Analysis
-
max time kernel
124s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 06:59
Static task
static1
Behavioral task
behavioral1
Sample
dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe
-
Size
332KB
-
MD5
dd89fb3e83972795705e5b0edc08987f
-
SHA1
e315cce36b0494947c5d7b17b62dd38b24b159a6
-
SHA256
7b7fd96033bb7a8a932758c8f0f1729d800949c2583c03c8aa3d21089cd28a62
-
SHA512
1d9098f5e7f291ea7d2df3ad497bd7641c5920cbac5e99544a8b7d4b492e956ab051839fabf30bb5207913e7a1df76ec274e6887e47193c866398f2951be7583
-
SSDEEP
6144:VcMG0Cmis0NH8A3/1uz7uodnIm5KJHLqreJDckzrYk/:WMZas0NcAvAzyQnR5KJHWreJRrY
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+riqga.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/8E34F9C84429E11
http://tes543berda73i48fsdfsd.keratadze.at/8E34F9C84429E11
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/8E34F9C84429E11
http://xlowfznrg4wf7dli.ONION/8E34F9C84429E11
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (422) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2704 cmd.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECOVERY_+riqga.png tlgtwbeoxcmi.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECOVERY_+riqga.png tlgtwbeoxcmi.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe -
Executes dropped EXE 2 IoCs
pid Process 2772 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\cpfpagxsieww = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\tlgtwbeoxcmi.exe\"" tlgtwbeoxcmi.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2460 set thread context of 2416 2460 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 31 PID 2772 set thread context of 2620 2772 tlgtwbeoxcmi.exe 35 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationRight_SelectionSubpicture.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_RECOVERY_+riqga.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\vlc-48.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_search_over.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_SelectionSubpicture.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\16_9-frame-highlight.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\_RECOVERY_+riqga.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\_RECOVERY_+riqga.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_RECOVERY_+riqga.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\pause_down.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\15x15dot.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Java\jre7\lib\cmm\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\timeZones.js tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waxing-crescent_partly-cloudy.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-image-mask.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Internet Explorer\en-US\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca@valencia\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\1.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\settings.css tlgtwbeoxcmi.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_RECOVERY_+riqga.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Media Player\en-US\_RECOVERY_+riqga.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\base-undocked-4.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_MATTE_PAL.wmv tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\localizedStrings.js tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Common Files\System\de-DE\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\vintage.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_70.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Media Player\fr-FR\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\_RECOVERY_+riqga.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Mozilla Firefox\fonts\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\_RECOVERY_+riqga.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows NT\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\weather.css tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\es-ES\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_RECOVERY_+riqga.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_left_hover.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\_RECOVERY_+riqga.png tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Microsoft Games\Chess\fr-FR\_RECOVERY_+riqga.txt tlgtwbeoxcmi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_RECOVERY_+riqga.html tlgtwbeoxcmi.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\tlgtwbeoxcmi.exe dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe File opened for modification C:\Windows\tlgtwbeoxcmi.exe dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlgtwbeoxcmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlgtwbeoxcmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bca3a43e5483db4c9158d56be7ec949e00000000020000000000106600000001000020000000619e0a7032dfa8e9259dc25333c5ccf44d95f67a15ae8690cf9557d2506f33b6000000000e800000000200002000000085e097a179a2b1489fd2098dd8e2488e02d02ece6c486b4345474e400c01da8b20000000a4ad56c46408ecca98a2cfc99e4ff41488d87a105a7aa8423626b07a39ff1028400000006522c9efb359d82df319092dedbdc3ddec69bf11e7c83ae13bac1d772e2c887f5e08ecdb02ea193402f397dcdf4255f9c432590f3957d09e5b2fafa9e504a7fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66F65171-B6C5-11EF-8B78-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3002a73bd24adb01 iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2632 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe 2620 tlgtwbeoxcmi.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2416 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe Token: SeDebugPrivilege 2620 tlgtwbeoxcmi.exe Token: SeIncreaseQuotaPrivilege 2904 WMIC.exe Token: SeSecurityPrivilege 2904 WMIC.exe Token: SeTakeOwnershipPrivilege 2904 WMIC.exe Token: SeLoadDriverPrivilege 2904 WMIC.exe Token: SeSystemProfilePrivilege 2904 WMIC.exe Token: SeSystemtimePrivilege 2904 WMIC.exe Token: SeProfSingleProcessPrivilege 2904 WMIC.exe Token: SeIncBasePriorityPrivilege 2904 WMIC.exe Token: SeCreatePagefilePrivilege 2904 WMIC.exe Token: SeBackupPrivilege 2904 WMIC.exe Token: SeRestorePrivilege 2904 WMIC.exe Token: SeShutdownPrivilege 2904 WMIC.exe Token: SeDebugPrivilege 2904 WMIC.exe Token: SeSystemEnvironmentPrivilege 2904 WMIC.exe Token: SeRemoteShutdownPrivilege 2904 WMIC.exe Token: SeUndockPrivilege 2904 WMIC.exe Token: SeManageVolumePrivilege 2904 WMIC.exe Token: 33 2904 WMIC.exe Token: 34 2904 WMIC.exe Token: 35 2904 WMIC.exe Token: SeIncreaseQuotaPrivilege 2904 WMIC.exe Token: SeSecurityPrivilege 2904 WMIC.exe Token: SeTakeOwnershipPrivilege 2904 WMIC.exe Token: SeLoadDriverPrivilege 2904 WMIC.exe Token: SeSystemProfilePrivilege 2904 WMIC.exe Token: SeSystemtimePrivilege 2904 WMIC.exe Token: SeProfSingleProcessPrivilege 2904 WMIC.exe Token: SeIncBasePriorityPrivilege 2904 WMIC.exe Token: SeCreatePagefilePrivilege 2904 WMIC.exe Token: SeBackupPrivilege 2904 WMIC.exe Token: SeRestorePrivilege 2904 WMIC.exe Token: SeShutdownPrivilege 2904 WMIC.exe Token: SeDebugPrivilege 2904 WMIC.exe Token: SeSystemEnvironmentPrivilege 2904 WMIC.exe Token: SeRemoteShutdownPrivilege 2904 WMIC.exe Token: SeUndockPrivilege 2904 WMIC.exe Token: SeManageVolumePrivilege 2904 WMIC.exe Token: 33 2904 WMIC.exe Token: 34 2904 WMIC.exe Token: 35 2904 WMIC.exe Token: SeBackupPrivilege 1940 vssvc.exe Token: SeRestorePrivilege 1940 vssvc.exe Token: SeAuditPrivilege 1940 vssvc.exe Token: SeIncreaseQuotaPrivilege 2132 WMIC.exe Token: SeSecurityPrivilege 2132 WMIC.exe Token: SeTakeOwnershipPrivilege 2132 WMIC.exe Token: SeLoadDriverPrivilege 2132 WMIC.exe Token: SeSystemProfilePrivilege 2132 WMIC.exe Token: SeSystemtimePrivilege 2132 WMIC.exe Token: SeProfSingleProcessPrivilege 2132 WMIC.exe Token: SeIncBasePriorityPrivilege 2132 WMIC.exe Token: SeCreatePagefilePrivilege 2132 WMIC.exe Token: SeBackupPrivilege 2132 WMIC.exe Token: SeRestorePrivilege 2132 WMIC.exe Token: SeShutdownPrivilege 2132 WMIC.exe Token: SeDebugPrivilege 2132 WMIC.exe Token: SeSystemEnvironmentPrivilege 2132 WMIC.exe Token: SeRemoteShutdownPrivilege 2132 WMIC.exe Token: SeUndockPrivilege 2132 WMIC.exe Token: SeManageVolumePrivilege 2132 WMIC.exe Token: 33 2132 WMIC.exe Token: 34 2132 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1852 iexplore.exe 2108 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1852 iexplore.exe 1852 iexplore.exe 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2108 DllHost.exe 2108 DllHost.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2416 2460 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2416 2460 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2416 2460 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2416 2460 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2416 2460 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2416 2460 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2416 2460 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2416 2460 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2416 2460 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2416 2460 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 31 PID 2416 wrote to memory of 2772 2416 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 32 PID 2416 wrote to memory of 2772 2416 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 32 PID 2416 wrote to memory of 2772 2416 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 32 PID 2416 wrote to memory of 2772 2416 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 32 PID 2416 wrote to memory of 2704 2416 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 33 PID 2416 wrote to memory of 2704 2416 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 33 PID 2416 wrote to memory of 2704 2416 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 33 PID 2416 wrote to memory of 2704 2416 dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe 33 PID 2772 wrote to memory of 2620 2772 tlgtwbeoxcmi.exe 35 PID 2772 wrote to memory of 2620 2772 tlgtwbeoxcmi.exe 35 PID 2772 wrote to memory of 2620 2772 tlgtwbeoxcmi.exe 35 PID 2772 wrote to memory of 2620 2772 tlgtwbeoxcmi.exe 35 PID 2772 wrote to memory of 2620 2772 tlgtwbeoxcmi.exe 35 PID 2772 wrote to memory of 2620 2772 tlgtwbeoxcmi.exe 35 PID 2772 wrote to memory of 2620 2772 tlgtwbeoxcmi.exe 35 PID 2772 wrote to memory of 2620 2772 tlgtwbeoxcmi.exe 35 PID 2772 wrote to memory of 2620 2772 tlgtwbeoxcmi.exe 35 PID 2772 wrote to memory of 2620 2772 tlgtwbeoxcmi.exe 35 PID 2620 wrote to memory of 2904 2620 tlgtwbeoxcmi.exe 36 PID 2620 wrote to memory of 2904 2620 tlgtwbeoxcmi.exe 36 PID 2620 wrote to memory of 2904 2620 tlgtwbeoxcmi.exe 36 PID 2620 wrote to memory of 2904 2620 tlgtwbeoxcmi.exe 36 PID 2620 wrote to memory of 2632 2620 tlgtwbeoxcmi.exe 45 PID 2620 wrote to memory of 2632 2620 tlgtwbeoxcmi.exe 45 PID 2620 wrote to memory of 2632 2620 tlgtwbeoxcmi.exe 45 PID 2620 wrote to memory of 2632 2620 tlgtwbeoxcmi.exe 45 PID 2620 wrote to memory of 1852 2620 tlgtwbeoxcmi.exe 46 PID 2620 wrote to memory of 1852 2620 tlgtwbeoxcmi.exe 46 PID 2620 wrote to memory of 1852 2620 tlgtwbeoxcmi.exe 46 PID 2620 wrote to memory of 1852 2620 tlgtwbeoxcmi.exe 46 PID 1852 wrote to memory of 2952 1852 iexplore.exe 48 PID 1852 wrote to memory of 2952 1852 iexplore.exe 48 PID 1852 wrote to memory of 2952 1852 iexplore.exe 48 PID 1852 wrote to memory of 2952 1852 iexplore.exe 48 PID 2620 wrote to memory of 2132 2620 tlgtwbeoxcmi.exe 49 PID 2620 wrote to memory of 2132 2620 tlgtwbeoxcmi.exe 49 PID 2620 wrote to memory of 2132 2620 tlgtwbeoxcmi.exe 49 PID 2620 wrote to memory of 2132 2620 tlgtwbeoxcmi.exe 49 PID 2620 wrote to memory of 596 2620 tlgtwbeoxcmi.exe 51 PID 2620 wrote to memory of 596 2620 tlgtwbeoxcmi.exe 51 PID 2620 wrote to memory of 596 2620 tlgtwbeoxcmi.exe 51 PID 2620 wrote to memory of 596 2620 tlgtwbeoxcmi.exe 51 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System tlgtwbeoxcmi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" tlgtwbeoxcmi.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd89fb3e83972795705e5b0edc08987f_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\tlgtwbeoxcmi.exeC:\Windows\tlgtwbeoxcmi.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\tlgtwbeoxcmi.exeC:\Windows\tlgtwbeoxcmi.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2620 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT5⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2632
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1852 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2952
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\TLGTWB~1.EXE5⤵
- System Location Discovery: System Language Discovery
PID:596
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\DD89FB~1.EXE3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2108
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5dff60e2f6134e68a2df675539ff6fa02
SHA184a65787587a3fe6ec92c5894292057c4a9cb8c2
SHA256b3d10b02830b31bdf27e01aa4e023b4274c6b15885d382aa46f77d93f58d9f0b
SHA5124c5b34c6ef7c9cea9023bae4193c0dd8c5c197a3cdf1101aad2d5e513a60ff2860a0d254c52545059a0979ea119ce3fbdbe3ebf85c5f2574a326c68594b7a4db
-
Filesize
62KB
MD582a2e1be23351b5ad3cd798eed02d3f5
SHA1c76b79ae186fb1c721c48868d5817525f4f873ee
SHA25638184134998893489901074c48127ed05247613267d426d3836bee7c9d6ff4b0
SHA5120527767556fcc333af33fb528050dde71a89593d6203055c9c81569018176e5296a8d2b6c2639dcc2ae0dcdc9dd9a7b0f4fa83c35430e732b69e363e509d9c38
-
Filesize
1KB
MD51deb3de08db68a5bbf03d396ccc58b16
SHA110b6605171ffea95a2a05cb4e979cf93b5a245b1
SHA25687edd0dee97c23c01d9cc566fd3b63ccb8cec9ac6e08bf492ae76cdaa1a86a2a
SHA5123a76244b56ab33f4d43110304646363f11c15d6bacebf73ebc9e7941240907a2535b476c52314c64f92ea3f22014eacd817152ab2916cc65e1e951ffacfa4688
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD58881cfac86e3d3e944d62f02e2b9762d
SHA198367ad9a4bc30a286fc198b7410e98bee7d5f53
SHA256cd6657496d4935dcd02d6896e2fc33780390b2bda29e5f0e32813d49c23ab3a9
SHA5121c2a5e81a70680739f56e91a5d0bf93aeda9e2ad15f56a3ee426850d804f08faf17df624bc46d42cfe9918d59a0a50d95031d8f3745348ea8a2bc7948d097d4c
-
Filesize
109KB
MD59a5ad6dbe8e7b9ef2056180a28fd96f6
SHA1da39f3ce037f0fb9800fb806975c5b1c2dd76f81
SHA25674087768d301a579a5a0c26121e570d9c86474e12d999f9eda2258cff24eb48f
SHA51268cc629bbed83f72eefcd0015c5f2f99fd7e93cec87ba07f52e13610063476a4962c2d3ee624b65358b9324b672b7d87dc74023781ee91f1c749661059775ebb
-
Filesize
173KB
MD5f5ad0411152951c883c05bd82d4b7874
SHA1c4dd96d145dcaee7d7b59acdb1c6bc7b34be7daf
SHA2560558e5a7332c5e7c1c5d9a6f08539537eface9509e965729cdd64fb64e77e714
SHA512fd4c64cd1b1eba34fd8dbbe74d9295d61637bdde8a69d5b312fd6a438c95fabe8bade4c32763212a4ed677f1294bff71ab224fadb8a6724e14b48fe46a3ab395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5973979c88f1407ebf68c1ab54ac6fd1c
SHA135b0a3ff4e972b160151e0e56d9eeecd7170593c
SHA256aee1894efdb90bbb770be999f9961e0c32ba8bbd02c5b3d4b1dbb7455da3537e
SHA51237262e452a8c1cd80091a8be551fa11e304184cbccf7a29f25f9dc5e3b22b5898fd8ebf9df919a739d48309f135bb9bbf2537f42a1cf0150917371060cce6004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59674e0dc9092d22bb9e4e5caf2525e46
SHA12a99d915b3c12a6a67f91d3d1bd8916b5b69144a
SHA256cf64c4aa0cdc25583d3ecf6c0283402b05c5a1bcc37aab30561e356675834a52
SHA5125e6ebe3d74bc73b03afb208f7cd0701a7c8cff1ebbc4769d2dd2603b503728abd324037151e59433dda8c1c9f3fe61afdc027f777b1fb16754d577b96f6b1bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5232c0f9b7b20a6afe9e785340ad5bfce
SHA12e137da20edeedf0f34a1254775f22c43064939a
SHA2566c339a4afb71107724fd22a941f37ede5109ab00e0d5f4ac6fb239b653023cb7
SHA5122330da38dac9f50d5ee96a192b262fa668aa9ae0e38cae6bb7915296b03da116b4457af962929441a77969d3e5d362f90fd36d9a11452d254853f849912d03bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56299f2386ee2ae1d78ad8cad14c347be
SHA15fc26a81092862736be5adf26ecf9de6a6c222f8
SHA256bdb89493153ca4cad18b9197149248a4e85d4241498c16cc19c3446f7e4c129e
SHA512430c3edcd42446730380e772bb42e5aa68adb9fb39321a14113817548511192a986b44fe53fef7fdc44b80a72c9b1e489ee60ebcdb6049e081a222ef7376d8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d090ab82e97d042b5a59ab677b00805
SHA110be91cf455843cea8263188ac57e170fbf3f6d5
SHA256ab0c6b24486017f2cfea1bccc9efa4b0de411cdbd9c37faa105e6d2b00342c77
SHA51289b46a094de899a95cd9069652a6baf55c16dbdd950726ed2defa2a3980896cf6f9c2138654a4ba8977cbca2317b5ef5983ad387014e4f400b07e108d0480a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3554e72bd4fff064b9cc174b5dddcf7
SHA15a4382aaa19dd8bea2bf9896325f3ed9890434e1
SHA2567a896a3d7e53eafe91e66814416d5c243f8c54cbd8bea55477ccfd86442ecc47
SHA512e5785683c4df8c7994d32d08cba00bc58982b4924eb1e786448358857d9c26fe535a40ef63a9286f32b3e6588b49717add7cd8bab8b2380ba776ae0401e5e63d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577378db4e1d7e62b15abc8d7f4e82a33
SHA17762d562cfbb7f09b5b9ddc55c6f281a2109520e
SHA2560be7f5011bd2fe092e20bf28273722535dc4087660afdb90acb4cdd9be00a275
SHA5124fa110414913ff3fbaa5d0b5174f63e0fff1b5453adc067e2e40124631fb506e1a73676e6923154fc600f0b5339502c1d8e29ccf0b9311b5eac254dabcc88c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ef73265c97eb1ef66ec4fcf5b38c70e
SHA1a2012b95ec73c2ffb8c52c9022ed75b2b7317f4e
SHA256f9bbfbff975e6748e8be2f1a566ebb2623f2ff34fa51469b851929551fc7e4b4
SHA5127a37f2053feb06a704b54c1586fddf396332a965399e9413b6b6f549d77a61af52b1e17b9dfb6c2f522acd59bee8f53a0ec52b1537e2df56a145e5d35d4912e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528435a8cd02412b7fe9501890076bb65
SHA168d31ef98781ce85cf2a7ce533875c7b81c67b27
SHA256ad50cdfa51170d1d4f03bb8bff35d109faee21b0fc0d00ac50cae6d06026381b
SHA512db12ffc8de73ddc638c3514f3413ca7246dbb031c6566719fdcabe454cc26b585838c97f3cc5932fb23b8259409b61b6c743e079de48f13dae9892aafc8fefef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
332KB
MD5dd89fb3e83972795705e5b0edc08987f
SHA1e315cce36b0494947c5d7b17b62dd38b24b159a6
SHA2567b7fd96033bb7a8a932758c8f0f1729d800949c2583c03c8aa3d21089cd28a62
SHA5121d9098f5e7f291ea7d2df3ad497bd7641c5920cbac5e99544a8b7d4b492e956ab051839fabf30bb5207913e7a1df76ec274e6887e47193c866398f2951be7583