Analysis
-
max time kernel
124s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe
-
Size
360KB
-
MD5
d3d85f14ecf91860db6d7e8bd7d48430
-
SHA1
faf1f9843c253b06b9dfabf7a9e5d365e60094ca
-
SHA256
ee5c846448eddad058793075600dc9926997b62a3a8d56432a6c059e9b1363fc
-
SHA512
16796001fd2fe9001c5d5eb8b077907a9d2bd975de7162c78da3e688c7588532268b18b220e60674c59890a3d4e55cbbbadda08d7ded0c19025be9c2ca6b5448
-
SSDEEP
6144:oDDhiP9TRiDh3pVFEy46iYxtLgVbYYwGaUMMJZmzAlxoYmEk5eyL/YsZQf6lMenT:uk19iDhZV2yWYxtLg+Y4MJZRGf5J7Ysf
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+iivxa.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/C075EB98242BB3FE
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/C075EB98242BB3FE
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/C075EB98242BB3FE
http://xlowfznrg4wf7dli.ONION/C075EB98242BB3FE
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (407) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2860 cmd.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+iivxa.txt mtymfuqxbooj.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+iivxa.html mtymfuqxbooj.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECoVERY_+iivxa.txt mtymfuqxbooj.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECoVERY_+iivxa.html mtymfuqxbooj.exe -
Executes dropped EXE 2 IoCs
pid Process 2916 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\gidopqwdrtei = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\mtymfuqxbooj.exe\"" mtymfuqxbooj.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1372 set thread context of 2220 1372 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 31 PID 2916 set thread context of 1856 2916 mtymfuqxbooj.exe 35 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_RECoVERY_+iivxa.html mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_RECoVERY_+iivxa.txt mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\slideShow.js mtymfuqxbooj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\huemainsubpicture2.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\en-US\_RECoVERY_+iivxa.html mtymfuqxbooj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\_RECoVERY_+iivxa.html mtymfuqxbooj.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\sk.pak mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_RECoVERY_+iivxa.html mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_RECoVERY_+iivxa.html mtymfuqxbooj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-previous-static.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_RECoVERY_+iivxa.txt mtymfuqxbooj.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_RECoVERY_+iivxa.html mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Media Player\Skins\_RECoVERY_+iivxa.html mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\combo-hover-right.png mtymfuqxbooj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\performance.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\dialdot.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\33.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_RECoVERY_+iivxa.txt mtymfuqxbooj.exe File opened for modification C:\Program Files\Microsoft Games\Chess\es-ES\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows NT\TableTextService\_RECoVERY_+iivxa.txt mtymfuqxbooj.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt mtymfuqxbooj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\_RECoVERY_+iivxa.txt mtymfuqxbooj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\blackbars60.png mtymfuqxbooj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Trans_Scene_PAL.wmv mtymfuqxbooj.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\_RECoVERY_+iivxa.html mtymfuqxbooj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\44.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\_RECoVERY_+iivxa.txt mtymfuqxbooj.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_RECoVERY_+iivxa.html mtymfuqxbooj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_RECoVERY_+iivxa.txt mtymfuqxbooj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\DVD Maker\es-ES\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_Buttongraphic.png mtymfuqxbooj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToNotesBackground.wmv mtymfuqxbooj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_RECoVERY_+iivxa.html mtymfuqxbooj.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\MahjongMCE.png mtymfuqxbooj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\_RECoVERY_+iivxa.txt mtymfuqxbooj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationLeft_ButtonGraphic.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\_RECoVERY_+iivxa.html mtymfuqxbooj.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\_RECoVERY_+iivxa.html mtymfuqxbooj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\_RECoVERY_+iivxa.txt mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\7.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\localizedStrings.js mtymfuqxbooj.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt mtymfuqxbooj.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_RECoVERY_+iivxa.html mtymfuqxbooj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_RECoVERY_+iivxa.txt mtymfuqxbooj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\_RECoVERY_+iivxa.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\_RECoVERY_+iivxa.html mtymfuqxbooj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg mtymfuqxbooj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\16_9-frame-background.png mtymfuqxbooj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\library.js mtymfuqxbooj.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\mtymfuqxbooj.exe d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe File opened for modification C:\Windows\mtymfuqxbooj.exe d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mtymfuqxbooj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mtymfuqxbooj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf000000000200000000001066000000010000200000002d348102422cd138181dff3aeeee57e2361d14f7aea322230d1b8311a74538cd000000000e8000000002000020000000fc0386e1c90a2533ed9a04d6880fe0530f4a1315610dd0d66b2c34a188ce60a8200000007ca918882ad33154c20b812e867741169a50d67f338f8132ba74c92241e39d99400000005a069e1b0ef8faab293aff84125a89cee86253d79caefc69a8383a647d196cc98ae3fd661a8b9482bbf8e1e408fd2994f7a5d43af07cf5abcb0571c5feea12d4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{18B627D1-B4E8-11EF-8B45-D6274BF0F910} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307f39edf448db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2752 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe 1856 mtymfuqxbooj.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2220 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe Token: SeDebugPrivilege 1856 mtymfuqxbooj.exe Token: SeIncreaseQuotaPrivilege 1564 WMIC.exe Token: SeSecurityPrivilege 1564 WMIC.exe Token: SeTakeOwnershipPrivilege 1564 WMIC.exe Token: SeLoadDriverPrivilege 1564 WMIC.exe Token: SeSystemProfilePrivilege 1564 WMIC.exe Token: SeSystemtimePrivilege 1564 WMIC.exe Token: SeProfSingleProcessPrivilege 1564 WMIC.exe Token: SeIncBasePriorityPrivilege 1564 WMIC.exe Token: SeCreatePagefilePrivilege 1564 WMIC.exe Token: SeBackupPrivilege 1564 WMIC.exe Token: SeRestorePrivilege 1564 WMIC.exe Token: SeShutdownPrivilege 1564 WMIC.exe Token: SeDebugPrivilege 1564 WMIC.exe Token: SeSystemEnvironmentPrivilege 1564 WMIC.exe Token: SeRemoteShutdownPrivilege 1564 WMIC.exe Token: SeUndockPrivilege 1564 WMIC.exe Token: SeManageVolumePrivilege 1564 WMIC.exe Token: 33 1564 WMIC.exe Token: 34 1564 WMIC.exe Token: 35 1564 WMIC.exe Token: SeIncreaseQuotaPrivilege 1564 WMIC.exe Token: SeSecurityPrivilege 1564 WMIC.exe Token: SeTakeOwnershipPrivilege 1564 WMIC.exe Token: SeLoadDriverPrivilege 1564 WMIC.exe Token: SeSystemProfilePrivilege 1564 WMIC.exe Token: SeSystemtimePrivilege 1564 WMIC.exe Token: SeProfSingleProcessPrivilege 1564 WMIC.exe Token: SeIncBasePriorityPrivilege 1564 WMIC.exe Token: SeCreatePagefilePrivilege 1564 WMIC.exe Token: SeBackupPrivilege 1564 WMIC.exe Token: SeRestorePrivilege 1564 WMIC.exe Token: SeShutdownPrivilege 1564 WMIC.exe Token: SeDebugPrivilege 1564 WMIC.exe Token: SeSystemEnvironmentPrivilege 1564 WMIC.exe Token: SeRemoteShutdownPrivilege 1564 WMIC.exe Token: SeUndockPrivilege 1564 WMIC.exe Token: SeManageVolumePrivilege 1564 WMIC.exe Token: 33 1564 WMIC.exe Token: 34 1564 WMIC.exe Token: 35 1564 WMIC.exe Token: SeBackupPrivilege 2512 vssvc.exe Token: SeRestorePrivilege 2512 vssvc.exe Token: SeAuditPrivilege 2512 vssvc.exe Token: SeIncreaseQuotaPrivilege 1448 WMIC.exe Token: SeSecurityPrivilege 1448 WMIC.exe Token: SeTakeOwnershipPrivilege 1448 WMIC.exe Token: SeLoadDriverPrivilege 1448 WMIC.exe Token: SeSystemProfilePrivilege 1448 WMIC.exe Token: SeSystemtimePrivilege 1448 WMIC.exe Token: SeProfSingleProcessPrivilege 1448 WMIC.exe Token: SeIncBasePriorityPrivilege 1448 WMIC.exe Token: SeCreatePagefilePrivilege 1448 WMIC.exe Token: SeBackupPrivilege 1448 WMIC.exe Token: SeRestorePrivilege 1448 WMIC.exe Token: SeShutdownPrivilege 1448 WMIC.exe Token: SeDebugPrivilege 1448 WMIC.exe Token: SeSystemEnvironmentPrivilege 1448 WMIC.exe Token: SeRemoteShutdownPrivilege 1448 WMIC.exe Token: SeUndockPrivilege 1448 WMIC.exe Token: SeManageVolumePrivilege 1448 WMIC.exe Token: 33 1448 WMIC.exe Token: 34 1448 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2816 iexplore.exe 2948 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2816 iexplore.exe 2816 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 2948 DllHost.exe 2948 DllHost.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1372 wrote to memory of 2220 1372 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 31 PID 1372 wrote to memory of 2220 1372 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 31 PID 1372 wrote to memory of 2220 1372 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 31 PID 1372 wrote to memory of 2220 1372 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 31 PID 1372 wrote to memory of 2220 1372 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 31 PID 1372 wrote to memory of 2220 1372 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 31 PID 1372 wrote to memory of 2220 1372 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 31 PID 1372 wrote to memory of 2220 1372 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 31 PID 1372 wrote to memory of 2220 1372 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 31 PID 1372 wrote to memory of 2220 1372 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 31 PID 2220 wrote to memory of 2916 2220 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2916 2220 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2916 2220 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2916 2220 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2860 2220 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 33 PID 2220 wrote to memory of 2860 2220 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 33 PID 2220 wrote to memory of 2860 2220 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 33 PID 2220 wrote to memory of 2860 2220 d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe 33 PID 2916 wrote to memory of 1856 2916 mtymfuqxbooj.exe 35 PID 2916 wrote to memory of 1856 2916 mtymfuqxbooj.exe 35 PID 2916 wrote to memory of 1856 2916 mtymfuqxbooj.exe 35 PID 2916 wrote to memory of 1856 2916 mtymfuqxbooj.exe 35 PID 2916 wrote to memory of 1856 2916 mtymfuqxbooj.exe 35 PID 2916 wrote to memory of 1856 2916 mtymfuqxbooj.exe 35 PID 2916 wrote to memory of 1856 2916 mtymfuqxbooj.exe 35 PID 2916 wrote to memory of 1856 2916 mtymfuqxbooj.exe 35 PID 2916 wrote to memory of 1856 2916 mtymfuqxbooj.exe 35 PID 2916 wrote to memory of 1856 2916 mtymfuqxbooj.exe 35 PID 1856 wrote to memory of 1564 1856 mtymfuqxbooj.exe 36 PID 1856 wrote to memory of 1564 1856 mtymfuqxbooj.exe 36 PID 1856 wrote to memory of 1564 1856 mtymfuqxbooj.exe 36 PID 1856 wrote to memory of 1564 1856 mtymfuqxbooj.exe 36 PID 1856 wrote to memory of 2752 1856 mtymfuqxbooj.exe 43 PID 1856 wrote to memory of 2752 1856 mtymfuqxbooj.exe 43 PID 1856 wrote to memory of 2752 1856 mtymfuqxbooj.exe 43 PID 1856 wrote to memory of 2752 1856 mtymfuqxbooj.exe 43 PID 1856 wrote to memory of 2816 1856 mtymfuqxbooj.exe 44 PID 1856 wrote to memory of 2816 1856 mtymfuqxbooj.exe 44 PID 1856 wrote to memory of 2816 1856 mtymfuqxbooj.exe 44 PID 1856 wrote to memory of 2816 1856 mtymfuqxbooj.exe 44 PID 2816 wrote to memory of 1612 2816 iexplore.exe 46 PID 2816 wrote to memory of 1612 2816 iexplore.exe 46 PID 2816 wrote to memory of 1612 2816 iexplore.exe 46 PID 2816 wrote to memory of 1612 2816 iexplore.exe 46 PID 1856 wrote to memory of 1448 1856 mtymfuqxbooj.exe 47 PID 1856 wrote to memory of 1448 1856 mtymfuqxbooj.exe 47 PID 1856 wrote to memory of 1448 1856 mtymfuqxbooj.exe 47 PID 1856 wrote to memory of 1448 1856 mtymfuqxbooj.exe 47 PID 1856 wrote to memory of 2588 1856 mtymfuqxbooj.exe 49 PID 1856 wrote to memory of 2588 1856 mtymfuqxbooj.exe 49 PID 1856 wrote to memory of 2588 1856 mtymfuqxbooj.exe 49 PID 1856 wrote to memory of 2588 1856 mtymfuqxbooj.exe 49 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System mtymfuqxbooj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" mtymfuqxbooj.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3d85f14ecf91860db6d7e8bd7d48430_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\mtymfuqxbooj.exeC:\Windows\mtymfuqxbooj.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\mtymfuqxbooj.exeC:\Windows\mtymfuqxbooj.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1856 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT5⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2752
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\MTYMFU~1.EXE5⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\D3D85F~1.EXE3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2948
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5697e1a4bc6175b180d5f4017cdcd15c0
SHA1b125f6e5c1c5c221165213ab0a9bbbc6aa28003c
SHA256c1b8856f89845bf7bc1f4c835baeb645de9b5f0c5916c0949797731dc948e9d8
SHA512a1230b0063a359fcbffe24a6e59ee923bf9e6837aa562b31f9cc7af83359d2429fa7deff7a7ea26005a3926c902bde8a104867d90c4e4cef772b512532b1feb6
-
Filesize
64KB
MD5dfdf6f9f06f8422825c6eb7869634090
SHA1001398a542e983ff2319d9c45df4d28695c736f2
SHA2569afe40c9ab8dc19d8833cc3f101372dc5aa85275463e5d9cd68dc5db5a862243
SHA512de6a0ade9a6cc9af031ebfce13b2633253cf1e2f8f13db37766cc69809e664f1239595bd23d8bebd8ceb2031550cb07789986152b27be8f84bde2db1fd5b820e
-
Filesize
1KB
MD526a8572dd98594b4a215144514568362
SHA149187eb1e88d36bf5781e367a348c7177323924f
SHA256f18fcb19d3e06f0e168f6ceb8ea91a5d137d0df88935db981a611d74496c66c7
SHA51287317b57635128f33933d8aabd17a67cc8746a058a670cd8984c494f4acb04c682dca5b0aaafac9d5df9ef5383d6a7efecb3013473fa1bb4e0b21dfc70fb4a4c
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD5b3125e0b09e831734a30e44b1fa0d681
SHA145a65ce6fe5d0970433a581372d4c1161497f8e2
SHA25669044a4ac42bff6626a0f571f1e2de36a60c4c7c017c7c9dbe0f0a5f8c6fc616
SHA512cf3f01d54a01e0d5a07608b25e9af4380b6a65954621b3c3882f9b444fb9f29caddb70789efdde11049aeda0c029f0ef74bdbeb1c39379689f10baa7629d8aa4
-
Filesize
109KB
MD500b800e63f0e12aedc0d21dc38b6a537
SHA1104ccc646b51a98ed6dc9e23023bfcacad83f181
SHA256203f9114ff4d10453041752b99193eb667862dd50c9e799a37a387b4d4d008c2
SHA51275bfb892930b02b1c65f8232e93ca5fbf7e0170f82c4aecf66ed4ccfd4c96048ccd593898bf443e568c0081ada50dbead2d5e2093fa445d597e26e5909ca29b3
-
Filesize
173KB
MD51fcd5bb1b2993dab456b88287fc17dfe
SHA1d159c5fffe1f2fd0bb68cde098e268c68a3afd8e
SHA25666bed46e77f8632559c7502f942a25cf69fd65df04db086d482eb2c8abca67dc
SHA512857675f4425c076f63bf60e0d73150dfd665161a0209b6b9c8c2493bfef6c68305780cf2cd08c76cac02890d56d0be53e0c36aefdd2c477d3f7c21122df3de9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2f239ce8830b9b30862466fb0704c46
SHA1d71886d4975da2e72c5489bf93deb7cf4fda78c9
SHA2569cf2466b216d744c1d997f73ffc15053d074867a8f31b981366bb71cc11c2749
SHA512669ce633d0ae1cd8917c8b617abf2560800fdf337ccf2377da01fe56c355072d0b72ff0007e91b91d95463bdb0b450e93183ab8e05a6e9d38ef2f63f76f98471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568e6f521ee44700da9fd17e22e25e67f
SHA166c8ee04aa49302f6852a8e2cd2499cdd5fb2780
SHA256efdca459e1eee26ea5873a9f0cd2127262c75e2ac08533ad36c9ed782cca4ad1
SHA51299b1f850c2c8a7361cbe57c99b174713941b0745eba0fbcc159b8d79c947fab937a55cab70c1391b7ad3947adb7d34c5f8a185f20afa23082a3d92dc705a2627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb97cd9262d367eb745e2b25aa2f3695
SHA10f8367a90a5806f5c4d92349d85a708f735ee22a
SHA25619220f1a336859807d6a37b43787bcf727b2d1bfa4d5ef5473eb1afae3819c0d
SHA5123891709ef20eedb8a043d0f9fe5c948f7bda04abe8e881a8f0f60a0020babf95dcc5759c8a3b2df54dccecc70e5a25c6c10cfd1542eaddd0358a66302ce6ec2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cb4d33436cca523dd56bb8b38e32c7d
SHA10946622dfd2bdcb21812068560cddb8e7f337cb8
SHA256b4fc51a87c32a502e1a8787a2dece623b1e43db0d8ba0161a919c2d1fcc32f65
SHA5129136b70e8bc2cd98c3730762e95a241cfbd730c36e9b99cfffd5cfd6fad3d39d04371649fc797699108162f5b2db8de251560ceaa4fb4fe67116c64abcb0c835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a030e2d53c9eb6ebe9f827d1ae651781
SHA18ce6f6fbca1a7f3f930e1169772871093f22e373
SHA256dfc427aa0a90f2ab9f3fa2d539d5a5370700d9356782f0d9395c33518e1d9b75
SHA512ef83a89df83dba389f46a6ad48d53f9c509d5471ba3eeaf3ade812cf2ff40a0fcb19a69b7b3a1767bbdd5373e02df373456411420441a793c1ebdf9714a92ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc72361d2c81355eedf5089424ed88f6
SHA1fec58b5e27490f6c84ad39e814d2b5b0453c062f
SHA256f7526a2d9ce0261b37eed36201958dd92b2a2acd06add826e6335066311156dd
SHA51215ef755532b99a015e894199185606c6d96a7cc01c6c4564d04836b09d34fcdad28f120c706e15e2af7d85ae3e2c48b3d28631d486869c928c537ed7b77815d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5733c73c5b499f4fe4f713fd9e2aaa27c
SHA12700513cd595173d777e043c76f84ef6cfc9d737
SHA25608949ba12ae620a2ea363b8516eb5877cb3797f72996492e44f398c0894b4b9a
SHA5122535c22f79ff4aea708fceaf353c592a7e98170753b38071e0ea5b7a2d219b0f9456e71bb2821769c54afbd66073e7ea09f176380536d9c27748bdbd1507cdd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5810446a9e2c7ae0bd779c9dc82fdb7fd
SHA1e96dd1d2d093e81ffdfc161e657b1aba75ca4bf6
SHA256c33b20f9be7a1e7391eff1f19477c93dcbb6bde177b7620c9a39ec521ebcc9ea
SHA51228fcc7a943056af5eb29e5bad2a223a3c70994a1e386b10a188f9fa81af53ae4a1d59ff2bf3b86118f3020a19de34b0dd2aabaddeed9a42293b79244bdb74d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562810608173aff348727bd008fe6fec6
SHA1437ce7ec8c077c0155a5ecb309fe80f93b55f624
SHA25686213ef97b5e307a3eb33edc4ca25139575de5036c982a4cf92f2fab797ac872
SHA51211c45cf6cdc1e74d398c098bcc4198d45f187e46068ed908178ade2cd331deed06778667ee08f47905f9548acb5ca828958e87cf47304a044ad5c93c988fd9b3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
360KB
MD5d3d85f14ecf91860db6d7e8bd7d48430
SHA1faf1f9843c253b06b9dfabf7a9e5d365e60094ca
SHA256ee5c846448eddad058793075600dc9926997b62a3a8d56432a6c059e9b1363fc
SHA51216796001fd2fe9001c5d5eb8b077907a9d2bd975de7162c78da3e688c7588532268b18b220e60674c59890a3d4e55cbbbadda08d7ded0c19025be9c2ca6b5448