Analysis
-
max time kernel
124s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe
-
Size
396KB
-
MD5
bac15e06496f8415d683121eb39361ff
-
SHA1
88bbf0e8c6ee97f35225a103a60e81d63472c8e1
-
SHA256
f2da7c18ba3e8ebc4b25bad6bc500aaa7a1afdd3921284d17865771576edca01
-
SHA512
850d1a4d0b3eef6569eeddc95b4c5cb1a6671427724e7b7ed268e3bc23c0375f87c41d059bd27b67581c9c3452703298243bd3537dedbe146cc10a2bd46a58bb
-
SSDEEP
12288:kVaauWatLv/kjWaesK3YSYJmlzFZ3IHmMr:k03DkjtLS5hVq
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+dklkh.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/E8DB42D0BC778F40
http://kkd47eh4hdjshb5t.angortra.at/E8DB42D0BC778F40
http://ytrest84y5i456hghadefdsd.pontogrot.com/E8DB42D0BC778F40
http://xlowfznrg4wf7dli.ONION/E8DB42D0BC778F40
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (418) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 1220 cmd.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+dklkh.png bhdepmifygxi.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+dklkh.png bhdepmifygxi.exe -
Executes dropped EXE 2 IoCs
pid Process 2056 bhdepmifygxi.exe 2908 bhdepmifygxi.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\gishtjtucrlk = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\bhdepmifygxi.exe\"" bhdepmifygxi.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2848 set thread context of 2684 2848 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 31 PID 2056 set thread context of 2908 2056 bhdepmifygxi.exe 35 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\flyout.css bhdepmifygxi.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\Recovery+dklkh.png bhdepmifygxi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceSimplifiedQuanPin.txt bhdepmifygxi.exe File opened for modification C:\Program Files\Windows NT\TableTextService\de-DE\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\Recovery+dklkh.png bhdepmifygxi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-border.png bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\Recovery+dklkh.png bhdepmifygxi.exe File opened for modification C:\Program Files\Windows Mail\en-US\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\es.pak bhdepmifygxi.exe File opened for modification C:\Program Files\Microsoft Games\More Games\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\icon.png bhdepmifygxi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\Recovery+dklkh.png bhdepmifygxi.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kab\LC_MESSAGES\Recovery+dklkh.png bhdepmifygxi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\weather.css bhdepmifygxi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-backglow.png bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\service.js bhdepmifygxi.exe File opened for modification C:\Program Files\Microsoft Games\Chess\fr-FR\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\Recovery+dklkh.png bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\Recovery+dklkh.png bhdepmifygxi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\Recovery+dklkh.png bhdepmifygxi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047x576black.png bhdepmifygxi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationLeft_ButtonGraphic.png bhdepmifygxi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\Recovery+dklkh.png bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Program Files\Common Files\System\ado\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\reflect.png bhdepmifygxi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\settings.css bhdepmifygxi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\colorcycle.png bhdepmifygxi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\huemainsubpicture2.png bhdepmifygxi.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\16_9-frame-highlight.png bhdepmifygxi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\applet\Recovery+dklkh.png bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\Recovery+dklkh.png bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\reader\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\1047x576black.png bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\Recovery+dklkh.png bhdepmifygxi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\Recovery+dklkh.png bhdepmifygxi.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\it-IT\Recovery+dklkh.png bhdepmifygxi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\(120DPI)redStateIcon.png bhdepmifygxi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Program Files\DVD Maker\it-IT\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\Recovery+dklkh.html bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\Recovery+dklkh.txt bhdepmifygxi.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\buttons.png bhdepmifygxi.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceSimplifiedShuangPin.txt bhdepmifygxi.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\bhdepmifygxi.exe bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe File opened for modification C:\Windows\bhdepmifygxi.exe bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhdepmifygxi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhdepmifygxi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf000000000200000000001066000000010000200000004726505bd255700addf50b18f04316bcbbb3d8ff1a586bb63a45a60ae622b066000000000e800000000200002000000015ad6ad5e38eb71076afb057fa8b76f98e89757590bbea8dd524698e3ccc8fc29000000057386fd0394b3a7947cb6ab883dfbd681b5386557694010746dd8be2445553232ab272dbdf67cf97f4f98445e850651faa138f46b212eae62eb1615eb72dfd5e13e7a6fd74bcf8c58383e7c12f864f270ede0aa1b75354c9b21056c4a079cc127add1c8a672dd93c576cf9fbffe262114d1028a88999705529447aaaff284a93102ed58a3bece144194d1061e53653d540000000a55499b6f4850e0943a3c20707b9b149f0d4778072425be64211c12117202daa4c08571fbf429a8f08e917f651e925640e6908b923f580d378b735045fed4249 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf00000000020000000000106600000001000020000000f10d5c4e871e81e8344e90fadbdcfaa11ae708f6b6a7130435b198304725d3dc000000000e8000000002000020000000ceeef3eac2b6bb1f6a5d3d16d0b0504d3ce09b6ad4446bf43b52db9f99667f2c200000002e6ec89c4c827989dfb1a408ce0ebc02e81d3c1d8b8bcbc95e5de2ae3929587a40000000a492e62538215e452996b9e96b0c5d705d3b16d2041fa6b3759ef81c52359350657d6c73a3ebfff1984bdd7ce264acf580af10a24911e03de354619089a5d07d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D01F0521-B107-11EF-831A-D2CEB2690DEF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5064a2a41445db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 bhdepmifygxi.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 bhdepmifygxi.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1816 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe 2908 bhdepmifygxi.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 2684 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe Token: SeDebugPrivilege 2908 bhdepmifygxi.exe Token: SeIncreaseQuotaPrivilege 2716 WMIC.exe Token: SeSecurityPrivilege 2716 WMIC.exe Token: SeTakeOwnershipPrivilege 2716 WMIC.exe Token: SeLoadDriverPrivilege 2716 WMIC.exe Token: SeSystemProfilePrivilege 2716 WMIC.exe Token: SeSystemtimePrivilege 2716 WMIC.exe Token: SeProfSingleProcessPrivilege 2716 WMIC.exe Token: SeIncBasePriorityPrivilege 2716 WMIC.exe Token: SeCreatePagefilePrivilege 2716 WMIC.exe Token: SeBackupPrivilege 2716 WMIC.exe Token: SeRestorePrivilege 2716 WMIC.exe Token: SeShutdownPrivilege 2716 WMIC.exe Token: SeDebugPrivilege 2716 WMIC.exe Token: SeSystemEnvironmentPrivilege 2716 WMIC.exe Token: SeRemoteShutdownPrivilege 2716 WMIC.exe Token: SeUndockPrivilege 2716 WMIC.exe Token: SeManageVolumePrivilege 2716 WMIC.exe Token: 33 2716 WMIC.exe Token: 34 2716 WMIC.exe Token: 35 2716 WMIC.exe Token: SeIncreaseQuotaPrivilege 908 WMIC.exe Token: SeSecurityPrivilege 908 WMIC.exe Token: SeTakeOwnershipPrivilege 908 WMIC.exe Token: SeLoadDriverPrivilege 908 WMIC.exe Token: SeSystemProfilePrivilege 908 WMIC.exe Token: SeSystemtimePrivilege 908 WMIC.exe Token: SeProfSingleProcessPrivilege 908 WMIC.exe Token: SeIncBasePriorityPrivilege 908 WMIC.exe Token: SeCreatePagefilePrivilege 908 WMIC.exe Token: SeBackupPrivilege 908 WMIC.exe Token: SeRestorePrivilege 908 WMIC.exe Token: SeShutdownPrivilege 908 WMIC.exe Token: SeDebugPrivilege 908 WMIC.exe Token: SeSystemEnvironmentPrivilege 908 WMIC.exe Token: SeRemoteShutdownPrivilege 908 WMIC.exe Token: SeUndockPrivilege 908 WMIC.exe Token: SeManageVolumePrivilege 908 WMIC.exe Token: 33 908 WMIC.exe Token: 34 908 WMIC.exe Token: 35 908 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1916 iexplore.exe 1984 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE 1984 DllHost.exe 1984 DllHost.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2684 2848 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2684 2848 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2684 2848 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2684 2848 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2684 2848 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2684 2848 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2684 2848 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2684 2848 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2684 2848 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2684 2848 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2684 2848 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2056 2684 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 32 PID 2684 wrote to memory of 2056 2684 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 32 PID 2684 wrote to memory of 2056 2684 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 32 PID 2684 wrote to memory of 2056 2684 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 32 PID 2684 wrote to memory of 1220 2684 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 33 PID 2684 wrote to memory of 1220 2684 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 33 PID 2684 wrote to memory of 1220 2684 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 33 PID 2684 wrote to memory of 1220 2684 bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe 33 PID 2056 wrote to memory of 2908 2056 bhdepmifygxi.exe 35 PID 2056 wrote to memory of 2908 2056 bhdepmifygxi.exe 35 PID 2056 wrote to memory of 2908 2056 bhdepmifygxi.exe 35 PID 2056 wrote to memory of 2908 2056 bhdepmifygxi.exe 35 PID 2056 wrote to memory of 2908 2056 bhdepmifygxi.exe 35 PID 2056 wrote to memory of 2908 2056 bhdepmifygxi.exe 35 PID 2056 wrote to memory of 2908 2056 bhdepmifygxi.exe 35 PID 2056 wrote to memory of 2908 2056 bhdepmifygxi.exe 35 PID 2056 wrote to memory of 2908 2056 bhdepmifygxi.exe 35 PID 2056 wrote to memory of 2908 2056 bhdepmifygxi.exe 35 PID 2056 wrote to memory of 2908 2056 bhdepmifygxi.exe 35 PID 2908 wrote to memory of 2716 2908 bhdepmifygxi.exe 36 PID 2908 wrote to memory of 2716 2908 bhdepmifygxi.exe 36 PID 2908 wrote to memory of 2716 2908 bhdepmifygxi.exe 36 PID 2908 wrote to memory of 2716 2908 bhdepmifygxi.exe 36 PID 2908 wrote to memory of 1816 2908 bhdepmifygxi.exe 41 PID 2908 wrote to memory of 1816 2908 bhdepmifygxi.exe 41 PID 2908 wrote to memory of 1816 2908 bhdepmifygxi.exe 41 PID 2908 wrote to memory of 1816 2908 bhdepmifygxi.exe 41 PID 2908 wrote to memory of 1916 2908 bhdepmifygxi.exe 42 PID 2908 wrote to memory of 1916 2908 bhdepmifygxi.exe 42 PID 2908 wrote to memory of 1916 2908 bhdepmifygxi.exe 42 PID 2908 wrote to memory of 1916 2908 bhdepmifygxi.exe 42 PID 1916 wrote to memory of 1224 1916 iexplore.exe 44 PID 1916 wrote to memory of 1224 1916 iexplore.exe 44 PID 1916 wrote to memory of 1224 1916 iexplore.exe 44 PID 1916 wrote to memory of 1224 1916 iexplore.exe 44 PID 2908 wrote to memory of 908 2908 bhdepmifygxi.exe 45 PID 2908 wrote to memory of 908 2908 bhdepmifygxi.exe 45 PID 2908 wrote to memory of 908 2908 bhdepmifygxi.exe 45 PID 2908 wrote to memory of 908 2908 bhdepmifygxi.exe 45 PID 2908 wrote to memory of 2372 2908 bhdepmifygxi.exe 48 PID 2908 wrote to memory of 2372 2908 bhdepmifygxi.exe 48 PID 2908 wrote to memory of 2372 2908 bhdepmifygxi.exe 48 PID 2908 wrote to memory of 2372 2908 bhdepmifygxi.exe 48 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bhdepmifygxi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" bhdepmifygxi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\bhdepmifygxi.exeC:\Windows\bhdepmifygxi.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\bhdepmifygxi.exeC:\Windows\bhdepmifygxi.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2908 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT5⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:1816
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1224
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\BHDEPM~1.EXE5⤵
- System Location Discovery: System Language Discovery
PID:2372
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\BAC15E~1.EXE3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1220
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1984
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
2File Deletion
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD58a4faf06a8b4104c2182537b598cedb8
SHA11feda78260280d6d010531a806c56843ae8bc559
SHA2561e96f387d475c49c229ec80a48a85f8dc98c85162dd1c219485e04e6fda093b9
SHA5122ddb04edf8ab47a5ea354c1529781f6a8a59b3e2b5fc8ff37cd6c1809f3257150a8199dcb8b0d8b322506e94b33403fd0b16f3b5aff6286fcde3e377fb267ef2
-
Filesize
63KB
MD5a652a38a30b906117ecaabe6694aabcd
SHA1580fb1c7d775f5e460589a24e2affa0274f6cd16
SHA256f31f37aeab98c72cc6e1595bf97c31a80128e30ff0b2aef6370b9a977545ca8e
SHA5120028b8bf9a407568d229093f96c9fe4bba86ffa67994779978f95727f82cde42cfac8a680c9e105edec108e0aa3b73d0e47780c545d0b097bc4f393e8c4ea7c7
-
Filesize
1KB
MD5aa64b3ef934185196d98f01fee2d6ea3
SHA1f4cdc5ce5de03c3c3df5b23719f04133e7635e47
SHA256fe929bc404d8c3fcd9ccd43d8df747b4f1bdae78eee1610b1ed4b90f71e46764
SHA512891417bdb4a972057c8faf89a8d6a916344d32a7c9dd78220c5bc492f3216b9c9d2b0867836e5875909101f8c0d5c6594948c017f3ad318422f7fffa3da15a7b
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD59532e8bfd312d9dc115ec40aedc3a874
SHA1b69fecc3e7f0ae1bed4b4dda166a923bf7e74ccc
SHA25668bf0f4dd4dd9bbd3cee58af0d3e2815a23b35328c65a5afc9c6bd6af6531c6f
SHA51247960baf11f20b9c04735c7b444a9eb13a070d85d0065f8e1be6ec27bde6c1eead98f12f0af5a54aab4886222a16f515a28a75ea5ffe57c03b894cc470196f6e
-
Filesize
109KB
MD5dc94305f97b5fe6d7698ebffd429ed23
SHA1c0f98890285ff3df8b97ecac29469631450474a4
SHA256959942b80874a06d70cb626b44fcdeabcd776812d73271d0e7f63552d2481301
SHA512c840c7f47c0cd51e30ab2628b73817e60b67c8af38bf3dfad2189198961fa3c46e81a856a29a8d324d0fc5d0da26404cfc7f17832ed9b5dc4ec127f3dd158c6c
-
Filesize
173KB
MD52f3c75f0957979b986b929b10294de49
SHA1cc8ea3a32a6cf003bbfd356a0d0048583ba5d3d7
SHA256f8ce350c4336adafee6ea69fca2cd6536cf360e04f32e051424c1308b62f8c0a
SHA512d5ade2e6deaf2632c751364ecdae37eaaf377337cdad472594431d9bb32cfa78073764cb452ddcd4ff84e5c386f81aabf7bd4aaae3fe44ed81e516d220e7c93c
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5afb6b230a7d3f2456b9eba2b697dfb31
SHA102f42e352b789ba1d7add227bb4729e97583180e
SHA256382f8b9becc98f675b83d44454763e95b6b83aafec5d92c5cced6c41dd09dc6f
SHA512fb2c3967705a7ab04b6684f07101c7fc015c82b2b2dd56e59c9e6dea9a16d6187b7c37e1d361d77c46b444ba6bec9296d273a1ccdab0d149afe8fbf12d2bb6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5de7dc4f5c10f74df0f3f507c25083d
SHA1cbfe077012fc365e9dcb736d6144b8a59a5bdf96
SHA256196f45a15ad566f0e908be7846c317ab9e934273e5286d85a28c3633994fe4aa
SHA5121e5c736e1adc9074777fb9123affa3a3eb2f54fb1df0dfe7bd16940f894f2be65592d074d1ea8c1f99fb249dbe06e800a7b92d16553012a5cefc7ae9c7287a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5696859e38c40bcaed86f5b67ec0881e2
SHA1be92658faa799dfd93952568083a78471518f266
SHA256b8eb4e58e7651a28ae2ea20193e286398b92a14abee04e2f606415351e3adc38
SHA512ee27d1094c361ac115e0ed361f0a485d13061f6ea543b8438b5eda6d4db7597d6d7cfa83a2adf45a626005d0943604e793466eb921aa11f7215a56106d140f14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05186a58bec2855cb158d2c5e2475d1
SHA19fa6b45a7f133d81f1c9ad4aa51297de497c3f77
SHA256c4f9ca46cb875aa0bdd858ec232a0e27773948dc8059f3d1787761011b720c82
SHA5124356569593edfe517e5fa0d7c7f0ffd010b26ff2c830f9e81b82cda56c833dec4f3c65f69940b0eac5138fef2f30122531ba5ced63a83b795819e0c4ba51b945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5909360d3f09748050f67922c8db39383
SHA14aeeb2c968cd6c4f8c973b903c2eefd124b677a4
SHA256d5590ba9bbf46b08a03e28a38025d556740fab8ebce9265c588f849ba7d5d4c0
SHA512910331e2b0ecc4b25ac06eb4faf12c54df971529012186cd5d6349a78eabfffea450dfe15aebbd7001cfbf31677aecc4b0a42b4fe1813bccb87f0bc6ff4d5175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1161a931503b883bffccf4a91580b2e
SHA13810288a815edd8c0643a90d40554789f93d5f81
SHA256a4bfc06fa6128ed6ec18f4a5ef71f78348419bc11fcd1fd4476cba206078ba4d
SHA5122625dc0b54c6a7ed4450ef9facb4e6b21cd8d84968b05d72a14996e64a95599953f4920cb43707a82159e11c6a68ca96168ca54e1f3eb164054babccf3a468b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccde6beaf0ebcbc212dfa8bdec4edf9b
SHA166701e1a5864b38bee04fe62f5b3e4219fb7558b
SHA2561a6f1c181702fec385c0c826c9a2da97ec6763ed8edde5171cfc6e418342e099
SHA512dfe7142a176e4985aa61404704a98e1d7a322ce162766fb56b9fd8c92af39cc5ac1891cb70a97fea9975f60175408ebb9d86709c4697ab7e7b1422c37d05cb1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b76fac3842dc4f5bcae252cb118febf8
SHA160c014904c0991c9c08a4a8afe8e5d6717f1e98c
SHA2568d6856a6c0dc81a14c153a1dca8d9ad89cd7d937d5fb076779add2963a76e613
SHA512d8bf36f69a414008d3499ccc0652805f886b073fd70732e2cc757d2844389ff00a9a99a406ddde0eca2b9b2b0bb9d0eea25db3dbc390249fea45512ca71a08dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5735ed6c22239f3f55b2986a5e3207f79
SHA1029b81c871bdcd4fe5145ce70ca4123e9df5d1d6
SHA256bdd9d91b1c5b61bc4e6866a55126a1d02ad0a04a1a3b52179351ef5f5245a92e
SHA51298e7be9a30d9386ffb96064e076b86325605f2ccea06c09712e5246d0886e1f264d3cdd3e9dae1d58b4afe07a6bcb7b47a0753abaf71ee4b2bf781594b25d8d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5046ca39ab4ba894373fc11a30e348ff6
SHA1de007ad27210b2cac635ccd5c09338392b8135d8
SHA2564201e74cf82a7c666b90cb897089f84228b270d8e2c6c9a684a9e7e4c0221bdb
SHA5126aeb49be34a4408cdcfae7021c14d2e49aa9bd88071d9643cb2a4e9b929b0ca32f4d5a23b56d096a9afa280a21d47d875b717828212f7cd68f0da97f88126c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc47334e35841ea399a28260d7a6fb8b
SHA16aeea9ac4e3e0c92def41f7c0b03aed8657edeec
SHA2568ad035d76ed85f825d4953dba0c9cd2270931599b02be5549d43bb4fd5b789ea
SHA512008fc4fd57a7054159e93e79b680a3af87db42c1a7c84cc24de64d49e8c5cc651aa1b35e73cb6464b0e068357431904078c26e943102764bad7156d11eb8f1fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5081fa497a791c896b5428d45ebe9a32b
SHA193152ac2ba0030f9382be6403d85ceb429b4c7f5
SHA256808c06953330eaf0b4c026c560c78b60fe0f3798c0a154bf0f09af0edfcabde3
SHA51250ad2f65bcf17090f92717df06a3153885904118453b2bef55a1977e1aac7a0ebc0ad4e9ab48ba8a8568ebe6dfde76a9474beeeefa31dfad846977f77f9c051a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
396KB
MD5bac15e06496f8415d683121eb39361ff
SHA188bbf0e8c6ee97f35225a103a60e81d63472c8e1
SHA256f2da7c18ba3e8ebc4b25bad6bc500aaa7a1afdd3921284d17865771576edca01
SHA512850d1a4d0b3eef6569eeddc95b4c5cb1a6671427724e7b7ed268e3bc23c0375f87c41d059bd27b67581c9c3452703298243bd3537dedbe146cc10a2bd46a58bb