4D59~1.EXE3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2728
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2580
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5e80813b80a1a05774209593fddab70fd
SHA1719a9da61776f5c7aded3a822940fdd5e31a0c17
SHA256882663361c48105a035b971e74978276764bdf167b66078ed620ed93f98644fa
SHA512db20a826e0c0e73450852ec09e79424802c337b276b924ff1add98b715e0d3188bb7d5b6777112552cf2c658e7223882bb9ebd5d3d72da80261dc51427120bf6
-
Filesize
63KB
MD59365c342563bc86f8f21316cf4fa3647
SHA16c27c864545d4169005c4d1261859401943d6ab0
SHA256ee41dab8a5e5b7c15f8d30e9787cabfb38b8c371c65d4039b7bd5a11cdda2f8f
SHA5128444852ce27b59cdf1dd1d30e01d0b429669edf320296831ddf947d992fa3b56fb278cee3b934ff5ac48aa77c61a05cfa6c2f2be2473eb4748098f89e37d0e8f
-
Filesize
1KB
MD57e6b1b5e8f113edb994e26cdede92150
SHA1735ab817b1bead877f4578bfeac581ca9d81addc
SHA256cdbdd3cbd87a919bf7852320f1efcc4043eb3c832215ed6dc18c269c09567138
SHA512149cb4141999acb4413cb033ed7f4d991bbe1e05bdace765026f8d3b9fbcbdc87e183ce1acd39c7bc6ff73c9269b13968a6665ca2e09939c3cef83890be27a8c
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD525ef0d57e5708a2d211e6c9970c1e2d9
SHA1e45552f0a58cb57a565e866f4ef107b746188f32
SHA2561e44097d2d262dc5bb57e7febcb2d3b4f93ad4c318eeb227ec060350f6796bd1
SHA512f52307b7bad167e93dce61daf3692b0d06ccdc215e9b16b3b474044dd1d14d711b6d1d18632685a5f31c33185c6052804cb44ebfc1e7ee78eb0055ad32da01bb
-
Filesize
109KB
MD5ff157fdbbeb445ce8ee72c2e9057fdea
SHA1d9d06c9469d422d42d49c82615e55e482605806f
SHA256cb01566fec248bead8bf429c6df87cef01c8323753c2033b9c45c68ba5780bd2
SHA51213b5130c65ab3081be0eac8a9b1fc54728f359449311dc764090c32feee0284f845bcc41e2f72fa591bf3fc2114b018c692ad8ea2bd11a983d9bd6974a3626d5
-
Filesize
173KB
MD588df688ac77d349370c594237b26cd1f
SHA1b0c6a9c538fa60c98882636fe8806c9ed7cd2159
SHA256dfa9105172b3e511c0b1f7066f71fc56172d053ea54d7c5e964dd1261d2e704c
SHA512ac8cf2f3519b3c1baa11d6c5cd8370e3eb05ceed31516ee4117b66e1b4becbd1549038b4a0c6b1a7df17e940f2bf58bd135c8f595666559cae19e76f3802d99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55477a5cf1b08e8a20db6b3d69cc0fd0b
SHA1131ffe8f5998d7f8c2aa8dfafe51bfa3e913e5a7
SHA25678c3da9f6fe2acd2244836238aeff3eeeb04d06e375df175581174f4f6d9ba14
SHA512e364a8f84f0a6a451cef92e90780127af7002ac23b628b7f402796fc87eadeee916345c9689a910f11dd68fed50f17145dfa240e4106fae417fe982527e761d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587723bf7a88ad04c799971b34a0bfdf2
SHA1d0361da9454965c5220531877fde519f309a15fd
SHA256d85d36fc3e6b2e7765a310ad054941e24e437d359a308c30dc725de26152d1cf
SHA5129632aac1bc502ecc2153a3c70c56ac1d73a03c040c296e1221b63cc202c284077145144f91755b24465d86e86f5005d7b82d1d4fe88f966a4bcff5e58cd2b678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f36a13f3dcbb21075dc846e1d26e0f5a
SHA129e94e80303bfac05f31ff2f490e7bd81f4d95a4
SHA2560f9e478e2d879744a9539fe6bf00674aeb79c84c2e9ab65d00194264c4f682fd
SHA512992198f440de11916849891540e48ae4dddc86f1b3055943071e9147d7ff4beaf039b9aba07e173f69f90b086440a7e52ed07c53feac3289b0444ac3fd425b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5160471c07646a26ff2a382b3adae8883
SHA167768718f30bedeb0071d491df4d0ff78925ba37
SHA256a59236be9e1de0c0c778ff1a8ae0f0c389319ddcc66fe9320e78bbe5898702c2
SHA51270f077f650453e5b9f605e488ca354f7b91ff9dd8d5abcc3014476ce6830a8a2bc8b647b5c81e34ff18c1f0755814227ac0ba2413a30541625fdf999f39dd6a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51203fe7dea266d094d362ba287ade869
SHA17d992e5f005dbf9fd8bbada8f536b86a2859a021
SHA2568a059fd481f107dfc24b14fdcb178e5cb481cf5853f5a4cf9c9fdfda47cabdd8
SHA5122def8cacff7eae2e8fd43e93b43d31caade17ffdb056169b2f405ca12c6de2382a06141d1093ef2840740a053c28271670883b903a01cb3b5df9a032da6c8a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb25ced7a76d06d4228f3b827708668f
SHA1ea21c4a7dc23d17200c25fcec4b7bc44af47e5a9
SHA25630b9f0079a1a921f47a8832ffa437e488da32b36893547a8a6730d4052bf61b6
SHA512ef6e9eb0f82dc473032fe65d9b2920e51bfc65babfe4290fa854a79cf96dcce81b0d1bd0791b318a7530426d752e936267d3f9b769022d1079a1158442a4f28c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a1fa3bfc60d686bfe4f2d8e5c867636
SHA194be60fd7271b592357695a96675b3569b8a182e
SHA2560d26309a5d972b9eb2f898933b01cb505bab8b0cf1345954ad866950dbd0db37
SHA5125ef16d144befc75c75d9870ec38be82d0184e6913cc03e5f26ed54e6b332c51126cd60936ceec347f5248d8b9038989cb67ad0e32e1b546f50f0ddc4fb5cc823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500190b202c5024aee895baff81a9e62c
SHA1a485f62186d6a00bc59308fb114dfb2892fc21a7
SHA256696eff33d394ba68765767dc55159405ea39122aba0dc38e6a227fae9bd24416
SHA512ce484ae3d9ea90166bc1fbaa907c2ee63e7d7b9600f63a35e13dd41844e76ca4f3f8b24518d6ec156cf3d3810219857f35e805fa9f7276c69ebace3dbf2a1888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be89fd48511c6f8bc0dfd065b3ed4c9
SHA12d55a6b8350e16a8c6f2af6dd1744a76e3493472
SHA25682e72f3caed8763066df2dbdef7facb759c674b251e132cfd2970c75be5f20e3
SHA512437d109404e138cccf51352106fc0042e4dd20feaebe981a4c5c7e6caa62bc46716b193e00ce7eccbe00e04e3b3979deae75cd754b4f4afd8e4d90103299f764
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
376KB
MD52b4d5982e3909f16967246c9fc4d2451
SHA12bd2a2d29679fe8cf68ab8f00ae9ed58f1506c06
SHA256535bc699baf41334ad3f15528af60df9a8421533068f3f09ed01df212b40b059
SHA51201d8716520cab4c226135116cc716d5337b54bcfd672fed8ef727b02560ecd1a16c8602bafbdc75fb65eb49f8af9d3add0658c116b9a574fe2183e2f2f9c68cb