Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/10/2024, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe
-
Size
406KB
-
MD5
5d81e04abea581cd314aceabafaaff18
-
SHA1
e71254283e5fe4701eea95c0bab62cc794f38cdc
-
SHA256
d37f1e805b3f9873ce76f18ea930c6fa0a7b8a9d6bc319404471e70e396f791a
-
SHA512
6c50e72f37ccbb5f7ce7130b2607fa668bff238ced5f3d646c4f6c6dfdcd873706e96d5e3bf8a16cc32b52322ec71c06056df44dc65b33ec60602faa048343a0
-
SSDEEP
6144:K9iqsrJ0LOMc6iAOhgrwOaSq1YXyDTQHZgpNMUpmC+OkykD+Wyasv:Kgqslsc5fUcGnHSpN7ICCyi1I
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+mxcjv.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/B89355B54D879C92
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/B89355B54D879C92
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/B89355B54D879C92
http://xlowfznrg4wf7dli.ONION/B89355B54D879C92
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (429) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2888 cmd.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+mxcjv.html hoqrikywesmn.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+mxcjv.png hoqrikywesmn.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+mxcjv.html hoqrikywesmn.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+mxcjv.png hoqrikywesmn.exe -
Executes dropped EXE 1 IoCs
pid Process 2284 hoqrikywesmn.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\tqajyjx = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\hoqrikywesmn.exe" hoqrikywesmn.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\localizedStrings.js hoqrikywesmn.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\es-ES\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Mail\ja-JP\_ReCoVeRy_+mxcjv.html hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Media Player\es-ES\_ReCoVeRy_+mxcjv.png hoqrikywesmn.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_ReCoVeRy_+mxcjv.html hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\btn-next-static.png hoqrikywesmn.exe File opened for modification C:\Program Files\Google\Chrome\_ReCoVeRy_+mxcjv.png hoqrikywesmn.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\console_view.png hoqrikywesmn.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\_ReCoVeRy_+mxcjv.html hoqrikywesmn.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\Microsoft Office\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_ReCoVeRy_+mxcjv.png hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_ReCoVeRy_+mxcjv.html hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\_ReCoVeRy_+mxcjv.png hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\drag.png hoqrikywesmn.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\_ReCoVeRy_+mxcjv.html hoqrikywesmn.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\shuffle_up.png hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\settings.css hoqrikywesmn.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\_ReCoVeRy_+mxcjv.png hoqrikywesmn.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\_ReCoVeRy_+mxcjv.html hoqrikywesmn.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_ReCoVeRy_+mxcjv.png hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_box_left.png hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_hover.png hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_foggy.png hoqrikywesmn.exe File opened for modification C:\Program Files\Microsoft Games\Chess\de-DE\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\_ReCoVeRy_+mxcjv.png hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_ReCoVeRy_+mxcjv.html hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-full_partly-cloudy.png hoqrikywesmn.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\15x15dot.png hoqrikywesmn.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\softedges.png hoqrikywesmn.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_ReCoVeRy_+mxcjv.png hoqrikywesmn.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\icon.png hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\high-contrast.css hoqrikywesmn.exe File opened for modification C:\Program Files\Windows NT\TableTextService\en-US\_ReCoVeRy_+mxcjv.html hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_hail.png hoqrikywesmn.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\_ReCoVeRy_+mxcjv.png hoqrikywesmn.exe File opened for modification C:\Program Files\Java\jre7\lib\applet\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_ReCoVeRy_+mxcjv.html hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-new.png hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\base-undocked-4.png hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\Gadget_Star_Half.png hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\slideShow.css hoqrikywesmn.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt hoqrikywesmn.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\1047x576black.png hoqrikywesmn.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_ReCoVeRy_+mxcjv.html hoqrikywesmn.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_ReCoVeRy_+mxcjv.html hoqrikywesmn.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\_ReCoVeRy_+mxcjv.txt hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_ReCoVeRy_+mxcjv.png hoqrikywesmn.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\drag.png hoqrikywesmn.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\hoqrikywesmn.exe 5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe File opened for modification C:\Windows\hoqrikywesmn.exe 5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hoqrikywesmn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D03F8791-8E35-11EF-B60D-EAF82BEC9AF0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000002aab7a9cd47ae1d1c0ddca89b378a037acac7a43fe6edc90907180bddbe5ef1f000000000e8000000002000020000000a320adda8415ac3f6812fd0e63ceaf7a3806e9d4f21c55e38a5ca2384c2b72002000000014fa4109f61c374661dddd4a65fe4bd124c04c244e3128d0d7c05f34e41afba9400000001f7cc85d0a2f7aee09e18e8d6df9c0329efcd83e4b995bd9a7b7a21fcf5f23d1643180cdf99eb7a030de571d375c43d7c76a59c3c33aeb03dba351108f433e4a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 002fd1a44222db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435516592" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2520 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe 2284 hoqrikywesmn.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1992 5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe Token: SeDebugPrivilege 2284 hoqrikywesmn.exe Token: SeIncreaseQuotaPrivilege 2736 WMIC.exe Token: SeSecurityPrivilege 2736 WMIC.exe Token: SeTakeOwnershipPrivilege 2736 WMIC.exe Token: SeLoadDriverPrivilege 2736 WMIC.exe Token: SeSystemProfilePrivilege 2736 WMIC.exe Token: SeSystemtimePrivilege 2736 WMIC.exe Token: SeProfSingleProcessPrivilege 2736 WMIC.exe Token: SeIncBasePriorityPrivilege 2736 WMIC.exe Token: SeCreatePagefilePrivilege 2736 WMIC.exe Token: SeBackupPrivilege 2736 WMIC.exe Token: SeRestorePrivilege 2736 WMIC.exe Token: SeShutdownPrivilege 2736 WMIC.exe Token: SeDebugPrivilege 2736 WMIC.exe Token: SeSystemEnvironmentPrivilege 2736 WMIC.exe Token: SeRemoteShutdownPrivilege 2736 WMIC.exe Token: SeUndockPrivilege 2736 WMIC.exe Token: SeManageVolumePrivilege 2736 WMIC.exe Token: 33 2736 WMIC.exe Token: 34 2736 WMIC.exe Token: 35 2736 WMIC.exe Token: SeIncreaseQuotaPrivilege 2736 WMIC.exe Token: SeSecurityPrivilege 2736 WMIC.exe Token: SeTakeOwnershipPrivilege 2736 WMIC.exe Token: SeLoadDriverPrivilege 2736 WMIC.exe Token: SeSystemProfilePrivilege 2736 WMIC.exe Token: SeSystemtimePrivilege 2736 WMIC.exe Token: SeProfSingleProcessPrivilege 2736 WMIC.exe Token: SeIncBasePriorityPrivilege 2736 WMIC.exe Token: SeCreatePagefilePrivilege 2736 WMIC.exe Token: SeBackupPrivilege 2736 WMIC.exe Token: SeRestorePrivilege 2736 WMIC.exe Token: SeShutdownPrivilege 2736 WMIC.exe Token: SeDebugPrivilege 2736 WMIC.exe Token: SeSystemEnvironmentPrivilege 2736 WMIC.exe Token: SeRemoteShutdownPrivilege 2736 WMIC.exe Token: SeUndockPrivilege 2736 WMIC.exe Token: SeManageVolumePrivilege 2736 WMIC.exe Token: 33 2736 WMIC.exe Token: 34 2736 WMIC.exe Token: 35 2736 WMIC.exe Token: SeBackupPrivilege 3024 vssvc.exe Token: SeRestorePrivilege 3024 vssvc.exe Token: SeAuditPrivilege 3024 vssvc.exe Token: SeIncreaseQuotaPrivilege 2628 WMIC.exe Token: SeSecurityPrivilege 2628 WMIC.exe Token: SeTakeOwnershipPrivilege 2628 WMIC.exe Token: SeLoadDriverPrivilege 2628 WMIC.exe Token: SeSystemProfilePrivilege 2628 WMIC.exe Token: SeSystemtimePrivilege 2628 WMIC.exe Token: SeProfSingleProcessPrivilege 2628 WMIC.exe Token: SeIncBasePriorityPrivilege 2628 WMIC.exe Token: SeCreatePagefilePrivilege 2628 WMIC.exe Token: SeBackupPrivilege 2628 WMIC.exe Token: SeRestorePrivilege 2628 WMIC.exe Token: SeShutdownPrivilege 2628 WMIC.exe Token: SeDebugPrivilege 2628 WMIC.exe Token: SeSystemEnvironmentPrivilege 2628 WMIC.exe Token: SeRemoteShutdownPrivilege 2628 WMIC.exe Token: SeUndockPrivilege 2628 WMIC.exe Token: SeManageVolumePrivilege 2628 WMIC.exe Token: 33 2628 WMIC.exe Token: 34 2628 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1600 iexplore.exe 1072 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1600 iexplore.exe 1600 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 1072 DllHost.exe 1072 DllHost.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2284 1992 5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe 31 PID 1992 wrote to memory of 2284 1992 5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe 31 PID 1992 wrote to memory of 2284 1992 5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe 31 PID 1992 wrote to memory of 2284 1992 5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe 31 PID 1992 wrote to memory of 2888 1992 5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe 32 PID 1992 wrote to memory of 2888 1992 5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe 32 PID 1992 wrote to memory of 2888 1992 5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe 32 PID 1992 wrote to memory of 2888 1992 5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe 32 PID 2284 wrote to memory of 2736 2284 hoqrikywesmn.exe 34 PID 2284 wrote to memory of 2736 2284 hoqrikywesmn.exe 34 PID 2284 wrote to memory of 2736 2284 hoqrikywesmn.exe 34 PID 2284 wrote to memory of 2736 2284 hoqrikywesmn.exe 34 PID 2284 wrote to memory of 2520 2284 hoqrikywesmn.exe 41 PID 2284 wrote to memory of 2520 2284 hoqrikywesmn.exe 41 PID 2284 wrote to memory of 2520 2284 hoqrikywesmn.exe 41 PID 2284 wrote to memory of 2520 2284 hoqrikywesmn.exe 41 PID 2284 wrote to memory of 1600 2284 hoqrikywesmn.exe 42 PID 2284 wrote to memory of 1600 2284 hoqrikywesmn.exe 42 PID 2284 wrote to memory of 1600 2284 hoqrikywesmn.exe 42 PID 2284 wrote to memory of 1600 2284 hoqrikywesmn.exe 42 PID 1600 wrote to memory of 2892 1600 iexplore.exe 44 PID 1600 wrote to memory of 2892 1600 iexplore.exe 44 PID 1600 wrote to memory of 2892 1600 iexplore.exe 44 PID 1600 wrote to memory of 2892 1600 iexplore.exe 44 PID 2284 wrote to memory of 2628 2284 hoqrikywesmn.exe 45 PID 2284 wrote to memory of 2628 2284 hoqrikywesmn.exe 45 PID 2284 wrote to memory of 2628 2284 hoqrikywesmn.exe 45 PID 2284 wrote to memory of 2628 2284 hoqrikywesmn.exe 45 PID 2284 wrote to memory of 2036 2284 hoqrikywesmn.exe 47 PID 2284 wrote to memory of 2036 2284 hoqrikywesmn.exe 47 PID 2284 wrote to memory of 2036 2284 hoqrikywesmn.exe 47 PID 2284 wrote to memory of 2036 2284 hoqrikywesmn.exe 47 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System hoqrikywesmn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" hoqrikywesmn.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d81e04abea581cd314aceabafaaff18_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\hoqrikywesmn.exeC:\Windows\hoqrikywesmn.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2284 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2520
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\HOQRIK~1.EXE3⤵
- System Location Discovery: System Language Discovery
PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\5D81E0~1.EXE2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1072
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5af7731e411e0d77b59a42d542969a38f
SHA1d8bcf898705d9cdcfc279f001a4e8ee34ec76968
SHA25625ac70228adcdea188b4ec03e1301bd99146ce4b9d43a26787d334d39db579a8
SHA512304b6226bec79879e2b85119d7e2a731b028406b139059d25dc450287fc7ff1a63354847797d7a2cac9e0602b9871b957a94bda36c52dfb2e8c35e082fb32aa3
-
Filesize
65KB
MD542faff2cf85abf8bfe06c3436dc84ab4
SHA183d3811531adc6e5b4f69709252c9fd4ae83c35e
SHA25610fd0394e857801bc012514883509cbb8ac626771d97f73224cddc09675ea487
SHA51231566f2b68ea4c5a873c8b85c22b2041555578fcf9cd0a58f3d23ac26802220a48f0869837ff33ba09523ae1911db3416f62004863f4bd58fb13c31739e4ed02
-
Filesize
1KB
MD594f727e7668528c4c0fe23c8ce9e8617
SHA18281b5ee3fc32661f40ffa8d65369ced386733b5
SHA2569b6e98614e292ec44011dfc6f676fb2a051776c3be4fa6bc3d4b27687a361f51
SHA51217afd7d75f58b842f25ac10c561fa546c650f6848b4c8edf72f6e042ddea26e9212e4df8aa0e7b3c99a80863f95528cf23dba54fd216948704292dd6814ed32c
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD5321fb3f436d9200a0c44f2d380f97ac1
SHA16ac79cfbabe84cefdbb0ef328ef409e2429ea9f3
SHA256db496c0aa1e8d1a722b1af5a91b0465f675bf71a6598782ac0fdd97a5e885afc
SHA5125bc6675153d5252f5a23cbede66b536fc6c0cd4bec8f7c506883e500595cd721ec3fa43bec797eda5c43e2e41702f57480178b523722016854c967facc2ba5d4
-
Filesize
109KB
MD53619780c7bee2df63177909702bed246
SHA1902b1189ab1e5338b7a67d62894dd211116b8d84
SHA256ca630ff1a27831b28b2b7f6c02e647b3550bb275ed28f16fbb0b32da0e48b0ed
SHA512ef427628fb27c6c51f8aefa391d4bc806c8ba5d6817ec58a7e9bde05b6a82684518f28c2274e93b24ea1a85e62bf6b61dbfab1fe5af87606cedd708118fdbb37
-
Filesize
173KB
MD522b6446ea546b75c58617f1f47218add
SHA14fcbff9238c52c199518c5663b2d8cecfcd75796
SHA2564b96e7fa6a6086f0cc47705a191895f0d3379b468a44ccd3af7d321ba82df7e4
SHA512151a835465b92526f20868f70ee50e706dcebc21c5291b1fd28db843473078cd8babcb978328599138c7db8f4907edc76e2b36dadd3a445ce1853f2ccd4e72c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52191525b845f6010510dfe68b84aebf3
SHA1b0c7a62d5d72b4f6da4352da4cdec7de034c95f6
SHA256ba4f309a4b394b9d4b61d9aab01270637d6c297f5574aa275a96a8f07cdd0dd3
SHA512583cb135d762a54f054cd585d77965bea408c8d58385711e9bae693ec4ded00cfcd7225064489c28f73950c15a1d7b82e88f97d7a635f873289632e2990a5c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58792f5e1077c5da9e91eafccbf496c03
SHA149da9ed06d70f76aa13fd8a95221b0f47fcd9188
SHA256b66d03310adec2f08322ee3a25716a7bc2b7435c7644288dcedae7868942ac79
SHA512efd9f61c08fe1f9003e9ec7cc19913389b157142df74e437dd34bffc166e15be74c6a5c92cb303d4cd3d818cfa788f62446e5d9e509b62a817b55d6127dc65ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b93545f6aa6d752224ffafb2f813c77
SHA1a44172029feef7bd90c09c038c9c27cfee4a79f1
SHA2564419d9346511c5ad5b8871ea04113a8858c265af12e14592636064daaf82c021
SHA5124664d2aeca05a23d083c4f292b3099ace7a7b752be6e144235429f1a4c23f6d995df07850157afebf80a906102dff835c6431b08f2f838f683bbf85781bb5d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e5d4783aa7f199ccea2c512b1dfd861
SHA1dba9ab38130d1c04f3ff8920e479bb14dafe6ac2
SHA2566b80371b6c0fb0ad497df2c769cb236afe52635ee3158bb94dbd20630a7d50e9
SHA512b4783e5c1b47be257a02e0e225b23a0124717f13004790b4efff77ff7a0692de202cf13ba4925e2862bf79375de3d72b66d23a994f244a06235d15a31e9f07f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05ef9a38143fb149855ddd5f0a6c435
SHA1a4df0cf5c61f7c9025924da0fe221475553ea03f
SHA256a7006844e72808f93a4774ab14421569dbfc94a2aa7e0dcb40536f66dc6a890a
SHA512cd8b3a437017fe4f159a06be39738cf6acceb3a2e5c2257e206e150e9fed8210f26ac05fea064d681a19f9c6380b57b0e56315cc7bc3c2dce79c48c33225ca96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fbe916580b891108c697f4d97e74a48
SHA1a4bd6ad9af661acb1f68a2b2777b7e71381e67ed
SHA25681d7f40fd2aa0a41f8c638346bf1d55310611cbe14c8d2c0353cc0bda8f56645
SHA5129008380b17c29b5ecfd7ef5fae2ce92a981d2dddc33c0dfff515192ab3ded44c865418480352f31742aca41ed3bb1615da357258c5f43bb09476d5a206f3a8c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539d2acc9a073268db3c9dec09d6c4484
SHA154584ec1ee40e9256e175e6132ff9e9b0b7cd112
SHA2564a48f725c7cfcd3a2c189b06ef5c0284fb32cb3a2dc071ca097a750f378b134f
SHA5121fd0ac814173ce87464afc001ad920b437c296405064fa8f6ad608aeb9466a90a2aa75e70e1ffaf77f772459dc88c741f524f622083eda0ace86e88fe5c20e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3ef193e211e0c7765e74141cfb7c0ac
SHA1bc04caf2c98468afae9d8f4807f1214856ffeadb
SHA256c67ed257f16511a38f5ad5ee8071b5ce09842301b152a67e179378b7955381ec
SHA51269a55d91df92c4b0fbce68954370ba7c161e30fc4f3827dd5dc7a06eb9be283b962c8cff94244255c0d75acf7f95903a1f6a255202bd55d5a05a409e843de497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501b8bf13c1ba96e7b54b6c801a7cb986
SHA1a2eabe66a4bb7a47a9c367e7b498c37fa1d2e220
SHA2569eb49986e967a757ce67f17664378128b64f249025a90b32ddf3ad124aef1a00
SHA512681330f49ac885d47e6db5b7239c7fdd7b2ee63a045ce1b176ea87fdbb7fc8c17270ca21defacdc0d5586d591242af0921d5729d4560481e4c94a11624c7ba71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d7fdaf20ed2abfea0684d9060b8f6cb
SHA1582c92d36103a3537d4f0a5952dde3da5223cc7a
SHA2567ddb26ac539ade973883cc2cea4f2e655c038bda8761cee8f4794295ed329d81
SHA5120c277a58a018fe09b29df6a3453ac900760afdab0581e896ec931aa53442e97255218789d0627f75263bed76a9eeb311eccffa708a2e53012afe5e5bbb2f889a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5690332adc0d2c2a0c6989a2a02148f1e
SHA19390be3237420b9c463f0072fa80158924a35080
SHA256579f096c794e798af02059eb1a98383a027b0b8b38de976638255dbea0c3772f
SHA51220b35b5bc476ffc6dc1669b7a2d5b8ac44e9a2db784a982be82e3dea9e22b5815e6061c981e1f1a068b238c92cb257ffc4c928da75792ba5e45663432e6c443d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506d76d5f74c533eebb785f950d034d53
SHA189cc918924eb6a2ad5147bf913a561f48017662a
SHA256026466c1a207cfd8971cc927a4ce1cebcf5ea374b3742fd9db744673d6f2db4a
SHA5122430405a68db9e4991053cfadc652b25785750638966d4a90f739db10fed9a78aa7970dfba465b8a37724e455f8daf15e24d2714246a639c4beff8124a6cff57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ddd145b96202c4f4e2241cdab0a70c7
SHA1e3524e197f65ae958f87f1dcd9aa54df06e2ec1e
SHA2561989a8057098d8e384f3aff87966e62eaeba73770a58f13edbe9534981f3b415
SHA512c1fbade56949e1b0b482cfa2fbf2a17e6363e6716a2bc5e3510fa73146030e3efecf1a82275a1790797261707ee77b7381b4fa6cd40bc7d5617aef1b76f0d27d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e6bc6585f27ceb618951b36544a69b5
SHA1b29752af84d8208b9428654e5ab64010940a7d92
SHA2566354afa857bfcc54484d1f627c43043556ce37f990a44380abe0631cb74f4c53
SHA512d6d796af00121aba933a72bdc41cc19ca211ad0895d0dcd2afdfa0424acb377ab3681a9bbe67f4a6ab01bb6deaab7977f320e70e437d085f39a6987809335fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f87eb2540f74c2b67ba57c5f72fa7ace
SHA11a24fda818a5694fdd594f40ec86c49af7cdd9b3
SHA2565d4a70da9697c575ab27917129eb1c89d9c55a93a5a70031e5e18a2310f42f40
SHA51284814a118626e1d266846d046c70ed8ef36c771723b9a874f77200bd7af4881e28017ce892bd9542faca85f3706ff284d5ae39e5e00a204eb797e42b563bf19a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5546abbf940bfb5c040d42504a61eb1eb
SHA1fe28391b89a2a935af3e2035157bd234c5b46858
SHA2565ec0ff05a3e8624632e5ac24856c1285355c0a4bf24685cb03c2f405c558029a
SHA512e494ccecb786d930bb3064ab31fdb2de6e8f6f5b4cd41cdf038c5e18344e351ecfae65c6941a854e175d73cbd3f838df5ddae1b61303d573604f6d8110e3dd85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57333b5143ee0039de2b619fce04d98ee
SHA1e5fd3e75b9e46349ed245b86e6a3243664814c64
SHA2567caf297cb0e002260365747bae8e9f897b9d0e1f6bdb071bb4c7b4715f63f3b0
SHA5124006eca00a8a54da61d45343951d5991d449aaccc84d74cb90b58c30c232f6c9c50715e5aa0c721807155d1eb3856eaf4804b9e75ca59314d4c2444ddd44bb1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d936af00d93ed88adbbe6fbf4d744c7
SHA181a49c890296faab6a6248266ed2cc4ae4131126
SHA25616a27eb88608c4fc015ead8cbc010b12fddb2ed90cb001a81843fd73c734a344
SHA512bc1c1789a8fba943eb616f0df8e8eb7d7d4379b77f37e3ef2035a6a5f19c464bb6d68b017512437d730d4f6b20e7f26401ddb39c5c0c0deb8c60489a4ea65d69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53315b5de356fb877db36abc51f822af3
SHA1d7e4a06b9da1c75f0958ed4db153bd635caf0c89
SHA256d4623b9c564dbfd8677d3d6e1f1234a3fdb8ac69d05b54d1fd4a6a7f35ea7b0b
SHA51234699819216c525b60de7a13d1b21a245043abeec55098861f7f8cdd150e3d21d46a417888c8b13fceede2ac38603b329f22ab92fce9dffa65aef08e79c234a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c36859b66dd25e355ed7f3985ca3038a
SHA18ad2eaf6771ddf819174bbaaddb71e41a94b9aca
SHA256628aa4153d8c63b9eaaaec8846dd79eb6bcf380471604f9f73cc3a03c03ebc55
SHA51209e217a91bbafc3dbd8647e928b19fdd346a055d118f1a75bd1f851a806282df63fbd93b62c262715610267841ff03954b92e925305f3025290d72067eca3b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f0facb16f4584fce66ffbb0f333910c
SHA19b92657dc0755ff1defc728d55eb411ed0adc2c6
SHA2562aad32b358e8483df51ceb3210c16286562ba492f74e7a9dcd155f023ca0ac1b
SHA5127d525d3fba9719976bcf6ec9354eef021a1a360f28bc2b3a995888ee40da2b9ddf5f8e29d1004227c874c09bd78e1ce98f902f2ba4547fcc1dc982c377715287
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
406KB
MD55d81e04abea581cd314aceabafaaff18
SHA1e71254283e5fe4701eea95c0bab62cc794f38cdc
SHA256d37f1e805b3f9873ce76f18ea930c6fa0a7b8a9d6bc319404471e70e396f791a
SHA5126c50e72f37ccbb5f7ce7130b2607fa668bff238ced5f3d646c4f6c6dfdcd873706e96d5e3bf8a16cc32b52322ec71c06056df44dc65b33ec60602faa048343a0