Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 14:18
Static task
static1
Behavioral task
behavioral1
Sample
a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe
-
Size
276KB
-
MD5
a265dc8eadb3cd340233953eaaf4c15c
-
SHA1
c67a84227d4d85565ab8127f711b2610b014e27b
-
SHA256
32b673822967ed3f38c8a8f63a21398b6e04a3c3af299ee7d5c03b971015f107
-
SHA512
2d2fd12cd7e521df87ea47902b7a266cf440385edf02ad1610ec2457384fb2dce41014fdf2347252a9d7667102916ab8a173c36eb4da869e6eb2150c00fd06a4
-
SSDEEP
6144:i4EoMNAWiA9LBShpOGmt3CImh7dRZQ/f+WNZN0ivkcMM:i1ASx0hpuJmhh/Q/2WN/2nM
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+yqdyp.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F4F26F6A4B341D10
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/F4F26F6A4B341D10
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/F4F26F6A4B341D10
http://xlowfznrg4wf7dli.ONION/F4F26F6A4B341D10
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (436) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2824 cmd.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+yqdyp.png qdshfuorfory.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+yqdyp.txt qdshfuorfory.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+yqdyp.png qdshfuorfory.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+yqdyp.txt qdshfuorfory.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe -
Executes dropped EXE 2 IoCs
pid Process 2192 qdshfuorfory.exe 2696 qdshfuorfory.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\tljyqan = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\qdshfuorfory.exe" qdshfuorfory.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2372 set thread context of 2368 2372 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 31 PID 2192 set thread context of 2696 2192 qdshfuorfory.exe 35 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\de.pak qdshfuorfory.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_ReCoVeRy_+yqdyp.txt qdshfuorfory.exe File opened for modification C:\Program Files\Java\jre7\lib\amd64\_ReCoVeRy_+yqdyp.png qdshfuorfory.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\_ReCoVeRy_+yqdyp.png qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rss_headline_glow_floating.png qdshfuorfory.exe File opened for modification C:\Program Files\Google\Chrome\Application\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\_ReCoVeRy_+yqdyp.txt qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\logger\_ReCoVeRy_+yqdyp.png qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\_ReCoVeRy_+yqdyp.png qdshfuorfory.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\_ReCoVeRy_+yqdyp.png qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_ReCoVeRy_+yqdyp.txt qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_left_pressed.png qdshfuorfory.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\_ReCoVeRy_+yqdyp.txt qdshfuorfory.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\_ReCoVeRy_+yqdyp.png qdshfuorfory.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\_ReCoVeRy_+yqdyp.txt qdshfuorfory.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\it-IT\_ReCoVeRy_+yqdyp.png qdshfuorfory.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_ReCoVeRy_+yqdyp.png qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\settings.css qdshfuorfory.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationLeft_SelectionSubpicture.png qdshfuorfory.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\Passport_PAL.wmv qdshfuorfory.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\_ReCoVeRy_+yqdyp.txt qdshfuorfory.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_ReCoVeRy_+yqdyp.txt qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waning-crescent.png qdshfuorfory.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passport.png qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_disabled.png qdshfuorfory.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\softedges.png qdshfuorfory.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\_ReCoVeRy_+yqdyp.txt qdshfuorfory.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\_ReCoVeRy_+yqdyp.txt qdshfuorfory.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\_ReCoVeRy_+yqdyp.png qdshfuorfory.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt qdshfuorfory.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt qdshfuorfory.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Scene_loop.wmv qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\es-ES\_ReCoVeRy_+yqdyp.png qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\square_m.png qdshfuorfory.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_ReCoVeRy_+yqdyp.png qdshfuorfory.exe File opened for modification C:\Program Files\Microsoft Games\Chess\it-IT\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\_ReCoVeRy_+yqdyp.png qdshfuorfory.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg qdshfuorfory.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Notes_loop.wmv qdshfuorfory.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\_ReCoVeRy_+yqdyp.png qdshfuorfory.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\settings.css qdshfuorfory.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\_ReCoVeRy_+yqdyp.txt qdshfuorfory.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\_ReCoVeRy_+yqdyp.txt qdshfuorfory.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\btn-previous-static.png qdshfuorfory.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\_ReCoVeRy_+yqdyp.html qdshfuorfory.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\qdshfuorfory.exe a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe File opened for modification C:\Windows\qdshfuorfory.exe a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qdshfuorfory.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qdshfuorfory.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b960000000002000000000010660000000100002000000092a80a95feb30b0a08a4780eebed753b522f343a1a1afbf4e074ac8c27da00cf000000000e8000000002000020000000b0966bd21c665c6cf720bc3c691d64422747c49881eef697cb4ef25829e034d920000000cc51a1048553ab15a4e4583adf932f9029b3a57e84cc263a70339e425d49402240000000dd7bb7c0ea8decf35275d63d0881c754b94da91978833381e850300f5d1ae30ee3801bc3b8ba31d53ab1ae55beab541c39489f2a175235045ea852104bd14b10 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508518640e40db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F951E51-AC01-11EF-81BC-F2088C279AF6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2052 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe 2696 qdshfuorfory.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2368 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe Token: SeDebugPrivilege 2696 qdshfuorfory.exe Token: SeIncreaseQuotaPrivilege 2108 WMIC.exe Token: SeSecurityPrivilege 2108 WMIC.exe Token: SeTakeOwnershipPrivilege 2108 WMIC.exe Token: SeLoadDriverPrivilege 2108 WMIC.exe Token: SeSystemProfilePrivilege 2108 WMIC.exe Token: SeSystemtimePrivilege 2108 WMIC.exe Token: SeProfSingleProcessPrivilege 2108 WMIC.exe Token: SeIncBasePriorityPrivilege 2108 WMIC.exe Token: SeCreatePagefilePrivilege 2108 WMIC.exe Token: SeBackupPrivilege 2108 WMIC.exe Token: SeRestorePrivilege 2108 WMIC.exe Token: SeShutdownPrivilege 2108 WMIC.exe Token: SeDebugPrivilege 2108 WMIC.exe Token: SeSystemEnvironmentPrivilege 2108 WMIC.exe Token: SeRemoteShutdownPrivilege 2108 WMIC.exe Token: SeUndockPrivilege 2108 WMIC.exe Token: SeManageVolumePrivilege 2108 WMIC.exe Token: 33 2108 WMIC.exe Token: 34 2108 WMIC.exe Token: 35 2108 WMIC.exe Token: SeIncreaseQuotaPrivilege 2108 WMIC.exe Token: SeSecurityPrivilege 2108 WMIC.exe Token: SeTakeOwnershipPrivilege 2108 WMIC.exe Token: SeLoadDriverPrivilege 2108 WMIC.exe Token: SeSystemProfilePrivilege 2108 WMIC.exe Token: SeSystemtimePrivilege 2108 WMIC.exe Token: SeProfSingleProcessPrivilege 2108 WMIC.exe Token: SeIncBasePriorityPrivilege 2108 WMIC.exe Token: SeCreatePagefilePrivilege 2108 WMIC.exe Token: SeBackupPrivilege 2108 WMIC.exe Token: SeRestorePrivilege 2108 WMIC.exe Token: SeShutdownPrivilege 2108 WMIC.exe Token: SeDebugPrivilege 2108 WMIC.exe Token: SeSystemEnvironmentPrivilege 2108 WMIC.exe Token: SeRemoteShutdownPrivilege 2108 WMIC.exe Token: SeUndockPrivilege 2108 WMIC.exe Token: SeManageVolumePrivilege 2108 WMIC.exe Token: 33 2108 WMIC.exe Token: 34 2108 WMIC.exe Token: 35 2108 WMIC.exe Token: SeBackupPrivilege 3064 vssvc.exe Token: SeRestorePrivilege 3064 vssvc.exe Token: SeAuditPrivilege 3064 vssvc.exe Token: SeIncreaseQuotaPrivilege 2492 WMIC.exe Token: SeSecurityPrivilege 2492 WMIC.exe Token: SeTakeOwnershipPrivilege 2492 WMIC.exe Token: SeLoadDriverPrivilege 2492 WMIC.exe Token: SeSystemProfilePrivilege 2492 WMIC.exe Token: SeSystemtimePrivilege 2492 WMIC.exe Token: SeProfSingleProcessPrivilege 2492 WMIC.exe Token: SeIncBasePriorityPrivilege 2492 WMIC.exe Token: SeCreatePagefilePrivilege 2492 WMIC.exe Token: SeBackupPrivilege 2492 WMIC.exe Token: SeRestorePrivilege 2492 WMIC.exe Token: SeShutdownPrivilege 2492 WMIC.exe Token: SeDebugPrivilege 2492 WMIC.exe Token: SeSystemEnvironmentPrivilege 2492 WMIC.exe Token: SeRemoteShutdownPrivilege 2492 WMIC.exe Token: SeUndockPrivilege 2492 WMIC.exe Token: SeManageVolumePrivilege 2492 WMIC.exe Token: 33 2492 WMIC.exe Token: 34 2492 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2980 iexplore.exe 968 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 968 DllHost.exe 968 DllHost.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2368 2372 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2368 2372 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2368 2372 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2368 2372 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2368 2372 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2368 2372 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2368 2372 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2368 2372 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2368 2372 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2368 2372 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2368 2372 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 31 PID 2368 wrote to memory of 2192 2368 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 32 PID 2368 wrote to memory of 2192 2368 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 32 PID 2368 wrote to memory of 2192 2368 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 32 PID 2368 wrote to memory of 2192 2368 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 32 PID 2368 wrote to memory of 2824 2368 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 33 PID 2368 wrote to memory of 2824 2368 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 33 PID 2368 wrote to memory of 2824 2368 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 33 PID 2368 wrote to memory of 2824 2368 a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe 33 PID 2192 wrote to memory of 2696 2192 qdshfuorfory.exe 35 PID 2192 wrote to memory of 2696 2192 qdshfuorfory.exe 35 PID 2192 wrote to memory of 2696 2192 qdshfuorfory.exe 35 PID 2192 wrote to memory of 2696 2192 qdshfuorfory.exe 35 PID 2192 wrote to memory of 2696 2192 qdshfuorfory.exe 35 PID 2192 wrote to memory of 2696 2192 qdshfuorfory.exe 35 PID 2192 wrote to memory of 2696 2192 qdshfuorfory.exe 35 PID 2192 wrote to memory of 2696 2192 qdshfuorfory.exe 35 PID 2192 wrote to memory of 2696 2192 qdshfuorfory.exe 35 PID 2192 wrote to memory of 2696 2192 qdshfuorfory.exe 35 PID 2192 wrote to memory of 2696 2192 qdshfuorfory.exe 35 PID 2696 wrote to memory of 2108 2696 qdshfuorfory.exe 36 PID 2696 wrote to memory of 2108 2696 qdshfuorfory.exe 36 PID 2696 wrote to memory of 2108 2696 qdshfuorfory.exe 36 PID 2696 wrote to memory of 2108 2696 qdshfuorfory.exe 36 PID 2696 wrote to memory of 2052 2696 qdshfuorfory.exe 44 PID 2696 wrote to memory of 2052 2696 qdshfuorfory.exe 44 PID 2696 wrote to memory of 2052 2696 qdshfuorfory.exe 44 PID 2696 wrote to memory of 2052 2696 qdshfuorfory.exe 44 PID 2696 wrote to memory of 2980 2696 qdshfuorfory.exe 45 PID 2696 wrote to memory of 2980 2696 qdshfuorfory.exe 45 PID 2696 wrote to memory of 2980 2696 qdshfuorfory.exe 45 PID 2696 wrote to memory of 2980 2696 qdshfuorfory.exe 45 PID 2980 wrote to memory of 1700 2980 iexplore.exe 47 PID 2980 wrote to memory of 1700 2980 iexplore.exe 47 PID 2980 wrote to memory of 1700 2980 iexplore.exe 47 PID 2980 wrote to memory of 1700 2980 iexplore.exe 47 PID 2696 wrote to memory of 2492 2696 qdshfuorfory.exe 48 PID 2696 wrote to memory of 2492 2696 qdshfuorfory.exe 48 PID 2696 wrote to memory of 2492 2696 qdshfuorfory.exe 48 PID 2696 wrote to memory of 2492 2696 qdshfuorfory.exe 48 PID 2696 wrote to memory of 2452 2696 qdshfuorfory.exe 51 PID 2696 wrote to memory of 2452 2696 qdshfuorfory.exe 51 PID 2696 wrote to memory of 2452 2696 qdshfuorfory.exe 51 PID 2696 wrote to memory of 2452 2696 qdshfuorfory.exe 51 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System qdshfuorfory.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" qdshfuorfory.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a265dc8eadb3cd340233953eaaf4c15c_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\qdshfuorfory.exeC:\Windows\qdshfuorfory.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\qdshfuorfory.exeC:\Windows\qdshfuorfory.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2696 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT5⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2052
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1700
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\QDSHFU~1.EXE5⤵
- System Location Discovery: System Language Discovery
PID:2452
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\A265DC~1.EXE3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2824
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:968
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD53cbb9853a0396b160709be8e00d303c2
SHA1bc58d875d4dec5b576c9523cee438f1c115fd235
SHA256e3ef6a424c4b3ed033b7f5b22c3f97238cfd33c55741cbc66403bf2efa337996
SHA5125a837117228f6caab32570b8ab7683b4541512e4b99f88a4572e6f41abeab18e7ae78749748f3b5eba9d0e69ebe3051b6b2ddbc8a4aba55094a509a007bc1b48
-
Filesize
65KB
MD567ca7546be40448abd4776d5b7c69feb
SHA1ee7ecb4e37e7fbc811ac7829054a1bdc9ab49b39
SHA256808ac8deca2514792d101d20cdc68c716882b4296fd1d84e9e54317ea85a98cc
SHA51270fd8712a11337c921c2b34a93b5dd051381bc1436b176dd4b76bfe51d0a414f2cd3283a68f37e981ddedecda011245232c29aa8b0c91b9c6d337a1a52fd77f7
-
Filesize
1KB
MD57b3dd3689def96a0db947b3eb3b4a9d4
SHA1531c096f239009e249d39ea29d8a4f0d99205d2b
SHA2567780543ec68f3508f74d70ae9853b2aed2bc872b96011f7c8dd31a8a70a98dab
SHA5128b7eb123b701fc48e37286a2a246ccb8e009a648d419892b1e3725840795e63c273de65366a590639e3aeec10ca78ac8b726b5f4e73faabc8b5ca34bd11c4be7
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD541eea5305c53f26b44a6c23d0f107c3d
SHA143bc7a8081aed88bf484bc3168fa4719be9a31c7
SHA25640fd139a2b29aa9d4473c5a95b3f890874b5a81bea6bbdf1a39bf41b267b4ea3
SHA5128a45432eef08db4b2677bfd2bdd982ba275b6880ea4ae855ea9847641677a97e63a048123d5e6b6f85fb46e0fb61197d3edad66658b42af290c6bd4375adff11
-
Filesize
109KB
MD5ea0a8dda48556ad6210fd54d4de3b456
SHA1e9514d36a125e340051e0c724ad0da27f2e9174b
SHA256274c5aa678fca7262e613fab430d806ec0e4715be30e2c9b4cb0bfd3e6446852
SHA512992f793003d3265803d77c64c41a111fe9264e828628291447b6c46065e5369cd8c581d501087f2edebcbded1be04e47bbb8fc334110acc916224ccdad84a166
-
Filesize
173KB
MD5c34bbb0406d30f2c9e1322ed6a2046c0
SHA1c6e14ac14a618fbc0dc774d9f86795c1f139da7b
SHA256b65d4c3a55ca243825cb347c3a572b30fa8c8bba2932638e80b6b811a51c5b04
SHA5122e5745e8eee81aa4c5b34d867210ccb346517e02343d8fd28f0aca1421c6cedcc8778aa8c8687f3328b401830aef2f5da20845ab2655cbbbbc5eca7bded79fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c914bc14d95d8e73c964238bd8fda8f3
SHA1d6c90795da9d0c358d9b7041d0f3395f3427407d
SHA256860accad59206b33cb90f9e6579ed692df435900d9ea977009955531378af4a8
SHA512dfc1b386d4c37924d51f071619f5d3acf963490e6d9686eb93724e0f16bee4a088ead444a6d8415e8d079ca01543e152e3e1dea99aac942e6afe15cb961170e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bcaa1d32a7c016bef53b16c8c8fa8ed
SHA1a97436b6aee55b23484ffee1962b6bded8389243
SHA2568a8f0f9708f894046f4b4580357a9212bbd3e410c8c9bdb22eaa42cbe3b5dc0d
SHA512e5d1d3e7cd5a7f9b45e1ad3740a8249d2553ebd3f4a4ed5531e9573b3d9ec8279f2a7279f95a13be40a2652225638996ca71777fa44d4de223832f3deff9e0f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576dff85d45b6ffd5b87dd8764b41a97c
SHA1759d085a9f2f1b906fb773271047336ba92cadcf
SHA25645bdbac24fdbebe91349624f58bfc54515fbebff0658556e8c517cdd44f8f152
SHA512a8b0480159e589f6b5363e13ca751e4467cd9f002b00e0927b45efb1c26b56b05fe987671ffe4e8a1a387127abefe7f01d37517a59cb90d21da4c225c63ebce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52119857474f746131c475f98fd7e9cc4
SHA17c0a4eabb81b7d2fbdd1da9ee13f05dae278de19
SHA256730e6e249232ca615d3e4b147a55a24e773093f65f92fb94eb062e8103fc9dce
SHA512a873a66664fc59efaf2df4cfeef991890f8d93fa30ca4e8b2370210da4d798931a9fee5c26e21bcf53fa3b4fdad87a86cb9efe1a0c7ebdbb4226038845c71e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f4bc584c5b830e0590cc2bb0c9b132
SHA106223d05e7a42ebd58187952c47899f4da86390e
SHA256e569b70dfaa987e4c0ed921700eef900bae91c789034047ff2d791a97009151a
SHA5120a837165d0d9b98d45a62f52582d00d1c80213c23b9cbb5dfddb7477ebca10ba150856d7b12db750f5502af7f455bf78584cf3fcbe71cd6c8e49adc798dd915b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2d36b2bdea8a1e9025afbcd95799748
SHA119920a50205d898e4c2d8546d03a2253aa1fefce
SHA2564d7a89772297a645c20fcd8ad6dfa09ae71ee30b9128098b92e46a56b240e03b
SHA5126d0c5df1d812e590c45e05cad2d7103773bc1d427698fe06d4f4c1f9cafc4c4eac70463518568082699eb37a84da90fbce8270f6927abe4f5887b3c58187d358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c98b066dc11feebfe1fb87da43f554b6
SHA1612fa052516441baba2e9a34bcb28c40d8e10be2
SHA256c54c5db5f1745e8718667ae4b9dc5c5b4f0ad7c8d1ffdd237ffb1f7992ad1245
SHA5122b68a2ca24357c4e1a2210ea7cf49150d208f23263bcda36400737557a01264cdc215c9a5c77d31d563f96f7062277f49d590de34c461dc3779089ccf5a85449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b94db20a8d41e0e692afa294383e8d6
SHA16f16340a1259db6007501e8a0cc75706165ff491
SHA2562b5f98619be77e9c0668d2d7a3fc0a46d155d2e5910499514600c46c9ca1d303
SHA512f574dd368c4c705b4e208d0c501730127a10ea65ad155ea64a8aa38bba2bad5e42c06382d48719776c4214c9d95e27bc6e16ad729efaf0a3b1b696e673b13b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52187adca11114b88dd2cdda16e8f44
SHA1d9803682017e75660343fbe0b5ce5b7b0c8e075e
SHA256cc19118cb2eea6d14009aacb2d398c22821b50d4a494d5bf56412c299af721ae
SHA512c9c431806318457ddcf0f31a9a4101e7740ef1776661688ea485f89a1632012e98d7e1069c739cc8354424cdab4f9569b3f75c7afc723f938644503b8503357b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
276KB
MD5a265dc8eadb3cd340233953eaaf4c15c
SHA1c67a84227d4d85565ab8127f711b2610b014e27b
SHA25632b673822967ed3f38c8a8f63a21398b6e04a3c3af299ee7d5c03b971015f107
SHA5122d2fd12cd7e521df87ea47902b7a266cf440385edf02ad1610ec2457384fb2dce41014fdf2347252a9d7667102916ab8a173c36eb4da869e6eb2150c00fd06a4