Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe
-
Size
352KB
-
MD5
e7f147af11b3494756d8c07149de56c5
-
SHA1
c3b7a6a4b77eebaef88b1f874317d55783c10e82
-
SHA256
dfd96eb0d24ab0e64e6e2078eca2ae8e969295be95b0862456371f79a22333a2
-
SHA512
a0dd11b4c085c3642ec109ae33ded492db4f0e73c42bdb45e42bfe8243ad7b770362cfa966d45bdd90579f34e70ed595340d6b65379fd69e65c19c9ec2180027
-
SSDEEP
6144:oMeb/EDtpBx1aRXJub19pf3gOURaJmf+ubexB3wLaYZSzvF:oTb/wtN1aRXJg1f3gO9Jm+u2BgeYkzv
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+nnruq.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/BD2776213EAA6773
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/BD2776213EAA6773
http://yyre45dbvn2nhbefbmh.begumvelic.at/BD2776213EAA6773
http://xlowfznrg4wf7dli.ONION/BD2776213EAA6773
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (406) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2124 cmd.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+nnruq.txt xxcubqhnaxnm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+nnruq.txt xxcubqhnaxnm.exe -
Executes dropped EXE 1 IoCs
pid Process 2540 xxcubqhnaxnm.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\vwpnxiw = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\xxcubqhnaxnm.exe" xxcubqhnaxnm.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\Hearts\ja-JP\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\Windows Mail\es-ES\_ReCoVeRy_+nnruq.txt xxcubqhnaxnm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_ButtonGraphic.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_buttongraphic.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\button-highlight.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_ReCoVeRy_+nnruq.txt xxcubqhnaxnm.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\PassportMask.wmv xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jre7\lib\cmm\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_ReCoVeRy_+nnruq.txt xxcubqhnaxnm.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\it-IT\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_close_down_BIDI.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\_ReCoVeRy_+nnruq.txt xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\main.css xxcubqhnaxnm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPHandle.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_cloudy.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Notes_btn-back-static.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\applet\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationLeft_SelectionSubpicture.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ko.pak xxcubqhnaxnm.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\settings.css xxcubqhnaxnm.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\Microsoft Games\More Games\en-US\_ReCoVeRy_+nnruq.txt xxcubqhnaxnm.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_ReCoVeRy_+nnruq.txt xxcubqhnaxnm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationRight_ButtonGraphic.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt xxcubqhnaxnm.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_ReCoVeRy_+nnruq.txt xxcubqhnaxnm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\cpu.css xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\es-ES\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_ReCoVeRy_+nnruq.txt xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\macHandle.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jre7\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\reveal_rest.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_ReCoVeRy_+nnruq.txt xxcubqhnaxnm.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ta.pak xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_ReCoVeRy_+nnruq.txt xxcubqhnaxnm.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_ReCoVeRy_+nnruq.txt xxcubqhnaxnm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\_ReCoVeRy_+nnruq.png xxcubqhnaxnm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_ReCoVeRy_+nnruq.html xxcubqhnaxnm.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_sun.png xxcubqhnaxnm.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\xxcubqhnaxnm.exe e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe File opened for modification C:\Windows\xxcubqhnaxnm.exe e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxcubqhnaxnm.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B9C6281-B8C0-11EF-A7C1-EA7747D117E6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440193938" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d4a338fee6354342be96b3c71d6c4874000000000200000000001066000000010000200000009933c2faedeaa0805fb434a412650c77dd29708b647b47808e94531e872d655d000000000e800000000200002000000004386990180b89c5fcd4f46fdb678a04e2ea925c2c796eb320e6000db97b3c92200000006aee583b4a49fafcf5eeb2e7ed2de9699a7d87da0c620be8592129bd2a707f48400000009ead26244a37340000c5ef56d0e2cf455eb406568f45504ce8ee30ec69cef8d10d37c15c7cc53ff003e078d663bc39a3d3d339beb6657bd327fdcfa31a33df7a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d91ff0cc4cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2708 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe 2540 xxcubqhnaxnm.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2508 e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe Token: SeDebugPrivilege 2540 xxcubqhnaxnm.exe Token: SeIncreaseQuotaPrivilege 2856 WMIC.exe Token: SeSecurityPrivilege 2856 WMIC.exe Token: SeTakeOwnershipPrivilege 2856 WMIC.exe Token: SeLoadDriverPrivilege 2856 WMIC.exe Token: SeSystemProfilePrivilege 2856 WMIC.exe Token: SeSystemtimePrivilege 2856 WMIC.exe Token: SeProfSingleProcessPrivilege 2856 WMIC.exe Token: SeIncBasePriorityPrivilege 2856 WMIC.exe Token: SeCreatePagefilePrivilege 2856 WMIC.exe Token: SeBackupPrivilege 2856 WMIC.exe Token: SeRestorePrivilege 2856 WMIC.exe Token: SeShutdownPrivilege 2856 WMIC.exe Token: SeDebugPrivilege 2856 WMIC.exe Token: SeSystemEnvironmentPrivilege 2856 WMIC.exe Token: SeRemoteShutdownPrivilege 2856 WMIC.exe Token: SeUndockPrivilege 2856 WMIC.exe Token: SeManageVolumePrivilege 2856 WMIC.exe Token: 33 2856 WMIC.exe Token: 34 2856 WMIC.exe Token: 35 2856 WMIC.exe Token: SeIncreaseQuotaPrivilege 2856 WMIC.exe Token: SeSecurityPrivilege 2856 WMIC.exe Token: SeTakeOwnershipPrivilege 2856 WMIC.exe Token: SeLoadDriverPrivilege 2856 WMIC.exe Token: SeSystemProfilePrivilege 2856 WMIC.exe Token: SeSystemtimePrivilege 2856 WMIC.exe Token: SeProfSingleProcessPrivilege 2856 WMIC.exe Token: SeIncBasePriorityPrivilege 2856 WMIC.exe Token: SeCreatePagefilePrivilege 2856 WMIC.exe Token: SeBackupPrivilege 2856 WMIC.exe Token: SeRestorePrivilege 2856 WMIC.exe Token: SeShutdownPrivilege 2856 WMIC.exe Token: SeDebugPrivilege 2856 WMIC.exe Token: SeSystemEnvironmentPrivilege 2856 WMIC.exe Token: SeRemoteShutdownPrivilege 2856 WMIC.exe Token: SeUndockPrivilege 2856 WMIC.exe Token: SeManageVolumePrivilege 2856 WMIC.exe Token: 33 2856 WMIC.exe Token: 34 2856 WMIC.exe Token: 35 2856 WMIC.exe Token: SeBackupPrivilege 2908 vssvc.exe Token: SeRestorePrivilege 2908 vssvc.exe Token: SeAuditPrivilege 2908 vssvc.exe Token: SeIncreaseQuotaPrivilege 1840 WMIC.exe Token: SeSecurityPrivilege 1840 WMIC.exe Token: SeTakeOwnershipPrivilege 1840 WMIC.exe Token: SeLoadDriverPrivilege 1840 WMIC.exe Token: SeSystemProfilePrivilege 1840 WMIC.exe Token: SeSystemtimePrivilege 1840 WMIC.exe Token: SeProfSingleProcessPrivilege 1840 WMIC.exe Token: SeIncBasePriorityPrivilege 1840 WMIC.exe Token: SeCreatePagefilePrivilege 1840 WMIC.exe Token: SeBackupPrivilege 1840 WMIC.exe Token: SeRestorePrivilege 1840 WMIC.exe Token: SeShutdownPrivilege 1840 WMIC.exe Token: SeDebugPrivilege 1840 WMIC.exe Token: SeSystemEnvironmentPrivilege 1840 WMIC.exe Token: SeRemoteShutdownPrivilege 1840 WMIC.exe Token: SeUndockPrivilege 1840 WMIC.exe Token: SeManageVolumePrivilege 1840 WMIC.exe Token: 33 1840 WMIC.exe Token: 34 1840 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2724 iexplore.exe 1700 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2724 iexplore.exe 2724 iexplore.exe 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 1700 DllHost.exe 1700 DllHost.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2540 2508 e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2540 2508 e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2540 2508 e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2540 2508 e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2124 2508 e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe 32 PID 2508 wrote to memory of 2124 2508 e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe 32 PID 2508 wrote to memory of 2124 2508 e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe 32 PID 2508 wrote to memory of 2124 2508 e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe 32 PID 2540 wrote to memory of 2856 2540 xxcubqhnaxnm.exe 34 PID 2540 wrote to memory of 2856 2540 xxcubqhnaxnm.exe 34 PID 2540 wrote to memory of 2856 2540 xxcubqhnaxnm.exe 34 PID 2540 wrote to memory of 2856 2540 xxcubqhnaxnm.exe 34 PID 2540 wrote to memory of 2708 2540 xxcubqhnaxnm.exe 43 PID 2540 wrote to memory of 2708 2540 xxcubqhnaxnm.exe 43 PID 2540 wrote to memory of 2708 2540 xxcubqhnaxnm.exe 43 PID 2540 wrote to memory of 2708 2540 xxcubqhnaxnm.exe 43 PID 2540 wrote to memory of 2724 2540 xxcubqhnaxnm.exe 44 PID 2540 wrote to memory of 2724 2540 xxcubqhnaxnm.exe 44 PID 2540 wrote to memory of 2724 2540 xxcubqhnaxnm.exe 44 PID 2540 wrote to memory of 2724 2540 xxcubqhnaxnm.exe 44 PID 2724 wrote to memory of 2952 2724 iexplore.exe 46 PID 2724 wrote to memory of 2952 2724 iexplore.exe 46 PID 2724 wrote to memory of 2952 2724 iexplore.exe 46 PID 2724 wrote to memory of 2952 2724 iexplore.exe 46 PID 2540 wrote to memory of 1840 2540 xxcubqhnaxnm.exe 47 PID 2540 wrote to memory of 1840 2540 xxcubqhnaxnm.exe 47 PID 2540 wrote to memory of 1840 2540 xxcubqhnaxnm.exe 47 PID 2540 wrote to memory of 1840 2540 xxcubqhnaxnm.exe 47 PID 2540 wrote to memory of 808 2540 xxcubqhnaxnm.exe 49 PID 2540 wrote to memory of 808 2540 xxcubqhnaxnm.exe 49 PID 2540 wrote to memory of 808 2540 xxcubqhnaxnm.exe 49 PID 2540 wrote to memory of 808 2540 xxcubqhnaxnm.exe 49 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xxcubqhnaxnm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" xxcubqhnaxnm.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e7f147af11b3494756d8c07149de56c5_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\xxcubqhnaxnm.exeC:\Windows\xxcubqhnaxnm.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2540 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2708
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2952
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\XXCUBQ~1.EXE3⤵
- System Location Discovery: System Language Discovery
PID:808
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\E7F147~1.EXE2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2124
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1700
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD57fb60a8f101bb9a5b259b5841712a4d5
SHA1e3f177b1c1d605f02db004f9f3ed3b9c284d49aa
SHA256c174102d1dd1ef92dc40e9399c42b6bdf68a3b16404184419597aaa236af5a05
SHA5127ab8c749da243b4246abcf1b4eda731b2e06138aa681f662cfb52743e388c554791765843eb9797d60b36058fc1c646f18d93ec03f6e950d1b168a7860edbf13
-
Filesize
64KB
MD5c4e7ae00dcd2ddd3cc5e97cac93f79a0
SHA13f48962afd72b10dc7c3aa484cf257638c31fd3f
SHA256de28a4511dd263c596806214fcef5e96606d600d6faae58952207ae3cd33390b
SHA512ed08e8dac75ebb06ae7bfdbbfbe775e624a092be7bd1bffe18b5a1fc297674771ded3f8c72be87e64246283d2aeae82b8f9e452ec138af1c0922e7bb7e918237
-
Filesize
1KB
MD5f6d56f1062990457297663852c18a30e
SHA16c3b648ed6bd86a434f0e387eafdd1b2af0df868
SHA25662645ae85fc5386852ab6b6edad19ad6e6d1a56c19e33abc4517b34acefee651
SHA512bd583946443fbe5e957fc543af0fde02ed0eb8f241830ae15eed07e0b929c482323a4103f431a99476221818a8c2de26ef45b6ddb6f6bbbaac688db8eb40bf0c
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD59a5717bd52a5e6cc55c1a1f23911af44
SHA13d0ce86cf993167e9fecc9a8b900b9bdafb549fa
SHA2560ff309810a33546f5f0f641e3fea105c7337ad0344e439f263ef54dfb8bbf934
SHA5128c5324e8fba76245ca5826d957ddcb05aca47fb64569795d2c6644fe7af85e221c8ee051e76cdc958e922da8184a504aa169d20ef0b9cb37da4b725edd9daf5e
-
Filesize
109KB
MD53a240fea341f4af922603d7cbec46521
SHA1c573697d31c5c11e25254aea0784d5d86a170646
SHA256845b527372982611b2db777e4d66580b56cbc6451824104c7f73d9b95d39317a
SHA512b21def98fd822aabe481bf218a3ff438f38bee6f5a9719ddeadd8d06fcc511cfdde4d5d7f0e12c78ab6b411260686a2665695d2c048ee0645d9d37b4eb5b339b
-
Filesize
173KB
MD5d716653f782356043949d4204577bf8f
SHA1c0474a50bd5d21897f697e7408675e4d68b68148
SHA25687c92849e40742ff67787ae48f59d456ca466a881d0ab2fef9433e2aaf18927d
SHA512574dba80f6434c1679bf0c2c9e498edbb81232fd3001e6da17eb330fe505831999243812aa8a471764c0fd000c0b4215720916d546a279270a41fe9625337981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5448724aad29d2278551752af1a71b0bd
SHA15730ab19d977920cb0174b289b47fd9b5e415f3d
SHA25662e448c26149d3d62a720cb398cafcfc1e9e42dfe14998cfecdb8e224af32017
SHA5120650367f807e10ced6c85eb05eda7d0d38f58fda0a512a2a52afb6c6566e88c96b45b09dbfae1209634ac57b8445401814610a3857792ebd7b34c85653cb72bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526bd16c68e85b89da6672afa444d22e
SHA13971ba4fdc41e1adbef77d66b4ea4e2ea341fc74
SHA256b952357c3a57914fe028e1f51166c74f76bfc5527247137e0787795dbfa87433
SHA512f0d0a30fd60305a6fff14bf1138013572c75ce2e3f3487b49058ced869823f82006a83d8288e6e5a360775a0757d254b67ad2a9192e626eb202be359753657a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6cc63ac5c9a3312259f23a451970b29
SHA19ee6bb2f1fd21ec39c75f00151c65bac26a82e83
SHA25640b6300afeedbdf70d8e60411c441e6c83c5f7614978af99a1572f8fed59d5f6
SHA512da13510ec283444c2dec32aabdbc77213f6d98fd19fc3ecdef424ee21d18ea61ec780d04bada4a296a9b083b0cca0a90699bc925d9655a6e8e8a24dd8f6461bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a343538bbc8165b9bc6b55e4910b331e
SHA1b89681e324ad4e269df0b2abe6f7b71e0d2a2356
SHA2561a54ed83a8c933dab7434ca8f3aa430bb0cb2c662934da785c39c4e3c3d1108f
SHA512c46c1511332db0e32f94c903f252d7201e41a759d1b5a32e36448737e0920906c8aee3c3bdfcc6055aaa2a7874a8153f381cd2dd733195bf855ff71ead39ae3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52489aca27bb596a3abc9e468481ea87d
SHA119a24fcb2d2aa847281fe85a65cf7c40255852ff
SHA2560b2a9b419f6b53f7ad80c1e23f2ad043793d23adca5cfdb52ddc7812e79db8c2
SHA512d4e3fc3f1b12edcaef68efbea6b38b821bd2386e2c773c2029471c6901ab2001d825eae7353bec865ce6384e8c6c25bae7b88f0cbd8e9c56bbc2f788ff4a3b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407c747254f5e529ac418fe0753d82be
SHA167c8590c079297269f2be01cffa0afe82a371fd0
SHA256c0a55e76ec03ba4878abff022eaf0e309e050e9a2fee30d442f565eb85352d78
SHA512338c8d73ef65444a9c1cf8572b5d6d7aa3eed154f500b609e428619988c47b4de242bb975e2923845ce8a2b8bc11d249d7c8ed9ff560cee8c324c9edade532db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a6fc24eadf3420f499d82f18b227022
SHA1bab9d243dd7556aca2be1da4fc5890d399b27a10
SHA256680d06199b07f5ed5174c2c87e5956295a4f36cb819ebcdaf4347d64b3a45916
SHA512a84ffda6d435ba38052f5161d59d753135dfed55c1bf8bb54cb1f4980b4eff41542eae6ff5e051648a608575d69e69e3e2e5c78981497e476543429b89e71e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58daa5bc704dd65e2fe8c6328aec8dfe8
SHA134ed0583d649916b61d888a91cc1a2ca689de413
SHA256340233e10fc266d0cf08d534cd3501e1a236320a1fbdc457d5aba102fb3eea26
SHA512f9fb348a2fe097ca4bf179ebe246e171629bbb27745810bac62ba9c89d5ada7d0f3b59f5a4d49911a506a11cb7d86ca54537826816afd7024fee72abe768ccbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a7ef3db7050a3283088a01006f5e2c
SHA1f411c1ad79e6dcfb01205450e120dc9b9401c537
SHA256d9576f4f31413639b66354a6543e45e4339ddc8dc37c3690c086e64b7755773d
SHA5121526c0f4c1432e61b4a2318afda0c077a406df613b67f2cf5bac3f3320ff7529995d479012f2625b5b22964b235aaeb16df2ecc0a4fd26466131b162a0c7f019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d23770586e518a9967275a06f12d4a4b
SHA18d3c1c1319932bd81cdcbd15b0b61b20aef1526e
SHA25645df762e097f60bde219806464585a46dd31e97dd11fcdbf96e82acecd66b87f
SHA5128ec57eda881e26161b53d9ad266c51ead5b4a5faccf583ff94ee95d7c39ceb3d235a3a9c304a61ba264f7f35bd41222cdfcc8f0feeb19e9cb376a389e431aa76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9cb12ef40d960a6b7bf2cf70064f994
SHA18de28e85477d120bbcb63855daa17da7aefbe2a7
SHA256532b1ff3304c17eae8fe802a10d1700d8429130baf99b436704f36e684ad51c4
SHA512a0e1dd463cc239774689654d24bd9f7fd4ef9daff6213e764ded5178e238362c7a4912fe1a614eefecff09cc932058e297e10fc2f0c7908ee64e56a848d414e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ccee11339028a2e66ce1db82b524e48
SHA189bc06236dde4d2ff9b321f4cf6047bce1f77882
SHA25689e5d6f6881daf40655a212c3c83386e2f04366fbcef7ca8ceb6a0e502509430
SHA512fda5280efca20b95800ef02b4aac9fe3b6a3f14cb28fd6f7f024a16b0f05dc21d0459901d15698fe3ac3f551ebe3d1f0f8f5d79c207aa21a7ab480e8c6b67f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5541bbed47927d7a3aa8614537f2c43fd
SHA1cc9cae333a1db65befa58b1abc482c9027d91638
SHA2566270304bdd98f903f5d2c59c43a35bad6944c45ff9ed8f505be0cf8fb650090b
SHA5124a18d15274e579eb29edf2fd7dcf257366a08da43d34398827ace62f98f51f5300279751971ffb78dc80e49bfa7e1557996321055d2ab0565922d7bd429df9a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587d2e50e9c7806bb8556134db0ab20ed
SHA15e3c7e291491d9b66c89b34cec2d3d68885b30fc
SHA25653d4a1b3e463a44524ab0ab24d5f956dcaffb2f6a0a2ccdd34e045b077908dea
SHA512ef7c7ca00af9a68232a36cbc91ffb46a88d1684010ad589703797d7ffb775098c00a6e13bea2b99a9f6a4a4faa2753818ee8ee4c8ba53f762d7328f26c8154f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f6b2592fc40bd1152f38c172a5f9987
SHA1305c3989655d9436968fcd41ba03bfd574e35d48
SHA256f33ce5cc7bb5744525364c2b4442d0e40e86d5fb807f7d39ae06e656d3e83220
SHA51244aeee797fae4fc03a88079dc30243a8f7b83fe93f51300ccc82b3ffeac23c792d4a52fabac5190713843597dc9883392a3b1d76c003b83d22fba1cf9a9c008b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d678fed140e44938062949373ad12b2c
SHA1d405516d84b2a49a210705ae8732f1b8a093b350
SHA256815e52d7220a4d719d95d9a9c77bd0cb4174ce14a2c5cbac603802e270868fb4
SHA512381d740bb2f031521ba14708f7fbb64e9c0d650ba1d0ca231a9394c1ef1ba42d8319ea6d3f677fbbf6eab456bcdf9d1c3d65af66777109163ead0e3e94740c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531cd1622547102675933bfe92e07d960
SHA16bc0185dad0897ba6456f2421e6d3393e6086ff8
SHA256c9c0e72bb1410408d32eaef56f64221129666787c88955b1277b6eb281fe3f2b
SHA5123b48050888a5dee0057e3c01b1d1449b9d9558be41059777060ea399be017f7a1cc6aa65f304e999dbe5975d6d7b108994025242fbb24e189af45bf4ea790eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd668e725be180e85feec67e8636dfb7
SHA143f40bd21ceacca6813b77ec2150fbbcde099023
SHA25694a73531acfe18a827a9a70da8c3bcf33322197bfc62e3e23e1de8378e4e2cfa
SHA51206690f2e2b9c632bd11f7e009b5332ea5a4abd8a4bdb1cd05cc6ee85ae42b387cf7c4fcfd0fd7b614de8a1c1d7ebd0417f6c1e2554f14c9fe0a5129c921e8ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52232ff7508ef3ad08d5a6c807286169c
SHA13d40558715e3c79207582919a8d191ebc6817961
SHA256a6ac4ca53ee13a9a4a4b0feaa98a14794b99539cc7c0c9c99b756860faf0e2ea
SHA5123d5af98053a00e5dac4a62928faca93ce83a3cce8803987ea34ba28838e59b5353bcdfba599fdc23f3579862aef0f5dc688789495537750fa61baf52c4d614e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5477c808edf98f8888f7ef243f2816d00
SHA115eb93f5dd2b172671e74b06b8dfd7fb981a2a71
SHA2567879bc0b3d6a06537895a29b14e8b9ba0d3bc64e042322e82d31846e44a06699
SHA5129751d05f4c6731e26b48ec9ac215c722fd512775f2eb62147a3ebce78c940c3a7c1c0be3cf0d8ca08a721f92a51e4a9b83f42fab0fa8c6b9298bcbeb7f6c3ea2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
352KB
MD5e7f147af11b3494756d8c07149de56c5
SHA1c3b7a6a4b77eebaef88b1f874317d55783c10e82
SHA256dfd96eb0d24ab0e64e6e2078eca2ae8e969295be95b0862456371f79a22333a2
SHA512a0dd11b4c085c3642ec109ae33ded492db4f0e73c42bdb45e42bfe8243ad7b770362cfa966d45bdd90579f34e70ed595340d6b65379fd69e65c19c9ec2180027