Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 00:01
Static task
static1
Behavioral task
behavioral1
Sample
e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe
-
Size
396KB
-
MD5
e3c7a712d0aa4db4b62ca2a2abc3af89
-
SHA1
80ebc294329a7d40e6ac13feedf0b5554fdf8a38
-
SHA256
c46d526ed752a808427220c412135972ed2fbfac2476b9fcd6b74b330e4dc9a3
-
SHA512
814df1437244043bfd5a7803b208695badc87b3a862f24f25b838b8eaee82c91314d5fdd2f52286494fd2499da48a1efb4738235eddc94bd04b7dc14d4cde8fb
-
SSDEEP
6144:Z0sTdSkul5CpfZsu43jx0HdEouuj5axxn7JCpIKxZU/bc92A6mJOl:qG7pfZsu43d0HdEFuj5EpNbWAcsoOl
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+agtxt.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/A3DB5B3EB7FF385
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/A3DB5B3EB7FF385
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/A3DB5B3EB7FF385
http://xlowfznrg4wf7dli.ONION/A3DB5B3EB7FF385
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (419) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 3068 cmd.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECoVERY_+agtxt.png tdggysktavbv.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+agtxt.png tdggysktavbv.exe -
Executes dropped EXE 1 IoCs
pid Process 2116 tdggysktavbv.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbaodltkjkvb = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\tdggysktavbv.exe\"" tdggysktavbv.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ku_IQ\LC_MESSAGES\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\DVD Maker\Shared\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bNext-hot.png tdggysktavbv.exe File opened for modification C:\Program Files\Windows Media Player\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_RECoVERY_+agtxt.png tdggysktavbv.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationLeft_SelectionSubpicture.png tdggysktavbv.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\SmallLogoBeta.png tdggysktavbv.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\it-IT\_RECoVERY_+agtxt.png tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\buttons.png tdggysktavbv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\Java\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_output\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt tdggysktavbv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationLeft_ButtonGraphic.png tdggysktavbv.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d11\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\settings.css tdggysktavbv.exe File opened for modification C:\Program Files\Microsoft Games\More Games\de-DE\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\Microsoft Games\More Games\fr-FR\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es_MX\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\_RECoVERY_+agtxt.png tdggysktavbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\weather.js tdggysktavbv.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\_RECoVERY_+agtxt.png tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\_RECoVERY_+agtxt.png tdggysktavbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_divider_right.png tdggysktavbv.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\_RECoVERY_+agtxt.png tdggysktavbv.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\15x15dot.png tdggysktavbv.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\el.pak tdggysktavbv.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_RECoVERY_+agtxt.png tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am_ET\_RECoVERY_+agtxt.png tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\RSSFeeds.js tdggysktavbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_RECoVERY_+agtxt.html tdggysktavbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\settings.js tdggysktavbv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\novelty_s.png tdggysktavbv.exe File opened for modification C:\Program Files\Internet Explorer\_RECoVERY_+agtxt.png tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_RECoVERY_+agtxt.png tdggysktavbv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_RECoVERY_+agtxt.txt tdggysktavbv.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_RECoVERY_+agtxt.html tdggysktavbv.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\tdggysktavbv.exe e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe File opened for modification C:\Windows\tdggysktavbv.exe e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdggysktavbv.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04379c9944cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000310687ce0c3c0f9e6be3831056db1627561d912d81f262881de284a082924f76000000000e80000000020000200000004e815020fc04ebdc049b8db4c857a0ea13de597417be018c22858c0918293c9120000000a60fc70333b2f47381f2de96f94fc2e245415aabcdb62f331a2b6b6bb7b1e11540000000c8a822f24684d210cc2e9bd477d57ee157f68559ebb3c2763ea0e438ac5b46deabcc3d686c701f474443c68e949e858992d8cc8d5d10f0d13b34876f86fe417f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4F38B01-B887-11EF-9906-CA806D3F5BF8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440169822" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2216 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe 2116 tdggysktavbv.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2340 e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe Token: SeDebugPrivilege 2116 tdggysktavbv.exe Token: SeIncreaseQuotaPrivilege 2012 WMIC.exe Token: SeSecurityPrivilege 2012 WMIC.exe Token: SeTakeOwnershipPrivilege 2012 WMIC.exe Token: SeLoadDriverPrivilege 2012 WMIC.exe Token: SeSystemProfilePrivilege 2012 WMIC.exe Token: SeSystemtimePrivilege 2012 WMIC.exe Token: SeProfSingleProcessPrivilege 2012 WMIC.exe Token: SeIncBasePriorityPrivilege 2012 WMIC.exe Token: SeCreatePagefilePrivilege 2012 WMIC.exe Token: SeBackupPrivilege 2012 WMIC.exe Token: SeRestorePrivilege 2012 WMIC.exe Token: SeShutdownPrivilege 2012 WMIC.exe Token: SeDebugPrivilege 2012 WMIC.exe Token: SeSystemEnvironmentPrivilege 2012 WMIC.exe Token: SeRemoteShutdownPrivilege 2012 WMIC.exe Token: SeUndockPrivilege 2012 WMIC.exe Token: SeManageVolumePrivilege 2012 WMIC.exe Token: 33 2012 WMIC.exe Token: 34 2012 WMIC.exe Token: 35 2012 WMIC.exe Token: SeIncreaseQuotaPrivilege 2012 WMIC.exe Token: SeSecurityPrivilege 2012 WMIC.exe Token: SeTakeOwnershipPrivilege 2012 WMIC.exe Token: SeLoadDriverPrivilege 2012 WMIC.exe Token: SeSystemProfilePrivilege 2012 WMIC.exe Token: SeSystemtimePrivilege 2012 WMIC.exe Token: SeProfSingleProcessPrivilege 2012 WMIC.exe Token: SeIncBasePriorityPrivilege 2012 WMIC.exe Token: SeCreatePagefilePrivilege 2012 WMIC.exe Token: SeBackupPrivilege 2012 WMIC.exe Token: SeRestorePrivilege 2012 WMIC.exe Token: SeShutdownPrivilege 2012 WMIC.exe Token: SeDebugPrivilege 2012 WMIC.exe Token: SeSystemEnvironmentPrivilege 2012 WMIC.exe Token: SeRemoteShutdownPrivilege 2012 WMIC.exe Token: SeUndockPrivilege 2012 WMIC.exe Token: SeManageVolumePrivilege 2012 WMIC.exe Token: 33 2012 WMIC.exe Token: 34 2012 WMIC.exe Token: 35 2012 WMIC.exe Token: SeBackupPrivilege 1704 vssvc.exe Token: SeRestorePrivilege 1704 vssvc.exe Token: SeAuditPrivilege 1704 vssvc.exe Token: SeIncreaseQuotaPrivilege 1968 WMIC.exe Token: SeSecurityPrivilege 1968 WMIC.exe Token: SeTakeOwnershipPrivilege 1968 WMIC.exe Token: SeLoadDriverPrivilege 1968 WMIC.exe Token: SeSystemProfilePrivilege 1968 WMIC.exe Token: SeSystemtimePrivilege 1968 WMIC.exe Token: SeProfSingleProcessPrivilege 1968 WMIC.exe Token: SeIncBasePriorityPrivilege 1968 WMIC.exe Token: SeCreatePagefilePrivilege 1968 WMIC.exe Token: SeBackupPrivilege 1968 WMIC.exe Token: SeRestorePrivilege 1968 WMIC.exe Token: SeShutdownPrivilege 1968 WMIC.exe Token: SeDebugPrivilege 1968 WMIC.exe Token: SeSystemEnvironmentPrivilege 1968 WMIC.exe Token: SeRemoteShutdownPrivilege 1968 WMIC.exe Token: SeUndockPrivilege 1968 WMIC.exe Token: SeManageVolumePrivilege 1968 WMIC.exe Token: 33 1968 WMIC.exe Token: 34 1968 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2272 iexplore.exe 2244 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2244 DllHost.exe 2244 DllHost.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2116 2340 e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe 30 PID 2340 wrote to memory of 2116 2340 e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe 30 PID 2340 wrote to memory of 2116 2340 e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe 30 PID 2340 wrote to memory of 2116 2340 e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe 30 PID 2340 wrote to memory of 3068 2340 e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe 31 PID 2340 wrote to memory of 3068 2340 e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe 31 PID 2340 wrote to memory of 3068 2340 e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe 31 PID 2340 wrote to memory of 3068 2340 e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe 31 PID 2116 wrote to memory of 2012 2116 tdggysktavbv.exe 33 PID 2116 wrote to memory of 2012 2116 tdggysktavbv.exe 33 PID 2116 wrote to memory of 2012 2116 tdggysktavbv.exe 33 PID 2116 wrote to memory of 2012 2116 tdggysktavbv.exe 33 PID 2116 wrote to memory of 2216 2116 tdggysktavbv.exe 41 PID 2116 wrote to memory of 2216 2116 tdggysktavbv.exe 41 PID 2116 wrote to memory of 2216 2116 tdggysktavbv.exe 41 PID 2116 wrote to memory of 2216 2116 tdggysktavbv.exe 41 PID 2116 wrote to memory of 2272 2116 tdggysktavbv.exe 42 PID 2116 wrote to memory of 2272 2116 tdggysktavbv.exe 42 PID 2116 wrote to memory of 2272 2116 tdggysktavbv.exe 42 PID 2116 wrote to memory of 2272 2116 tdggysktavbv.exe 42 PID 2272 wrote to memory of 2312 2272 iexplore.exe 43 PID 2272 wrote to memory of 2312 2272 iexplore.exe 43 PID 2272 wrote to memory of 2312 2272 iexplore.exe 43 PID 2272 wrote to memory of 2312 2272 iexplore.exe 43 PID 2116 wrote to memory of 1968 2116 tdggysktavbv.exe 45 PID 2116 wrote to memory of 1968 2116 tdggysktavbv.exe 45 PID 2116 wrote to memory of 1968 2116 tdggysktavbv.exe 45 PID 2116 wrote to memory of 1968 2116 tdggysktavbv.exe 45 PID 2116 wrote to memory of 1960 2116 tdggysktavbv.exe 49 PID 2116 wrote to memory of 1960 2116 tdggysktavbv.exe 49 PID 2116 wrote to memory of 1960 2116 tdggysktavbv.exe 49 PID 2116 wrote to memory of 1960 2116 tdggysktavbv.exe 49 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System tdggysktavbv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" tdggysktavbv.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e3c7a712d0aa4db4b62ca2a2abc3af89_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\tdggysktavbv.exeC:\Windows\tdggysktavbv.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2116 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2216
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\TDGGYS~1.EXE3⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\E3C7A7~1.EXE2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2244
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5f251ccbec7a0423eb1d3b8dd91953e30
SHA13f9734b5aaed5eec09d507b42e9fa548f843a351
SHA2562cf734501a12e70971d00a77260d58783f38e5852ef09afb58308c951fbb07b4
SHA5126dd7e980d93947c3541dd60ca047ab21b26a24217c50c032379314eeff964bd15083b3f79d114673a7b8ebe103fc8917948dc2934bf5e46ca120af957e3dc9d2
-
Filesize
65KB
MD5f683b248ef622c12168a9004c0f54105
SHA12bec68054c67eff231e22c47b8a392e946aba7c7
SHA256e7b13d9f99c4342af61da85c9c9545b7eb28cbe960fa1b2d0864a0ddd0cece8f
SHA51246a844cbf00d22764e832bf379ca1165972e2bd3255643e08ffdc09b1a3b13f46fcd8ea29844bdd446a108faf6e79bf96e3250a2cb5b78da38a55e74aeb2c3bf
-
Filesize
1KB
MD59c85a689f12e5def0dc770214dcfab52
SHA1b3945e32804b5b9108781eb36dd952230cd56a01
SHA256af0680d89d21eb9eca43d3963743e5b13e519cd5edbb5688851a1aa69917b932
SHA512482642c4de15960d066ca3010666466ab15c453f3f6db73113ee4a7243d2157d1da91d8f3b7840c88c164520bd1befdfba15fc62b7b12cc6320c45d2a45817ce
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD5141f9ed8af3584fa34a186eaacd4c0e4
SHA1a3bb72937dac29d4cc778f043ddbaf84022216db
SHA2568a2b7bc88f2fb492e2eb3812b198178dec3cde22291a61f34bff6e384465f01a
SHA51224a727ab8df264551a88dc22e6a59b2542144056b40e49932cb212e22849ea9697c24309899c527b39b1e4e01625245f33764faf0dd5c0fb992c88d37d4cd95d
-
Filesize
109KB
MD5053f4828c4e280f604db8e35a01f8cc1
SHA16189d93e456094f8ebb728e2496614cfc5c98b9a
SHA256e54108b943ea98063604ef7a68af1bd43095e7dbe62461d45ec45944563b312c
SHA512dff7a97eed1b53a84ec037768eab158f3b7d89e7de768234e0a976089709e849bdada079208f35df7f8b47d6273e233e22cd9e93d7840cc5e644e3d6b47fc108
-
Filesize
173KB
MD570e7f6f2cf6b648d65e2043136ca655a
SHA1ca14367d4d9e0c4eb88788345f13d5e3b340bf69
SHA25617048fc1b9138fa41ed9fa13b302cb0a5b100e36ce4b6d50289bb034aa8465ff
SHA5129c51ce7a68cf8903304b52ba27afb2589aa728cb82b559f2dfc722dce0e06bd5ec829a57405cd2f28ed47b80cba311be983a64308537a52dad7473b23a847675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04e4c9f0eaeca293627fcbea37dcf27
SHA1ce5a2924873370b50ec264a86d49a9368ff9a759
SHA256df853f86aa92024b839b30633a174d4a4d9c1001acb5203e372e3bc8303be771
SHA512889cea0ce9f5df1e782eded097197f0dfd8945e39a14434d5a14395fe7a850a9abb6cf88939f4c86ce7c543d4bbac30f74db4bed1e62d79ed33401cf50d91b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e37376da01992971e9d008c98c8cb6
SHA190191100d6fa868acb37dc3dee08e433fa9f8ce6
SHA256abceacda679839003c136f5d967a21747ae8f4abd96d61fd83e765f4816eb949
SHA5121d60b2ee8abc2b850f9c8c89fa8e0bf3462c7312e0e8229c156a15b4b94c53413c3e1bca62bd5e87652fdf21b742b45829e21a4d6d818934d4ac9e328ef6925c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5088eb1def6518eca3684ce8561a573de
SHA180bf27a3f69ad62dc0bb6bdf0155955d781252a3
SHA256f8b9d662dea0f24c1a74830c9d085c3e72bef6a2a9c60d4b60a56b97ffbb0dcd
SHA5124d77855acd3c5a26841e2652754092ed7c178a8a37e32e27deba56c36fd5d8052d1f92375e6c32c3d573191a54ba2fcc5d218f81ebcfa025de4c1733f2fd71a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b611ccdcb124e8323640cf9f06055bf
SHA1a8734b59b164beab3468e815689e5727c70a5320
SHA256640d707d57eb0d5852ac042c80e4172886dfb61d3ca8c195efd7fbf373d0f719
SHA51213e30f591fc5f8c8e4b322aab30a2ed86c31110deaadbfc7fdb3dfc7c6c65f5952a2f219bb64da6dc86049d7313906dea2f827cc626d00c2334614eab5f52be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bf3c879c49c34e49fc61175f5d3b6ea
SHA11620e46da533fbc07286f4d1eb92c2f53be8fabe
SHA256910454ca03e016cfde302c947bf3ad403533079e6258bf8baac8a1bb5961e42d
SHA512eac03b64da538a994d15a372d41fe0e28f6b54d87f01eb41e3fbaf1f13f3582419376215bb1624d989bef5ddd5214a9ec3a095c2767af6da8dbbd01a45c8ceef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee1e12b1eff5092ba92621c97c6d47e8
SHA16b4e300487dcbbdb2658dc479cffbfa370b55040
SHA2564b215197f84109243d8029f89fb14d5bed590170cedc4876f8b8a8886bc36e07
SHA512aef0a8511001a90e8bd18ba6cbaf7a4bc02e51ceac0bddb347feb957edd8a3314f995ae392b9471e4d4da774e1f2ecf9f579d0383dc68326e5350a9dbd62a855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c70e18947ed31b9422029dd63d93126
SHA190a1fee10cda03b8e26fb222f9024920eea9ae29
SHA25629f006ca2a00ddda5a3ac5a10993146f3fd974e248abab1be80332c1a608c587
SHA5128ac64266e5e71e0e613a08e70dc8f62549ded8f69632bb0c96c8ec9958f3dae4a191ec64aa17e22c2c7e0c478c0a8cc79ed0f85b64780cdc99d42e36b6486d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59100631ce0f43d0f430e0ef80b9ad82f
SHA1bc7f88f007a7bf1501c33cf60e0f679ac48a0142
SHA25694884fafa09e8995ee756b21cc232efdb15d5c00a8353167c2b5564b62dae605
SHA5126c2f8389255f385925cf6ee34bb50736aa3574538d6861f60a1f14ecf01517021e3c22e435943d3072727be42310ca7e9abeccb91219c32b0fba54061f7eec88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591fda34219147af012f0d34e1cba0086
SHA159025cf8c514d6b9b15a4afc0320e83473cbd289
SHA256723a41cc0f84c78c653c9d5c4c84a89e200ed03e1bac0f6e9fb0ef3c599f502a
SHA512dd4920e450f2fd82db8965dd6812ce6ec75b0c9566363adf1012f24dead6edf212ea5274ab184b131e511b6da1edcc43c1325ccd8ef0abc0b2908b953a5f0de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0deced138d9d0765ebff56d700a33d9
SHA1ba6e17029b0ec23357c4542e759bd1e57df1c1b2
SHA2569bc032e0be24e3e158776daff42ca925d9ebbc0b0d1b132a55212081cec1bc6b
SHA51228a0b7165affacebe9f2697bfce9a07d2472b98c5fbfc8ba6416ace28e5af169abc7178b24ff8070daf324ab1a7914fff414d2bfd10c3139a85cc1acfee1114a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5009d31f8b41ade5582987ce5c601f1c2
SHA125f1ef578735adb04df0b388ce3d1f3c64b3d015
SHA2560eb253d8405a048b98e13a7303c628bc6c9a5182f6346863d1a0e4717d1c3e5b
SHA512d9ab8b3f0957c5b7e5055951c7313385813fe800435b6aea385c2298edd045377b75c5ffa861406e1356fb0bda9c4253a41f9a8e3dda53e9cb713d5638ecabbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bae62f4219f3325dfcbd9fe5e302ee33
SHA1b7727ef3c628a2de89f376f793072d56687aea50
SHA256b74f288bcec66d426b5b92f0a0e7d4439c2da3ca3ca2af3ff315fa4f13aa4a29
SHA5121442c1e69642a84668bf8981168100761bf58c10b3ec73f24219b5728c079fb07e04a38f7f56fa725f7f48a8ce457c38a897e4054094c3f46924efe4f6aa6760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b16ce63271628247b963fbf96a40a4
SHA1ad29164bfea19992a1634bffa846e3b3c7bd4fae
SHA25650bc8056022b3287a64662beee4127b385785eaf4ab8082b7ca8a8c9651f363a
SHA512ef5078875f56fc06204880aa7fb32a85f5d436e42457173753cc7ca23c4ab48fdc7156a89deb75cb5f7ac36a0018b980951c28c66e7d6a6169ff84c94af33f3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6cd56595a416fff6b9a51e6fa59a093
SHA1ed03e08bf323e3cb559bb95670914cc0f247bfbf
SHA256c9f94c69ab21a9e7656ba559f7b9c154048a00ae125ec161ca0d697e8522c7e6
SHA512793acfa7d3f501dddabf7b1b70c5a2578001dbd6e5fffbeb19aac708e47bf60d150099bec23e290a13e142974a9aa6eb57476ce9c998d26d1f5956e568eec6b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518157d96d1f22131e50128cbdb549b12
SHA1d862100de5fcd09278f51a73811f5a5bef069275
SHA256cb77edf2ea1558aea485471ccf3f2faf2e99436159217d04f26aac94a67140b6
SHA5120e61462161c9b1d5bbff3385e977f6f56348643789fd129b58b8afab48de93588ed83b94f110c90b8d29e04f7dd8aa97b22639588c2d9b076f83c4d904511a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592fc93155fee85cab3a17929100c7d93
SHA10eb865f36aae3d87c89f4567d2444beb627c7431
SHA2568170761488755a5b097d78e7a4abed84ca566e2430635e3bee5cab5658a513de
SHA51283877a416acfe26421f3362d6cb95568428bc339a43d6a49f3f27a52edaa11cea29b88b5f2671f234a366c6f81548b0e65a90cc66d090200f2047f06d027bbcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd206cea8e437cad4cc7f4529614d97f
SHA1573d892167b651467cc035b1404b05bf9ebf0165
SHA2560a501316a5e5c2a901bcbc5374c3d91eda47f667612765a95a876a7dc37f95f3
SHA512dd45f1ef10896b33a1111c19a97aaf11b36d3a821a1c17d714769d7efea0c4161895a898394bf2641dd881ad1ad2cf4740610ca91f5d3e3b96977468284c6700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba5dae8e6b060c86b2fbd63d9401c663
SHA115439fa3e0c89cea0fff3de6c1d3b71482163027
SHA25634c91d3b4c3fa732a6b964f3f668c07d3ca4f6725b1d3ac2c92282107ecbc61e
SHA5120dcfc3c93a20e39c83c8837b3c79cbbad6661788446fbf956a0f6c7fb4b41d405c8d2571168276c4ac8766ff96247f4f11453a5ec0c9d65d97beb95e6e9db974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c80c0afcb8c119df95f0044d9fe602d
SHA108365566c734935dfb42c78965fc4f3f3747d436
SHA2569c16f82c290f4a183ecfd00d035d8e861db2fdf6ed38073a523ad540e1d13866
SHA5120a2d3dba18b85548cdb336cd8beaa248a52e3096f3f0798b45b5885e91d63413b2eb86b8039f5b9c225fd3e2e601812724e8afd89c3e46cbaec0f1a3b0fc77a4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
396KB
MD5e3c7a712d0aa4db4b62ca2a2abc3af89
SHA180ebc294329a7d40e6ac13feedf0b5554fdf8a38
SHA256c46d526ed752a808427220c412135972ed2fbfac2476b9fcd6b74b330e4dc9a3
SHA512814df1437244043bfd5a7803b208695badc87b3a862f24f25b838b8eaee82c91314d5fdd2f52286494fd2499da48a1efb4738235eddc94bd04b7dc14d4cde8fb