Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 13:24
Static task
static1
Behavioral task
behavioral1
Sample
f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe
-
Size
500KB
-
MD5
f434ffb5c0ee41107301cdd2870b8cb3
-
SHA1
0f07886af55ecc7b12f6e16fbe2ab58d72f7293e
-
SHA256
905c987270df31e328c785f35f4b106624137a71e3785d31af946dd525218211
-
SHA512
3743ad61166066c9393880c54434f9e4dcaafdbd16df737d2e43c27c567e7b0ea20790ca8fe9dcbed775184863cc82e52217ebb9ba771dff4f5dfb43666dde12
-
SSDEEP
6144:2+5uzIF/dV6GdE98vJwvw8AWLG1qSrX6T26WyJNh:V5uzKdzd7RazYtT6Xh
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+fuwmo.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/B0655EE562323FC4
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/B0655EE562323FC4
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/B0655EE562323FC4
http://xlowfznrg4wf7dli.ONION/B0655EE562323FC4
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (422) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2312 cmd.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+fuwmo.txt eeyglxxrcwce.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+fuwmo.txt eeyglxxrcwce.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe -
Executes dropped EXE 1 IoCs
pid Process 2672 eeyglxxrcwce.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\ipglhte = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\eeyglxxrcwce.exe" eeyglxxrcwce.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push_item.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\_ReCoVeRy_+fuwmo.txt eeyglxxrcwce.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\it-IT\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\ja-JP\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\1047x576black.png eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_gloss-wave_35_f6a828_500x100.png eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\LC_MESSAGES\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\art\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceAmharic.txt eeyglxxrcwce.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt eeyglxxrcwce.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationUp_SelectionSubpicture.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\sl.pak eeyglxxrcwce.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPBluTSFrame.png eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_ReCoVeRy_+fuwmo.txt eeyglxxrcwce.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\_ReCoVeRy_+fuwmo.txt eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt eeyglxxrcwce.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\dotslightoverlay.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\_ReCoVeRy_+fuwmo.txt eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_glass_100_f6f6f6_1x400.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\picturePuzzle.js eeyglxxrcwce.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_basestyle.css eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\clock.css eeyglxxrcwce.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_MATTE_PAL.wmv eeyglxxrcwce.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe File opened for modification C:\Program Files\MSBuild\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Java\jre7\lib\applet\_ReCoVeRy_+fuwmo.txt eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_ReCoVeRy_+fuwmo.txt eeyglxxrcwce.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\drag.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\be\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationRight_ButtonGraphic.png eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_ReCoVeRy_+fuwmo.txt eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt eeyglxxrcwce.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveNoise.png eeyglxxrcwce.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationRight_SelectionSubpicture.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\LogoDev.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaireMCE.png eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\_ReCoVeRy_+fuwmo.png eeyglxxrcwce.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_ReCoVeRy_+fuwmo.html eeyglxxrcwce.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\eeyglxxrcwce.exe f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe File opened for modification C:\Windows\eeyglxxrcwce.exe f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeyglxxrcwce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FEF19E51-BAE7-11EF-A6BD-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708f6bd3f44edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440430972" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008e45c724a5d02c4aa66ad5a324f8bce200000000020000000000106600000001000020000000286e77736b1580d0463f3fc27b133f129c2cdfc5a59cd641b17fb5fb908f8bd5000000000e80000000020000200000007300a2a8b67cd606c4d40c544e34342d0498e414d27b49328ac47eeaaeb8240c20000000de04f67a365cc630955d3f0ff9e637088174853682f193c15f6a8d0256801a0c400000004ff341f98a4e8b5b0492a26f9729d8e9561b6e9c319b7f5b88f00c585bb1cf1430b01f650ee64d6562c86bb022aec38bdc1e7fec895e863afee51450c70edfc3 iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2428 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe 2672 eeyglxxrcwce.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2380 f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe Token: SeDebugPrivilege 2672 eeyglxxrcwce.exe Token: SeIncreaseQuotaPrivilege 2796 WMIC.exe Token: SeSecurityPrivilege 2796 WMIC.exe Token: SeTakeOwnershipPrivilege 2796 WMIC.exe Token: SeLoadDriverPrivilege 2796 WMIC.exe Token: SeSystemProfilePrivilege 2796 WMIC.exe Token: SeSystemtimePrivilege 2796 WMIC.exe Token: SeProfSingleProcessPrivilege 2796 WMIC.exe Token: SeIncBasePriorityPrivilege 2796 WMIC.exe Token: SeCreatePagefilePrivilege 2796 WMIC.exe Token: SeBackupPrivilege 2796 WMIC.exe Token: SeRestorePrivilege 2796 WMIC.exe Token: SeShutdownPrivilege 2796 WMIC.exe Token: SeDebugPrivilege 2796 WMIC.exe Token: SeSystemEnvironmentPrivilege 2796 WMIC.exe Token: SeRemoteShutdownPrivilege 2796 WMIC.exe Token: SeUndockPrivilege 2796 WMIC.exe Token: SeManageVolumePrivilege 2796 WMIC.exe Token: 33 2796 WMIC.exe Token: 34 2796 WMIC.exe Token: 35 2796 WMIC.exe Token: SeIncreaseQuotaPrivilege 2796 WMIC.exe Token: SeSecurityPrivilege 2796 WMIC.exe Token: SeTakeOwnershipPrivilege 2796 WMIC.exe Token: SeLoadDriverPrivilege 2796 WMIC.exe Token: SeSystemProfilePrivilege 2796 WMIC.exe Token: SeSystemtimePrivilege 2796 WMIC.exe Token: SeProfSingleProcessPrivilege 2796 WMIC.exe Token: SeIncBasePriorityPrivilege 2796 WMIC.exe Token: SeCreatePagefilePrivilege 2796 WMIC.exe Token: SeBackupPrivilege 2796 WMIC.exe Token: SeRestorePrivilege 2796 WMIC.exe Token: SeShutdownPrivilege 2796 WMIC.exe Token: SeDebugPrivilege 2796 WMIC.exe Token: SeSystemEnvironmentPrivilege 2796 WMIC.exe Token: SeRemoteShutdownPrivilege 2796 WMIC.exe Token: SeUndockPrivilege 2796 WMIC.exe Token: SeManageVolumePrivilege 2796 WMIC.exe Token: 33 2796 WMIC.exe Token: 34 2796 WMIC.exe Token: 35 2796 WMIC.exe Token: SeBackupPrivilege 2616 vssvc.exe Token: SeRestorePrivilege 2616 vssvc.exe Token: SeAuditPrivilege 2616 vssvc.exe Token: SeIncreaseQuotaPrivilege 1056 WMIC.exe Token: SeSecurityPrivilege 1056 WMIC.exe Token: SeTakeOwnershipPrivilege 1056 WMIC.exe Token: SeLoadDriverPrivilege 1056 WMIC.exe Token: SeSystemProfilePrivilege 1056 WMIC.exe Token: SeSystemtimePrivilege 1056 WMIC.exe Token: SeProfSingleProcessPrivilege 1056 WMIC.exe Token: SeIncBasePriorityPrivilege 1056 WMIC.exe Token: SeCreatePagefilePrivilege 1056 WMIC.exe Token: SeBackupPrivilege 1056 WMIC.exe Token: SeRestorePrivilege 1056 WMIC.exe Token: SeShutdownPrivilege 1056 WMIC.exe Token: SeDebugPrivilege 1056 WMIC.exe Token: SeSystemEnvironmentPrivilege 1056 WMIC.exe Token: SeRemoteShutdownPrivilege 1056 WMIC.exe Token: SeUndockPrivilege 1056 WMIC.exe Token: SeManageVolumePrivilege 1056 WMIC.exe Token: 33 1056 WMIC.exe Token: 34 1056 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2272 iexplore.exe 2080 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 2080 DllHost.exe 2080 DllHost.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2672 2380 f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2672 2380 f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2672 2380 f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2672 2380 f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2312 2380 f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe 32 PID 2380 wrote to memory of 2312 2380 f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe 32 PID 2380 wrote to memory of 2312 2380 f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe 32 PID 2380 wrote to memory of 2312 2380 f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe 32 PID 2672 wrote to memory of 2796 2672 eeyglxxrcwce.exe 34 PID 2672 wrote to memory of 2796 2672 eeyglxxrcwce.exe 34 PID 2672 wrote to memory of 2796 2672 eeyglxxrcwce.exe 34 PID 2672 wrote to memory of 2796 2672 eeyglxxrcwce.exe 34 PID 2672 wrote to memory of 2428 2672 eeyglxxrcwce.exe 43 PID 2672 wrote to memory of 2428 2672 eeyglxxrcwce.exe 43 PID 2672 wrote to memory of 2428 2672 eeyglxxrcwce.exe 43 PID 2672 wrote to memory of 2428 2672 eeyglxxrcwce.exe 43 PID 2672 wrote to memory of 2272 2672 eeyglxxrcwce.exe 44 PID 2672 wrote to memory of 2272 2672 eeyglxxrcwce.exe 44 PID 2672 wrote to memory of 2272 2672 eeyglxxrcwce.exe 44 PID 2672 wrote to memory of 2272 2672 eeyglxxrcwce.exe 44 PID 2272 wrote to memory of 3060 2272 iexplore.exe 46 PID 2272 wrote to memory of 3060 2272 iexplore.exe 46 PID 2272 wrote to memory of 3060 2272 iexplore.exe 46 PID 2272 wrote to memory of 3060 2272 iexplore.exe 46 PID 2672 wrote to memory of 1056 2672 eeyglxxrcwce.exe 47 PID 2672 wrote to memory of 1056 2672 eeyglxxrcwce.exe 47 PID 2672 wrote to memory of 1056 2672 eeyglxxrcwce.exe 47 PID 2672 wrote to memory of 1056 2672 eeyglxxrcwce.exe 47 PID 2672 wrote to memory of 2556 2672 eeyglxxrcwce.exe 50 PID 2672 wrote to memory of 2556 2672 eeyglxxrcwce.exe 50 PID 2672 wrote to memory of 2556 2672 eeyglxxrcwce.exe 50 PID 2672 wrote to memory of 2556 2672 eeyglxxrcwce.exe 50 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System eeyglxxrcwce.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" eeyglxxrcwce.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\eeyglxxrcwce.exeC:\Windows\eeyglxxrcwce.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2672 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2428
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\EEYGLX~1.EXE3⤵
- System Location Discovery: System Language Discovery
PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\F434FF~1.EXE2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2312
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2080
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5570b00570a7f4ebbdaf120f303b010cc
SHA19049af9f68e35863f9482ea8adbf78096e2976e6
SHA256f8dbfac000f6287bdc5840ade8e24aef842b343a42692e10cc7c18997ee5fc9f
SHA512956bbcdaa9d0727d863d9421ee4ca27a5bed4c37cfd4d6f0ae9f9e7e286c3e74a49ecd4d202dfa95397ca0245f13abbb4ff044209af87bba391f76abdc3b8d12
-
Filesize
64KB
MD5a7c1034a33749fa86c359f4a86bf452b
SHA10cb1c6cd3d014a14784c8bef761c10986c9c92d2
SHA25615bc79f9f034eee586cc10c6e73381fc37cc1d459a92ed8d7094e00c149a6a0e
SHA5127a278080e74177293bd4b58d195099b9842e2296836bd81144df91494bb14efe167023a12e23aaa440b2ce65c12e46dde6dec727201b5a2c7384b405720e4d14
-
Filesize
1KB
MD5d02482c373ede5fc56cbac4501a905da
SHA1c67e4a45ee0a3878ae3b5e77784a66a91f697fe4
SHA2561a48bf4d83f7c2a5361665965bcc3eea9e156fcfaee5aa4f28cd1b4bb04ecc8e
SHA51275a4b7c1edb3092fdb65f58851b09f6dfd44bfc129db791c2324c8d22b57d88a5e6aaeeb40dfc604e669476b8b14272dd0adcdf98f50a670bd3bf6f25c055949
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD59c94a6cc99f341c729cdf236ea6b5e4a
SHA1978358247f9ac8a666dc50e571fbf4b4062daaa8
SHA256f67288ddae294d19f8d2493b4de92916c979e51f41ed0dec735624e6f36743c8
SHA512ecf4ffc37e7a222179356104117d7c160ce6435f75caf06a172ef615c4110daa1a5ba4bb1655f088cac22bdc46ea0ec4ce7a07252a4fbee92136b447e9c49930
-
Filesize
109KB
MD5b33336533467a8e938b1e9d0fe8db9cd
SHA176821d6f2c570a02e04f7dd28b07046a536c1fdb
SHA25657d36e752a903ece13da9f8879cf73234d7802df4d7d9fa8bf1e6db4d48e365b
SHA512093578a1afe0ae7bed1e1fbcadf686eb77db4bcc695ba09f72cbc06fc8a0502c9e390b94e2a77a51e80081f0c3d34bfc07320b9dcfc72845025cc111d55d2054
-
Filesize
173KB
MD5e3c918192774f40bd331dee6f0d05134
SHA19415d542ede143981c172fab57cf34a92f640dad
SHA2567dfa96bb67dfca2a2c0411a6a6aa6c17b95cc67a1393992fa84dd4f116392938
SHA5128a16c184df1abfb1ae1eb80d672bf255d09e52584cb2d309839a95c66205a306f2885c9540449bcba529d3ee7e9bbc05360d62989de51deea01eb9da4eb48649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a0fb8ace6d10adb9b7902a259df9077
SHA1c1e85bf1b983cd1265940eb6473d4b0e3521c697
SHA25615ad81fd0211053dbe4fea7635794aa40c75db2094d0ae8bc346cde83d7f0951
SHA5128915ceafda1fc02bd9f04e6b8fef5da71e9e263f8871dd2097699c7a9b164ae75bc2821bb2ae554382037b38d15327ced085566fc5ff50e378c93a57e3b2518a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5126d432f691ca1e1429e57ffa62eadf4
SHA117fefbd18b486f9d09a3d98850f2ba3de8750cbf
SHA256d91ac27de2dde4c738aa3a88ae54e2f4ad309b556e0439d5ba275a7066cd0742
SHA512d458cc68b5cfdbdb85b78c6a81fccc54060fc488999b9a313a329d80a0e713e7cb155579582b4190d262143fd491364d59e4317315fe6b4608ce5852c1441755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58262ea1829bd3542cfe819d0ae039f5a
SHA1e9c1f206499bd598362b3f752317610c24f1bfdb
SHA256e93134d6ca62ef0a932879988c71b96392860c0eaf526650ebc7908462ab2367
SHA512158b48c6338a2dada50a04438d0c7bfa60d8d792bf38696e18d0666faf665f0dc2fad9cbdbaa41cdb0b936113dfe68ebb9419f30ca50f7e7cd48bce0ec7402e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54726a7eb5b6e4c44a8e8a843b778fdc7
SHA16c2c3c91f4e2dc5be44ddc995dff71d5a0e10a5c
SHA256c11987c6c42a30d746b9c7ed7a17a13cc2298944582a36349c4a70e3f223f50c
SHA512918e3e3d61acfb83139a4903ce73b0c94f48d4614c8b7ea9dbbab46d4b04f33cf48fa3ae4408a160de602a86ba512b35d53fc4c24b508bff59346c28b3ae14bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558a9152650d05d664d38744203864675
SHA1ce4b7295f51ffb0ea08098d755829a1ed0b50174
SHA2564768b7d094aaaa1ee986e60a7f9e90ba7e2579b7ebb572586f3a3a95e8e650ec
SHA512db1f5350ca7f6a1c5388d2aca37408ac093e41cc8623fc410dd8036790fd7e0b74e2e5970322a0152bcf9219a2e89ab8abcf1905e64a0f279716ff45ce55f48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52811eedd77e245735324d1480a90f858
SHA1e0da6eedc15c9f0f17ea16d735e65b0220787a5b
SHA256f1440e6edb0fc0101e247c36a2e25351a5cefa571df1e01eb9cc2761bfc10aa8
SHA51205d88630fe49d438a0e11dba14bb2e363967d3d82867066c5fb5a3c31529dcb7e8dd32251acd0ae63317d43964c3647702a9d88fb25087a48c2883742163b51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599fec11d7a2b2c2869504e3d2ef51be7
SHA10ca6481f8379f96cff2dfadce4a4deb5cd70d656
SHA2564b357d91cef885a8f664723dd76e0618347833ea1d881e1b1846dfc8277855c9
SHA512b6848e0a15ff418353b20a6dbd035785c0d2fedd22eb6e73ac222f93477ef1e53d32c9e3d54d6c7cbbdc547bf6028cf5a165ecad6f927dfdb722a15297272ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5520f93f80bbd9ef58e8e42cb94b82dc4
SHA1a296d227e47dabdce003618e665c7bb3752b5fdd
SHA2565f8d69b68a0e1e42685d09d0f0ec607f9737391ef234106db6f54b2502057fac
SHA512f2b80d6c9aa62896fbe12c9daf8ff29bd5140040aed71cc56b2208a67a30bdecc9546d2f9ffb49ea269050921d9d5423d3bebcf927b60f2ac61ce15e555831ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572431b45c4f7be8eb349d01bd7c3212a
SHA1343e50a73421f307a40b494cc562448c9081965a
SHA256d1c71647dfdb6fa60bb6849c9d604fe1072975c7ec46337266d032b7bb1bf151
SHA512a2d81b6d3e653383e68e03dc05577670748e14da05f62b3310b6371a36ad7f73a965b7efcf8ffccc932e194580dae5c94065db314900303d4ecd196aa4dec0b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4f4340db4a7b976266f38700e4eea86
SHA1b661f9f9329bea5b5025b6c3190e160d16625e82
SHA2568a9c4dd146440aa889902967f6c934541dfb62acec869871f034ef2e07847a78
SHA5124a23f5d8b31ae56646fb9c6edadc3ff5eb1b18c714cacab9a5a6b88bdf77e8624b523de2e4340bdc255145d2787ab90fb0624e2c515119ab9d3aaef34498b78b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e97b645c90c0fd0a87b415d902a185b4
SHA1d251a03c9af74fbfd205ec01e735f207754f4c71
SHA256389eea52f28f61e03bd392919fbdfece71415fb536b0efd9d18b3c7e690bd28b
SHA51238e1561d1ef6c1b5704026ae5085d1f015a222e51b85919a6f031b48fe57222057bc04ea4cd5df422328b000ad018440a1f5296ff3789b83517692c57faa78fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82cef46abb61e5f1931ee04c58ea6e9
SHA1ecced8e2072bb05e3577f64e6e5ddc520158611a
SHA256cfb311ffeb8c419f0be487fd1731a8187d0656a8b7f5e0f50be735c19655984a
SHA5120d6db2a9db4290806b283a32c31d1a3f8c9b03be91910b83c62e2d782dc7586fbe1c5e3997b34ffe738eb548166f36438b455d95cfdac4382b7aeb6a4b25e978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeab3fffc5857253e517cdec27b947dc
SHA15c671e308d12ba149ce0fe5b6d378e8919a5839e
SHA2563b9e2cc2ed192ad2a4eebe080d6a2d9e8f7bc7b9cd3ff711dacc033943390438
SHA512f0d19b4e860e3faa83e02c1d3c818504b77e923e94295b2e0d23cb6f2df0fc946d02f1481746cc439d59412e74c3da4edfba0138e9aff6b44f11fcd4dc651acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51014e56e4cbf4f08a64ee389e379e3e5
SHA178021c1446090d92a9d0d92c0049898e8339bf12
SHA25697f238114a81fd321f28c85bbda1cf1e5105786cbe2c55dbeb58b31f81075470
SHA512a22e88c738c993acb1b9000c50b278d704cda6915906b96e10e51766d85c21692be99c40c6a8df121d2c831439c42794e1b9a1779fd93e5b51ba6d1c4431b7ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0e2ebf072d214c9c7cf8e8099183481
SHA1ff8fb9936cfb6d6618b479e98ba059bdef00c194
SHA256004932e188141334280fb37d8c73bc7e89c61868a8ad8d0ef7f91ad721d881ff
SHA5128221f2d598317113171a3b86f4a3d49105ad2a99dcf582caa7796076274a74cd67aecfa997fa3519bfcaed634fa98dcf35371b767972061edd389098e9406e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517aa07142532e5df5c3c0b78e5b2977a
SHA167fc2b8098f7254484f678ed8a825a0bb1677bbf
SHA2566d594da7a022ad0ebfc087f0610f662ee612a7d40a8d92e16b4a2c49b087448c
SHA512ba787b78a9c86856dc331c892a9d023a8b0e1b3639021977dc5d734aff19ddb43e2c22a29fc78aba96ca5f34650b3365e1d1f664d4c2de6d5d2847e52877ff5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e3d96c88240d23c3d187f80a141ebd0
SHA1c332f8d0fc982b2c4e354a7ab9b3f9c8e739e937
SHA2567231f2385dc6246825e248cfb4a79d2310db8fad8b40c911d99b785c67b66ee2
SHA51208fd6fe0c949bc965315b8776d78ec85875ddb79b2556f44adf21b5c614f07b0437a049e77ad86657bd4f1b47163fd5c68b807e58891be84502e952a9f286f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d87fceb1ac2cb5d0dc6c25ad3c45b68a
SHA1902e069795416721ddebaeb223da647a05cb36ab
SHA256e42d7a925d8e8e66e37a8dc329629931feb489182deccee68d64a82956b49d5c
SHA51261c14d65386ad8fab984e1e55c3703e6f06dc833f3c0c22d6e27dc89d6d49499b8c7d15fa73fb859d9df93ef455b0c1f899bd56a9208e2f88792ae7d4ee473e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dfe31bf5c2f3cc534f8743bb4969977
SHA1b51b3641a29468b696b152a455b0922ad5f4e498
SHA2562d1742c0db7bd7b3e4e5f5e0790c49bdcdde057a31666453338f7b87493dc8a3
SHA5120623c1cf0ed5d2397a2f64daaf82472759f3eef3ae1504f455be91c7f8f659802f32b11a1ca94b2707865ebc297a524d3fa965981b27aad71a8f15a3eab1ec70
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
500KB
MD5f434ffb5c0ee41107301cdd2870b8cb3
SHA10f07886af55ecc7b12f6e16fbe2ab58d72f7293e
SHA256905c987270df31e328c785f35f4b106624137a71e3785d31af946dd525218211
SHA5123743ad61166066c9393880c54434f9e4dcaafdbd16df737d2e43c27c567e7b0ea20790ca8fe9dcbed775184863cc82e52217ebb9ba771dff4f5dfb43666dde12