Analysis
-
max time kernel
124s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 15:19
Static task
static1
Behavioral task
behavioral1
Sample
8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe
-
Size
396KB
-
MD5
8c23e7c480280c24c6b34c9c9bafc05d
-
SHA1
de75bf5f2115fb3399d2c94966218f91dd9c2362
-
SHA256
d898a79292edb0059156844e559cf65ab68819786b1d344dec42993851751740
-
SHA512
04a631fbd1a3aca23956e316716375a77328471025f8391971aa33315ad8245419231f3b9b95229b1999c24c240ae97436ba9fcc3216d1a5b63ff75de9e9edf5
-
SSDEEP
6144:4T3WR0F1lDPR+bJnm/jtowhxZWVrfQwBcTMMG26uw6fyQ7Q:4T3MA+bJmy4ZKfQRMh6
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+sqosa.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/CD15E914F9465C64
http://kkd47eh4hdjshb5t.angortra.at/CD15E914F9465C64
http://ytrest84y5i456hghadefdsd.pontogrot.com/CD15E914F9465C64
http://xlowfznrg4wf7dli.ONION/CD15E914F9465C64
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (416) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 1956 cmd.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+sqosa.png aewytlotjaxa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+sqosa.txt aewytlotjaxa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+sqosa.png aewytlotjaxa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+sqosa.txt aewytlotjaxa.exe -
Executes dropped EXE 2 IoCs
pid Process 1656 aewytlotjaxa.exe 2880 aewytlotjaxa.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\muktljyqanux = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\aewytlotjaxa.exe\"" aewytlotjaxa.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2316 set thread context of 2876 2316 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 31 PID 1656 set thread context of 2880 1656 aewytlotjaxa.exe 35 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\Recovery+sqosa.png aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\glow.png aewytlotjaxa.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_videoinset.png aewytlotjaxa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\Recovery+sqosa.png aewytlotjaxa.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\Recovery+sqosa.txt aewytlotjaxa.exe File opened for modification C:\Program Files\Windows NT\TableTextService\ja-JP\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\correct.avi aewytlotjaxa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\drag.png aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Windows NT\TableTextService\es-ES\Recovery+sqosa.png aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Microsoft Games\Chess\es-ES\Recovery+sqosa.txt aewytlotjaxa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\Recovery+sqosa.png aewytlotjaxa.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d11\Recovery+sqosa.png aewytlotjaxa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Recovery+sqosa.png aewytlotjaxa.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\MahjongMCE.png aewytlotjaxa.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\Recovery+sqosa.png aewytlotjaxa.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\Recovery+sqosa.png aewytlotjaxa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\Recovery+sqosa.txt aewytlotjaxa.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\Recovery+sqosa.txt aewytlotjaxa.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\Recovery+sqosa.txt aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\en-US\Recovery+sqosa.png aewytlotjaxa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt aewytlotjaxa.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationLeft_ButtonGraphic.png aewytlotjaxa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\Recovery+sqosa.txt aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\Recovery+sqosa.txt aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\prev_down.png aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_leftarrow.png aewytlotjaxa.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\Recovery+sqosa.txt aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waxing-gibbous.png aewytlotjaxa.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\203x8subpicture.png aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\init.js aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\localizedStrings.js aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\Recovery+sqosa.txt aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-back-static.png aewytlotjaxa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\Recovery+sqosa.txt aewytlotjaxa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\Recovery+sqosa.png aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\Recovery+sqosa.png aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\Recovery+sqosa.txt aewytlotjaxa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\Recovery+sqosa.txt aewytlotjaxa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\Recovery+sqosa.txt aewytlotjaxa.exe File opened for modification C:\Program Files\Common Files\System\ado\Recovery+sqosa.html aewytlotjaxa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\Recovery+sqosa.png aewytlotjaxa.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\Recovery+sqosa.png aewytlotjaxa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\Recovery+sqosa.png aewytlotjaxa.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\aewytlotjaxa.exe 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe File opened for modification C:\Windows\aewytlotjaxa.exe 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aewytlotjaxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aewytlotjaxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d03e3912042edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000037dbd8bd71d6cc4c070d706fb705ee40c9dd1704387742fe38913f999fe45c6f000000000e80000000020000200000000a5b38a1d1b60bf2cb44f8a0135801de4807dc25b15b51d6351e8b8135c6493f200000006d0945864fe1b55205cf3e96fe6c61f6daef12f0406fc051c92b05de32781fb340000000a1d8fe5c8a8954b5f4261fdee8e8c7fc697c612574a583f5d9878894229686ade46a40ae0c904292c97b3c62f5a815454ef9d3e7b7e59e441fdfbf75aaa580c7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3DA2BD31-99F7-11EF-A914-FA59FB4FA467} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 aewytlotjaxa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 aewytlotjaxa.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2236 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe 2880 aewytlotjaxa.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 2876 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe Token: SeDebugPrivilege 2880 aewytlotjaxa.exe Token: SeIncreaseQuotaPrivilege 2344 WMIC.exe Token: SeSecurityPrivilege 2344 WMIC.exe Token: SeTakeOwnershipPrivilege 2344 WMIC.exe Token: SeLoadDriverPrivilege 2344 WMIC.exe Token: SeSystemProfilePrivilege 2344 WMIC.exe Token: SeSystemtimePrivilege 2344 WMIC.exe Token: SeProfSingleProcessPrivilege 2344 WMIC.exe Token: SeIncBasePriorityPrivilege 2344 WMIC.exe Token: SeCreatePagefilePrivilege 2344 WMIC.exe Token: SeBackupPrivilege 2344 WMIC.exe Token: SeRestorePrivilege 2344 WMIC.exe Token: SeShutdownPrivilege 2344 WMIC.exe Token: SeDebugPrivilege 2344 WMIC.exe Token: SeSystemEnvironmentPrivilege 2344 WMIC.exe Token: SeRemoteShutdownPrivilege 2344 WMIC.exe Token: SeUndockPrivilege 2344 WMIC.exe Token: SeManageVolumePrivilege 2344 WMIC.exe Token: 33 2344 WMIC.exe Token: 34 2344 WMIC.exe Token: 35 2344 WMIC.exe Token: SeIncreaseQuotaPrivilege 1232 WMIC.exe Token: SeSecurityPrivilege 1232 WMIC.exe Token: SeTakeOwnershipPrivilege 1232 WMIC.exe Token: SeLoadDriverPrivilege 1232 WMIC.exe Token: SeSystemProfilePrivilege 1232 WMIC.exe Token: SeSystemtimePrivilege 1232 WMIC.exe Token: SeProfSingleProcessPrivilege 1232 WMIC.exe Token: SeIncBasePriorityPrivilege 1232 WMIC.exe Token: SeCreatePagefilePrivilege 1232 WMIC.exe Token: SeBackupPrivilege 1232 WMIC.exe Token: SeRestorePrivilege 1232 WMIC.exe Token: SeShutdownPrivilege 1232 WMIC.exe Token: SeDebugPrivilege 1232 WMIC.exe Token: SeSystemEnvironmentPrivilege 1232 WMIC.exe Token: SeRemoteShutdownPrivilege 1232 WMIC.exe Token: SeUndockPrivilege 1232 WMIC.exe Token: SeManageVolumePrivilege 1232 WMIC.exe Token: 33 1232 WMIC.exe Token: 34 1232 WMIC.exe Token: 35 1232 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2248 iexplore.exe 2464 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE 2464 DllHost.exe 2464 DllHost.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2876 2316 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2876 2316 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2876 2316 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2876 2316 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2876 2316 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2876 2316 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2876 2316 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2876 2316 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2876 2316 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2876 2316 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2876 2316 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 31 PID 2876 wrote to memory of 1656 2876 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 32 PID 2876 wrote to memory of 1656 2876 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 32 PID 2876 wrote to memory of 1656 2876 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 32 PID 2876 wrote to memory of 1656 2876 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 32 PID 2876 wrote to memory of 1956 2876 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 33 PID 2876 wrote to memory of 1956 2876 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 33 PID 2876 wrote to memory of 1956 2876 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 33 PID 2876 wrote to memory of 1956 2876 8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe 33 PID 1656 wrote to memory of 2880 1656 aewytlotjaxa.exe 35 PID 1656 wrote to memory of 2880 1656 aewytlotjaxa.exe 35 PID 1656 wrote to memory of 2880 1656 aewytlotjaxa.exe 35 PID 1656 wrote to memory of 2880 1656 aewytlotjaxa.exe 35 PID 1656 wrote to memory of 2880 1656 aewytlotjaxa.exe 35 PID 1656 wrote to memory of 2880 1656 aewytlotjaxa.exe 35 PID 1656 wrote to memory of 2880 1656 aewytlotjaxa.exe 35 PID 1656 wrote to memory of 2880 1656 aewytlotjaxa.exe 35 PID 1656 wrote to memory of 2880 1656 aewytlotjaxa.exe 35 PID 1656 wrote to memory of 2880 1656 aewytlotjaxa.exe 35 PID 1656 wrote to memory of 2880 1656 aewytlotjaxa.exe 35 PID 2880 wrote to memory of 2344 2880 aewytlotjaxa.exe 36 PID 2880 wrote to memory of 2344 2880 aewytlotjaxa.exe 36 PID 2880 wrote to memory of 2344 2880 aewytlotjaxa.exe 36 PID 2880 wrote to memory of 2344 2880 aewytlotjaxa.exe 36 PID 2880 wrote to memory of 2236 2880 aewytlotjaxa.exe 41 PID 2880 wrote to memory of 2236 2880 aewytlotjaxa.exe 41 PID 2880 wrote to memory of 2236 2880 aewytlotjaxa.exe 41 PID 2880 wrote to memory of 2236 2880 aewytlotjaxa.exe 41 PID 2880 wrote to memory of 2248 2880 aewytlotjaxa.exe 42 PID 2880 wrote to memory of 2248 2880 aewytlotjaxa.exe 42 PID 2880 wrote to memory of 2248 2880 aewytlotjaxa.exe 42 PID 2880 wrote to memory of 2248 2880 aewytlotjaxa.exe 42 PID 2248 wrote to memory of 1604 2248 iexplore.exe 44 PID 2248 wrote to memory of 1604 2248 iexplore.exe 44 PID 2248 wrote to memory of 1604 2248 iexplore.exe 44 PID 2248 wrote to memory of 1604 2248 iexplore.exe 44 PID 2880 wrote to memory of 1232 2880 aewytlotjaxa.exe 45 PID 2880 wrote to memory of 1232 2880 aewytlotjaxa.exe 45 PID 2880 wrote to memory of 1232 2880 aewytlotjaxa.exe 45 PID 2880 wrote to memory of 1232 2880 aewytlotjaxa.exe 45 PID 2880 wrote to memory of 1736 2880 aewytlotjaxa.exe 48 PID 2880 wrote to memory of 1736 2880 aewytlotjaxa.exe 48 PID 2880 wrote to memory of 1736 2880 aewytlotjaxa.exe 48 PID 2880 wrote to memory of 1736 2880 aewytlotjaxa.exe 48 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System aewytlotjaxa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" aewytlotjaxa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c23e7c480280c24c6b34c9c9bafc05d_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\aewytlotjaxa.exeC:\Windows\aewytlotjaxa.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\aewytlotjaxa.exeC:\Windows\aewytlotjaxa.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2880 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT5⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2236
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1604
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\AEWYTL~1.EXE5⤵
- System Location Discovery: System Language Discovery
PID:1736
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\8C23E7~1.EXE3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1956
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2464
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
2File Deletion
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5ca7e2a11e21542a07690ce8cdc82146f
SHA1436eb51152798f8311789f8e977f33ab362965b4
SHA256f5fd6b5200497ce5c976d33a66cc82d785103f1a4cd050f370f0c4380a83fb16
SHA512c2106f9eb346e13ae1c833d1d3a10da4954378aa793dcdffb39b4ebe3277f18735dc6fe95ef1950dff64f106704787a61a11e719241261562d361d44ef578971
-
Filesize
63KB
MD5b99c4cb4440be85bb4686f46ab0a4804
SHA143f84d2dac5a9b2dbd062c374eb2d2e60fb825f5
SHA256de4500af64e7bd0ec58f98e6d0310e786f1a3dcc25e8cfb7f0e15d011b503628
SHA5126187279d544be78552a97ef65240eea19e2e04f1a9b3fc9dce9f80cfd75a5a0ebe5cff565e5b8634f0315a1f7eb3278ccf4aa07cbe1a72366077a966431e3d68
-
Filesize
1KB
MD510c800fbbff541a84729207adb2268ac
SHA1e9565b1e4829cb2dce353fb5d6d39d693f43fdf5
SHA256d265f4fa78a435c3151864b4d342ac54268220094992430a3ec0476ebb7bbf69
SHA512f7c619365485ff05f26e1a2505fd6847fa3056ff8141731f06c1487476595013688e287183e90df1d975828c95853a5b836d2d0b2d2f3c795777275d4160f000
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD5cc4c77e5b851ca67e0935a5d0df6d6ed
SHA1892018d28ac27ed57fe44042bc3f73db77147227
SHA25668800e727d3ed8a498f830f08f1ee39afad1578853995ea5c73826a0725d06e9
SHA5124eb96d2c2bc81501899b266add54ac78e31b7471984fe7ad0f1e6795abf175797e70f5f071c28afaefdde2a79dbd04c1c746d41b4b7252412141590cc26bf78c
-
Filesize
109KB
MD52289c961aafb713305706024a1b95433
SHA1fa0c8f4db3a020bc1aaa0fdd8fc2d6801d525196
SHA256f13dc64f470788e0f9f574c0b06407fee134e26f851b290e69f80bb4e3211e15
SHA51267abd3d356874aee0112a4a638571ae96a211acb8fe2a409969708a7497419db00006ca49feb0656970de044c0f7d6531257799e96b515897812fdd389c51aab
-
Filesize
173KB
MD581c5c8834ede1ace54de49756c877f79
SHA17926d6af828e74e082478fe439163a7a7425c2a9
SHA256226605bc17f1194a32090e83a790512d0e0f2d18139bdc497a011eab04e77ca6
SHA512c1ce0b664f79ec15839a56322c18385b65936acdc7c68b5d2b5f1c0edc5ab1ebe6341303717d5156a33cd35fd12098df838fb98958ceb85c1dfaa52907f2334e
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD50415725767744fe31f034ca9f8840abe
SHA1d7d816d4a237e2852f0b42f2e6cc24b19f087b02
SHA256073a32f25f518c486201d0e91a68f73e58c6e224c94392d72c8531ab3d2f9044
SHA51208b3a37cbd8740f575cde4e2a11c540e8c5045e5b01e9c90ca39b0597e7205afc075e60920fecfec8ce2378997f6d9e3c3f78b39753b40d13b0ef0ecea3cb9a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f053dc1f3a00bb50e4994d5ae4608d6d
SHA144f0a534f15213a8e24391cc5f613576ed265cee
SHA256c74495ddf1194092080d2fbdd05cbc74bd86833c66b085047606bb62e11c9bb9
SHA512df92193620467a765a3ebb99197b80e0e69ac73c1d29ea0111ca8a637ec55b13d8a7791c1030a01a8a0a46f17412c4fc112c96d1f345d7ef6f43fbbc021e866b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a4418fc8cf66f2484fecf250ffd923b
SHA1815b38fab00833835a22d1f087e1ea3a5a9fbffc
SHA25691a0ce926980a058c6e59f1cf573e17c1ccbba5f2b45bc05304360b8a1ca5050
SHA5123c5e85e5b06d4833e1f50d9a1cb3a8da2c27d0a853f6f03d5f58c33963e9c057c3d4536f322be8c023b22fc66368e54926b6402a2ba49b33b0e73201e8604ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585890cdb65340da0830dca56e68845eb
SHA1152d9a36d235346076b300d603074565329f5c35
SHA256bdf1e4050739d63a54ad2c6d4cc3f62795b103deb0bca2fd27b2634bc427ba0c
SHA51288a79a3e631384824e5efc95509e4c39dee0272adf48577c4ef5b72937c88675be41f98fbe8f23f27bce16852d0c7b5e522031da33e36a77f7e2da83b4b4ecb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564d77440b3e95623b86960a2685867b8
SHA1336c573f0122ee6761f0a6c34e24d051e526eaa7
SHA256a382607a407efca32fe70766ac0cc806e49bee6dbc695de495816aa44e0aa3aa
SHA5123f14f6d819a5a9744c0243ed90cf1978bc7a3cc5acad1eb8b6cbb405b395fd85b0ed340906c3e1c60d9d05abb91bf3768f643b9d716403907eb148cfbed96ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5088072dc8d883c938d5cbbd802a97b57
SHA1e28b7ef264fce9177d0f7270a32165314b8131f1
SHA2561f7e370247a869f50309cab615b778c342a3088fbdbc833585bd71cf84e4585d
SHA51278a77791b36e32bb43f2e154357ca55ac038429d623baa2221e9a85255b8159cccc5028e184635da06a24d9cf96a573e2996cd7224d896da2e2451868b61e56b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5023e48d231e70701c813ed0b3791cacf
SHA198b2afc6470036821571cdaf338c4026500f0704
SHA2563dab9d821347bd931665f8168ced66b19311f8e49514a53c398218cfb53e0fe4
SHA5121672fccfd3570fc6f918dcf4401d9b5adc820c3a0c41860b48523709bb73e4618ed611c55ad9e71ab90489400fa37f11bb05d618dbd3204db9009514194fa195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59487344a3cee16033b3c89232436a3d5
SHA1342ef894edc8824d249e468034a0cc267845ea91
SHA256fd67478487c53daff1b00dcac74715d9736bdc35a4574b4c8e9a8aad0ffdd03d
SHA5122919c989a547b23407cbf65d9352097f88ccddf3dd38946544b3809b1e702dc7c6cf29351402cc18bf00376ac8915122d1fae1d48bebc3734d016a542c988bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556cc363288e382f8f53d591d94c4a82a
SHA13e3361bdfef0985c7ebad78e45384a7174437a4a
SHA2563be9e68c34a0b795649e83c2f5a992c6b90e0c5f7dd00092744657ebe3eacd6a
SHA512f58d0599844c5e71257074ca4e3df0e4a7f7ceb377b3b5b457359676ecd6ec6d5bbe08d5c6769d7c5a8ed264550b7cc7a7a35477b4b16982fbb82b688967fb2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aeaf35b13754e4709172b17c4abb66f
SHA126b2fc78d2effff8b63d20fa02d2b29d0951cf93
SHA256908ac61a811df11753d8123589745f687794440dde886c3f05a31e9d65f7ef90
SHA512c00c4422c6bb33cc2ba958879b24165776b4d2ff02e4f46961ea60b88ec8b757e399627d38be03042527c7b1cd2a2d0c0d459658b6e950122084886f537bc377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de9c2a037e379c1a0325b7a0a369b44b
SHA1b15c345353b4cbcc1d04facb45f52275214189d6
SHA25638d2a54f1f16b368d4dcd834fff858451ef414a01cf108baca02f49cf2d2f722
SHA512466ccd65e775f9b6990fe23ae7183772577070a4e9385c42ee566a53dea799294489af7589df0af5be634d4821e3219cf5b280311e41b5d9f3b7182c30e06281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a97db9477726f1489e11cb1dbf522a7e
SHA1b550a4018d937fecd2cbd45b7328b999dfbfaa91
SHA256373de0aa95967491ed17c6a0bf0354236a6bd85ae551a454b996c10d0afd8465
SHA512e30b8d0bc8d49e44173d994429c566340984588aba604910a2ab6ab4d5f8f88803776900c14f1778b1e473c4d298060646704679fb548b1ac72bc9dc292016c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b90159ee04fa22666a8df719533f1e3
SHA18f05288756580641abf4f0bd10619f3c902885cd
SHA256468bb8072f683f5ab7655bf2cea832689b351b41cbdbe022f2552d7596a69bf6
SHA5123721e12cfbc40c64f598e2bfe6dfcd0593ccccfbccc36c1a6776e94cf2370542d74782025c526bf659ce158d272f0b5d0d384906c913115609a60f6b2cd56fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52cb5c617a496ec67802fac394ca5b94a
SHA143c0108e0086a84770e1b328757df9d5dd8fe79b
SHA256c6160dda7810450a6aa353ec626fd04f234e7d7ccb3dfdb674ec69a070b61fa5
SHA5128328110e84e036b0d79a3904688697c7c583128d805dee63dbe037c1948e33e92ce3111faab4db204338749c45871547d1264c2cc4c2581a83044c1637a10087
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
396KB
MD58c23e7c480280c24c6b34c9c9bafc05d
SHA1de75bf5f2115fb3399d2c94966218f91dd9c2362
SHA256d898a79292edb0059156844e559cf65ab68819786b1d344dec42993851751740
SHA51204a631fbd1a3aca23956e316716375a77328471025f8391971aa33315ad8245419231f3b9b95229b1999c24c240ae97436ba9fcc3216d1a5b63ff75de9e9edf5