Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
5092d1d7abb882028147df297432ca49_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5092d1d7abb882028147df297432ca49_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5092d1d7abb882028147df297432ca49_JaffaCakes118.exe
-
Size
381KB
-
MD5
5092d1d7abb882028147df297432ca49
-
SHA1
101d56d520a89ac973099959a317a790d7b75130
-
SHA256
3fb80b937831aca246d838a129d4e094b8de7fc513fe14f311e1bbaf67cb8a99
-
SHA512
aec9a4a561978251bc537675fad16818522c6cd6b8f6e5700f96ded4d0c2ba4bd50c5efc8ec5e2ab30fe56f5209e21f1af16f4fb7b599db8184266e474b7a898
-
SSDEEP
6144:bU+DRYgAOEYI146+ziWRKrY7350PeR21AG+KpAy:l9YgaTl+ziTrY7pAxdpAy
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+fpbco.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/82621F60107BC0A9
http://tes543berda73i48fsdfsd.keratadze.at/82621F60107BC0A9
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/82621F60107BC0A9
http://xlowfznrg4wf7dli.ONION/82621F60107BC0A9
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (429) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2880 cmd.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECOVERY_+fpbco.png ludospjsxklh.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECOVERY_+fpbco.png ludospjsxklh.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECOVERY_+fpbco.txt ludospjsxklh.exe -
Executes dropped EXE 1 IoCs
pid Process 2320 ludospjsxklh.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\nxodrvbonpfe = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\ludospjsxklh.exe\"" ludospjsxklh.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\NextMenuButtonIcon.png ludospjsxklh.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_RECOVERY_+fpbco.png ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\library.js ludospjsxklh.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\content-foreground.png ludospjsxklh.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\jquery-ui-1.8.13.custom.css ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waning-gibbous_partly-cloudy.png ludospjsxklh.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_SelectionSubpicture.png ludospjsxklh.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-backglow.png ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_RECOVERY_+fpbco.png ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\ehshellLogo.png ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_RECOVERY_+fpbco.png ludospjsxklh.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\de.pak ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_RECOVERY_+fpbco.png ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\RSSFeeds.css ludospjsxklh.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\vlc-48.png ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\pause_hov.png ludospjsxklh.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveNoise.png ludospjsxklh.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\selection_subpicture.png ludospjsxklh.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\it-IT\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_ring_docked.png ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_corner_top_left.png ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\Common Files\System\msadc\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\_RECOVERY_+fpbco.png ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_RECOVERY_+fpbco.png ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_RECOVERY_+fpbco.png ludospjsxklh.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\pt-PT.pak ludospjsxklh.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_RECOVERY_+fpbco.png ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_RECOVERY_+fpbco.png ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\_RECOVERY_+fpbco.png ludospjsxklh.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\_RECOVERY_+fpbco.png ludospjsxklh.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\_RECOVERY_+fpbco.html ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\settings.css ludospjsxklh.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\title_trans_scene.wmv ludospjsxklh.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_SelectionSubpicture.png ludospjsxklh.exe File opened for modification C:\Program Files\Google\Chrome\_RECOVERY_+fpbco.txt ludospjsxklh.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ku_IQ\LC_MESSAGES\_RECOVERY_+fpbco.png ludospjsxklh.exe File opened for modification C:\Program Files\Windows Sidebar\de-DE\_RECOVERY_+fpbco.txt ludospjsxklh.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ludospjsxklh.exe 5092d1d7abb882028147df297432ca49_JaffaCakes118.exe File created C:\Windows\ludospjsxklh.exe 5092d1d7abb882028147df297432ca49_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5092d1d7abb882028147df297432ca49_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ludospjsxklh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ab39594720db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000079f3672e69b24b12ff37c70b4354a061e8f111089c5a96aa07c3323eb0c0f9d9000000000e80000000020000200000009c2ca540e533e0911592a73e3d7191b78e23ba8dc9d01e3eb2ed70257b9aceee200000007168fc6364485ee8ebcea2a00f82448aba0e46891aa825b30ac52f70a7085107400000003b5d866a19f617b57b32d447ec540ba5319c63d0934aca831108c0371099f435c15d77dfe90d2b7e2e86f445d6e91dc2b2a7f70cc32a4ecf5023e46f9ae6f733 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435298711" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84CBB831-8C3A-11EF-80CF-C28ADB222BBA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1404 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe 2320 ludospjsxklh.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2192 5092d1d7abb882028147df297432ca49_JaffaCakes118.exe Token: SeDebugPrivilege 2320 ludospjsxklh.exe Token: SeIncreaseQuotaPrivilege 2704 WMIC.exe Token: SeSecurityPrivilege 2704 WMIC.exe Token: SeTakeOwnershipPrivilege 2704 WMIC.exe Token: SeLoadDriverPrivilege 2704 WMIC.exe Token: SeSystemProfilePrivilege 2704 WMIC.exe Token: SeSystemtimePrivilege 2704 WMIC.exe Token: SeProfSingleProcessPrivilege 2704 WMIC.exe Token: SeIncBasePriorityPrivilege 2704 WMIC.exe Token: SeCreatePagefilePrivilege 2704 WMIC.exe Token: SeBackupPrivilege 2704 WMIC.exe Token: SeRestorePrivilege 2704 WMIC.exe Token: SeShutdownPrivilege 2704 WMIC.exe Token: SeDebugPrivilege 2704 WMIC.exe Token: SeSystemEnvironmentPrivilege 2704 WMIC.exe Token: SeRemoteShutdownPrivilege 2704 WMIC.exe Token: SeUndockPrivilege 2704 WMIC.exe Token: SeManageVolumePrivilege 2704 WMIC.exe Token: 33 2704 WMIC.exe Token: 34 2704 WMIC.exe Token: 35 2704 WMIC.exe Token: SeIncreaseQuotaPrivilege 2704 WMIC.exe Token: SeSecurityPrivilege 2704 WMIC.exe Token: SeTakeOwnershipPrivilege 2704 WMIC.exe Token: SeLoadDriverPrivilege 2704 WMIC.exe Token: SeSystemProfilePrivilege 2704 WMIC.exe Token: SeSystemtimePrivilege 2704 WMIC.exe Token: SeProfSingleProcessPrivilege 2704 WMIC.exe Token: SeIncBasePriorityPrivilege 2704 WMIC.exe Token: SeCreatePagefilePrivilege 2704 WMIC.exe Token: SeBackupPrivilege 2704 WMIC.exe Token: SeRestorePrivilege 2704 WMIC.exe Token: SeShutdownPrivilege 2704 WMIC.exe Token: SeDebugPrivilege 2704 WMIC.exe Token: SeSystemEnvironmentPrivilege 2704 WMIC.exe Token: SeRemoteShutdownPrivilege 2704 WMIC.exe Token: SeUndockPrivilege 2704 WMIC.exe Token: SeManageVolumePrivilege 2704 WMIC.exe Token: 33 2704 WMIC.exe Token: 34 2704 WMIC.exe Token: 35 2704 WMIC.exe Token: SeBackupPrivilege 2564 vssvc.exe Token: SeRestorePrivilege 2564 vssvc.exe Token: SeAuditPrivilege 2564 vssvc.exe Token: SeIncreaseQuotaPrivilege 564 WMIC.exe Token: SeSecurityPrivilege 564 WMIC.exe Token: SeTakeOwnershipPrivilege 564 WMIC.exe Token: SeLoadDriverPrivilege 564 WMIC.exe Token: SeSystemProfilePrivilege 564 WMIC.exe Token: SeSystemtimePrivilege 564 WMIC.exe Token: SeProfSingleProcessPrivilege 564 WMIC.exe Token: SeIncBasePriorityPrivilege 564 WMIC.exe Token: SeCreatePagefilePrivilege 564 WMIC.exe Token: SeBackupPrivilege 564 WMIC.exe Token: SeRestorePrivilege 564 WMIC.exe Token: SeShutdownPrivilege 564 WMIC.exe Token: SeDebugPrivilege 564 WMIC.exe Token: SeSystemEnvironmentPrivilege 564 WMIC.exe Token: SeRemoteShutdownPrivilege 564 WMIC.exe Token: SeUndockPrivilege 564 WMIC.exe Token: SeManageVolumePrivilege 564 WMIC.exe Token: 33 564 WMIC.exe Token: 34 564 WMIC.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1912 iexplore.exe 2792 DllHost.exe 2792 DllHost.exe 2792 DllHost.exe 1404 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1912 iexplore.exe 1912 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2792 DllHost.exe 2792 DllHost.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2320 2192 5092d1d7abb882028147df297432ca49_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2320 2192 5092d1d7abb882028147df297432ca49_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2320 2192 5092d1d7abb882028147df297432ca49_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2320 2192 5092d1d7abb882028147df297432ca49_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2880 2192 5092d1d7abb882028147df297432ca49_JaffaCakes118.exe 32 PID 2192 wrote to memory of 2880 2192 5092d1d7abb882028147df297432ca49_JaffaCakes118.exe 32 PID 2192 wrote to memory of 2880 2192 5092d1d7abb882028147df297432ca49_JaffaCakes118.exe 32 PID 2192 wrote to memory of 2880 2192 5092d1d7abb882028147df297432ca49_JaffaCakes118.exe 32 PID 2320 wrote to memory of 2704 2320 ludospjsxklh.exe 34 PID 2320 wrote to memory of 2704 2320 ludospjsxklh.exe 34 PID 2320 wrote to memory of 2704 2320 ludospjsxklh.exe 34 PID 2320 wrote to memory of 2704 2320 ludospjsxklh.exe 34 PID 2320 wrote to memory of 1404 2320 ludospjsxklh.exe 42 PID 2320 wrote to memory of 1404 2320 ludospjsxklh.exe 42 PID 2320 wrote to memory of 1404 2320 ludospjsxklh.exe 42 PID 2320 wrote to memory of 1404 2320 ludospjsxklh.exe 42 PID 2320 wrote to memory of 1912 2320 ludospjsxklh.exe 43 PID 2320 wrote to memory of 1912 2320 ludospjsxklh.exe 43 PID 2320 wrote to memory of 1912 2320 ludospjsxklh.exe 43 PID 2320 wrote to memory of 1912 2320 ludospjsxklh.exe 43 PID 1912 wrote to memory of 2764 1912 iexplore.exe 44 PID 1912 wrote to memory of 2764 1912 iexplore.exe 44 PID 1912 wrote to memory of 2764 1912 iexplore.exe 44 PID 1912 wrote to memory of 2764 1912 iexplore.exe 44 PID 2320 wrote to memory of 564 2320 ludospjsxklh.exe 46 PID 2320 wrote to memory of 564 2320 ludospjsxklh.exe 46 PID 2320 wrote to memory of 564 2320 ludospjsxklh.exe 46 PID 2320 wrote to memory of 564 2320 ludospjsxklh.exe 46 PID 2320 wrote to memory of 1036 2320 ludospjsxklh.exe 48 PID 2320 wrote to memory of 1036 2320 ludospjsxklh.exe 48 PID 2320 wrote to memory of 1036 2320 ludospjsxklh.exe 48 PID 2320 wrote to memory of 1036 2320 ludospjsxklh.exe 48 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ludospjsxklh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" ludospjsxklh.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5092d1d7abb882028147df297432ca49_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5092d1d7abb882028147df297432ca49_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\ludospjsxklh.exeC:\Windows\ludospjsxklh.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2320 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:1404
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1912 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:564
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\LUDOSP~1.EXE3⤵
- System Location Discovery: System Language Discovery
PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\5092D1~1.EXE2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2792
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2348
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f01⤵PID:2176
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a15dbd2590b8741a3be758174e026ecf
SHA1c7b17cdba7b410a06d52335c1780fbe6ec4ca2a6
SHA2567dd2f041a06bc0b63ba337e12a3e40e9836ff4dc2fd6959b8f30e5e4c2618ee9
SHA5123d79a26d89662af098d421ddde82c11de426a026c0f41489e1bd48e28c1240593cb1645a25b9fe895fd0dfa7dd9bd837787d6ddccc51211fd756f018eff7de7d
-
Filesize
63KB
MD57581cdec9a44e7b90f7ae3221832e34c
SHA113a6098f9518bd2523e75b4cbe9c243e71abc122
SHA2561acb4098f8c9a3af97dd873b3192fa6188d79b9dc65c257ea37d4b420037505b
SHA512968bdb364590782c5885bd0506f608a19500e754d02ab0be49e2a50c9036dd7581331b90bc1ffbf47dec18e4b8c99ee962a9b75c0f6a78f5914eb080e28f2f37
-
Filesize
1KB
MD5e6793cc2eb519013e8a9e5e967d61466
SHA1d3d2ab6a7d18c97f893bbd8e7ad35d4f8762620c
SHA256b7438239a8ee0d39c4af51f04c04dc51449b7e32a50c3a5f5b96523c749a2ca7
SHA512caab46c1052c25c6e3db9316fb8b6a920821d3baa1af949620b56b7dae3137dda7020a03b5048dee57570b20aad873b0c66e55b3f2bdfd4f5056963a26681417
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD5d641b5e1379ca337ca5f460fb8a9bccc
SHA1beaca5b280b95efe8e4cca9c881bd36dbac1b5b2
SHA256c5270d175c73b55d6456ce4dcef702576431e331f05709f527a4b4c5825654e0
SHA51292aadfdc0b727675f8613911ac93a462943533889334b3e7ed34c1079e3105d77a7160bbc9c4c45e8a46477cc0a8a751a73d6aed8e809d1b3bcbf200610e84f5
-
Filesize
109KB
MD58c1b07975bc66edd3360094d7fd5b323
SHA13bd03ce6fbb291cbd114c2c37c123359f7e23a09
SHA2567970231706981a81d6792dba3abd1d9761e8f5502a2929dc0849e4129a8c869b
SHA512fd8561d311c238bcf87402ec4d1f98e6aacf6963072914852785a1d449b6567660a5db46e07dcfcedb12fc36e117be362471949c96e7d6c9dd41d117409303f3
-
Filesize
173KB
MD551a674b398aed33d944e5953a869a181
SHA18445be1b77a49b6f30dea60843750f84ca7c3bf9
SHA25631d86df38b2b5066248e7135192a2af7d076cdd314224a180a7c7ee42c3825aa
SHA5120734b3057fd6fcff21352207e3e048eb930fe46b29c4f25c71ace4f8394d6f0dfa1ebfb2aca28f7813e90f630591774dd2743ac3272d6bc34ab867b1959858fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f85de1fb505483cf3205eacfa1d2778c
SHA15e85967b263d1f7fa7f2a11075f7baf55286a02e
SHA25601568b640e29834992f291b3203656547c8951e254d458cbddee8758b69db009
SHA512cfc7385e7de90bb48fedc9f09c375e7af2ffc750f22d0f8249bdb669421c1aa04a36c57c4f3c816b47b96ef89e32b8b7c0f0753d3df6232abed49f4c70b60f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51efa007bdeb4c608a79e2a0b8ad2b9dc
SHA1528e034d28d41ca5764153d9e2694eb6bb7998ab
SHA2567004e8ca1da7972b9530aef8f42e632b12ae36fa02136dea32d4c27981a829d1
SHA512bb4de5826851f261819ae59ce667b7ad7716eb612e150e73a3b3f42090b90d4f3fac714ca02813fd4cc5c9a6223060d3dc00ea65e27bea7ae9e7be868f30c6b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a7229d6e764f0773689c9ec619dee0
SHA12032d421160ea86eb41e2acc28a9e3a057554c0d
SHA256059f649b4bbeb063a556f05344f902afece98d0002af0f83b6eddcc78ae9b139
SHA5120df38de6eb232ba4fccea5527ba27cd443846cf2a69b78f3cb64e24325d81b1f1dade0bbb037d056e3c24c02e71ed299370cee671d1136906c2bf8d14d277359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6047657acb398a7bd1e84620105a2c7
SHA1354734e0141a230a85f10c7f83d89b8dcd6d88e0
SHA2566232cf7505456222fc05349692187c8eef44a1574be50c5d5c64ea0477ff166a
SHA5124ed01530b898bd6b8176fcd8dcc096ffcc2628bb0a10f982113a55b1fde40a63a3587a4e2a80932dffabd56c6bb23e68c905a8b94d8bdf57592bee96df0e92b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5651d4dc864a489ed88e9b6973642abec
SHA1fe8e111a56ffbeddb790d6100a6d1dffc5956c7c
SHA2564d19ffbd5b4a8d04fa5fec672d739081bb5d24231aabf87ff3bb683518bb7317
SHA5120f8f5f2ce143b0b60ffd4b2f7b4988073cfb9d34abef460526ca9d96daa47b14ec764ca8fdaa43a8a68a1c5c1bda4324ed121e532f24f58cc02c433a6b61e647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3dfcd1c042289db774239c3604a8bf
SHA13e68be05ebe66bb7f00802cb3a736c171cb678cb
SHA2566d3fa93f6072e18c862184c2089ff3f74edf77ffef9b70153bebe29d369b7f80
SHA51258165a49b9338e055d19fbf877c8783f8860b802f51e1d927f92d1ce5f735a64b755832748db7cc8d6f8bfb059073f24a909f8999aa7645a89cd4ce9c3d64be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54501440ad5f4617b78dac517401e04ad
SHA120ca72b0dbe37cf0eb5f60043db4117ec3480417
SHA2565f06fbc9259ee82683ba3099f344c91f6a21bdd7bf93355c008d673a0cac3d17
SHA512bbe4bdbaa703d9ac0e16325563823ef04cc54c717f3751ea89a288b1352f299947a85dbd3de60926bc8811f372b9713b99dda8c55cf177f26d430a2f43a1782c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591598879451d0b43e60f04b32307a6a5
SHA1278e8cfb68e76f9c3244bda32152c2236d5062ae
SHA256ac83a9b46b291cd4fcb77c17a40e07b75abd43900c26658acaa9b3943a35e5d6
SHA5127504258adb61203665a8dc990c5d7e12b5305342de1b94bfe1c727ca44709de71131ff9412b161fe79c26dfe3b69e6ae3a5dabe845ff0af22bc511e63631556f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5685c82d8e2093dad2994b8412deccf60
SHA11e03a7c803c53c7082aba714f207abab01fd8190
SHA2565dac1d6f552870230a04a56963654721289a3c0040f83538d56053b4a725b7b6
SHA512f67ff0a0947625379dd94832d2729260e3d2de3c5d89d126188457bee6b7f7cc83765e6a6cf1c694bfd4977084583ce5e7a6fd4bde81a0a19626be5d62f6d2cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ad621d99d11d5f4bcd8b5133953ad6
SHA1573d9dd9bc44aabc26573004f5666d57c8079536
SHA256cedffb0cb7443e4b29f7cc42e1f4f6e3867f0000f96ee9fc793570673a6f726b
SHA51209e011a67a518951af1bbc433ee44019b255982b1c30ec620f61ea8036d8ed0881caba3e927fca1d02aa087ad49ccead851cc3bea1f0f1f1a89e1e761aaf038d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a747e7146f73df035a1498bfca8f4d
SHA1cd1eb1f913fed8b02df54744a71b3d8eb6f02785
SHA2563f2e8370f20c0b6847294b4af70dc8144d263f1c757aaf8bd3ae2d0e641ae22c
SHA512f0a2a1b7a1f01ac9fcd80c061e518576111084caac4079f6d2deb3e4fbd9ed5821121e02e4ca7890cee27769ddb1f74a5d12a16d8917848883a2785ce3e0da4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6da80ccb89405702ff8494bded75a7
SHA1cfea098d93ee4bab865460446c5cf4150c4c0990
SHA2566b6823b3949dcbe89e3de8e366465c182e2fc8671e5a33c05652a8854e19c41d
SHA512bb394bd666a9b78fc3ab6a17cddaceb75fcecd5e127e72023cb90b29d072fd8d3c3e0725c6e688c94f398fb201b84128c2d453014860eaa7240efec0de072e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa24377bbeb253f3110d76dfc0a5debc
SHA1546b09f2ff83a97401e600434eaa2693bcd5d021
SHA256e736b3d287ad342513e61c1ee09ccf23342f45f0a8d6023305435c8510cbc99b
SHA512aaa902cc03df2ee74c00758e70db64582385ce1ca2577adc88dac6900bca37d955a2f7031c2728b31f38361a766a37ae526c93f26d397bc811c3503510b3d7ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512acc94f40a7f8b454abf5d134a5282b
SHA1200567041fd54934ecfee46d8320daf7e6ef2acf
SHA256d5c8694f74a496600711075bd0d817f1cce559944a3a261de11a497666f99488
SHA51236a57ed6af28d8c12b08e2654af2a54c066295fe09ecb687a4fe959b5336efe883d26c213ea611f53fd6cc7b7ce8a9c27267cdba0a8badc4d693cb986164e62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570fa0f93360808502281fe3d6aa4cd32
SHA196c565a2f21045c05579fc341a065bd072d8a37d
SHA256008f249f801c6f7805e851e9334246b0bf15243cb7ae65e81382469669d07b49
SHA512cbb122c811ec4c2761788437dfb4b431b8a3c98e7ed6e36ee35cfbee1f4d54d5242612eab6e81c8904bca759acb7552d9ef0074edb2da732bce888f0d388e1c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50957e2c5875a44230889f1ffd77d79a2
SHA10f263927b3ef3ef3430765dedb67c858c674b0d2
SHA256ad5710792f62ccb91d57e76f1dceeec038f4ca24ba9955438aaadf08384b3bcf
SHA5124eb5465e349fde623c34bace6f9fb784ef9609fd029eb577539901fae83392f65c07a21001e96d4ae7d0b557f50f5561f46531637c66f9c3bb8d78b402b6e7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508aa56e0704faf5649893cbc76a644b1
SHA17ee529abe57f9253da0fe08ec75f49ae60c37ce7
SHA25670105183b97bc3716bb8a168e7ba63eda9deb1b338534292b61abab15ead4a1c
SHA51276cc8ecfe3184cd0937f9f4833ba2ff68a9d9064b4ae7dadb07173d99bbd355d5dcb2d52b71725b7541863c577f8496141a73b2a2bde47eff2c739e206ad5d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a30d704783748933ea0e971954d4d171
SHA120986a62ec6fcf562a972cba0ae40d77f6ef9f41
SHA2569f6390bdf724603470bec1e88081a5afe14ccca365fef426ae440fabd94668d5
SHA512ee3091a992010512efd93a79324515654b90583db4444e68681e5e1fc051234a0dd56d883e24b6147e08e78d853d2d38873542e58e33b11a30f6a3f6ccacc47f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537477b8f175320d1a1b4bcd25722f5e7
SHA1bfef920bc9026c5af4dd9b10fe1e5c0f8f82cf80
SHA256a9e655f045cc752d3fe7b70ba30e0333bfa5b95c2eec4b78f2f9461821962f18
SHA51273310b70a49fb650f80746c56208750a47df8f34f7a2a8ed42c445ba29bf27ea1f74d9ba3821661602700eb52f7a05043cfec6dffc501f4b193dbe612a6c0ac4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
381KB
MD55092d1d7abb882028147df297432ca49
SHA1101d56d520a89ac973099959a317a790d7b75130
SHA2563fb80b937831aca246d838a129d4e094b8de7fc513fe14f311e1bbaf67cb8a99
SHA512aec9a4a561978251bc537675fad16818522c6cd6b8f6e5700f96ded4d0c2ba4bd50c5efc8ec5e2ab30fe56f5209e21f1af16f4fb7b599db8184266e474b7a898