Analysis
-
max time kernel
122s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 10:20
Static task
static1
Behavioral task
behavioral1
Sample
fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe
-
Size
348KB
-
MD5
fb25ae4ad306c725f65805a5860afbc2
-
SHA1
95f37a9897a9e87ebeac02af07dad74e065f5402
-
SHA256
ff643671b6b76520a3a2478674914bd64ff41c7de9021e77bdeeb78df2b4a807
-
SHA512
8f2e1467d576be29937bd58586b8e1678b68f17b51579610fc4d51aca8d80ae1491f3704a9f7459165197fec2b61b68a919e11477560aa9665fc4ac461d29eb7
-
SSDEEP
6144:9TXaPzWvU+vHkRBo1lY9djE7aQCzY6/4d2GOuSkvHCJ0nJFIARNeb9BDGkWi:6TAY9G7ao6MnOuSl6wNb9tGkn
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+pnvlc.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/498F10E2EBCBAB79
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/498F10E2EBCBAB79
http://yyre45dbvn2nhbefbmh.begumvelic.at/498F10E2EBCBAB79
http://xlowfznrg4wf7dli.ONION/498F10E2EBCBAB79
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (422) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2840 cmd.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+pnvlc.html gfnlkxsrkuqd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+pnvlc.html gfnlkxsrkuqd.exe -
Executes dropped EXE 2 IoCs
pid Process 3012 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\otimukt = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\gfnlkxsrkuqd.exe" gfnlkxsrkuqd.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2532 set thread context of 2488 2532 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 31 PID 3012 set thread context of 2492 3012 gfnlkxsrkuqd.exe 35 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Journal\Templates\_ReCoVeRy_+pnvlc.html gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Portable Devices\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\(120DPI)grayStateIcon.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sm\LC_MESSAGES\_ReCoVeRy_+pnvlc.html gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\_ReCoVeRy_+pnvlc.html gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\_ReCoVeRy_+pnvlc.html gfnlkxsrkuqd.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\specialmainsubpicture.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_windy.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047_576black.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ku_IQ\LC_MESSAGES\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\_ReCoVeRy_+pnvlc.html gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Microsoft Games\More Games\en-US\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Google\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\_ReCoVeRy_+pnvlc.html gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or_IN\LC_MESSAGES\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationRight_ButtonGraphic.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Other-48.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_top_right.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationUp_SelectionSubpicture.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_ReCoVeRy_+pnvlc.html gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\settings.css gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_ReCoVeRy_+pnvlc.html gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\cpu.css gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\sd\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\DMR_48.jpg gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_ReCoVeRy_+pnvlc.html gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\it-IT\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\_ReCoVeRy_+pnvlc.html gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\_ReCoVeRy_+pnvlc.html gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationLeft_ButtonGraphic.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\_ReCoVeRy_+pnvlc.html gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\trad_s.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-new.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Photo Viewer\de-DE\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\en-US\_ReCoVeRy_+pnvlc.html gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\shuffle_up.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)redStateIcon.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_ReCoVeRy_+pnvlc.txt gfnlkxsrkuqd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\_ReCoVeRy_+pnvlc.png gfnlkxsrkuqd.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\gfnlkxsrkuqd.exe fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe File opened for modification C:\Windows\gfnlkxsrkuqd.exe fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gfnlkxsrkuqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gfnlkxsrkuqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80fcc7bf3651db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB3B1FA1-BD29-11EF-8CD3-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008b594bf5db3f3f40b395d1c3c4e9d5ad000000000200000000001066000000010000200000000a4f755e8893604386f49ffbebeae4127d1d40cd437cb1fcd33538ca0d3698a0000000000e80000000020000200000006c98fef86a7cd8a4ed33a76be3855bb801ee64b450663de10bd40da8e347c80c20000000b587b63527c3b10ff1b770ab47967ec98e55a323f6870f8de86fbe68cef810f6400000006f4739f7841e4d800d4af3d33b4f709ad99801786784c5289cbaaf72fb868831bc40f7f6d51bfa9aeee73fdc565a53fdda8fc459d43dd8bb6abc388485343cb9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2708 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe 2492 gfnlkxsrkuqd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2488 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe Token: SeDebugPrivilege 2492 gfnlkxsrkuqd.exe Token: SeIncreaseQuotaPrivilege 2112 WMIC.exe Token: SeSecurityPrivilege 2112 WMIC.exe Token: SeTakeOwnershipPrivilege 2112 WMIC.exe Token: SeLoadDriverPrivilege 2112 WMIC.exe Token: SeSystemProfilePrivilege 2112 WMIC.exe Token: SeSystemtimePrivilege 2112 WMIC.exe Token: SeProfSingleProcessPrivilege 2112 WMIC.exe Token: SeIncBasePriorityPrivilege 2112 WMIC.exe Token: SeCreatePagefilePrivilege 2112 WMIC.exe Token: SeBackupPrivilege 2112 WMIC.exe Token: SeRestorePrivilege 2112 WMIC.exe Token: SeShutdownPrivilege 2112 WMIC.exe Token: SeDebugPrivilege 2112 WMIC.exe Token: SeSystemEnvironmentPrivilege 2112 WMIC.exe Token: SeRemoteShutdownPrivilege 2112 WMIC.exe Token: SeUndockPrivilege 2112 WMIC.exe Token: SeManageVolumePrivilege 2112 WMIC.exe Token: 33 2112 WMIC.exe Token: 34 2112 WMIC.exe Token: 35 2112 WMIC.exe Token: SeIncreaseQuotaPrivilege 2112 WMIC.exe Token: SeSecurityPrivilege 2112 WMIC.exe Token: SeTakeOwnershipPrivilege 2112 WMIC.exe Token: SeLoadDriverPrivilege 2112 WMIC.exe Token: SeSystemProfilePrivilege 2112 WMIC.exe Token: SeSystemtimePrivilege 2112 WMIC.exe Token: SeProfSingleProcessPrivilege 2112 WMIC.exe Token: SeIncBasePriorityPrivilege 2112 WMIC.exe Token: SeCreatePagefilePrivilege 2112 WMIC.exe Token: SeBackupPrivilege 2112 WMIC.exe Token: SeRestorePrivilege 2112 WMIC.exe Token: SeShutdownPrivilege 2112 WMIC.exe Token: SeDebugPrivilege 2112 WMIC.exe Token: SeSystemEnvironmentPrivilege 2112 WMIC.exe Token: SeRemoteShutdownPrivilege 2112 WMIC.exe Token: SeUndockPrivilege 2112 WMIC.exe Token: SeManageVolumePrivilege 2112 WMIC.exe Token: 33 2112 WMIC.exe Token: 34 2112 WMIC.exe Token: 35 2112 WMIC.exe Token: SeBackupPrivilege 2912 vssvc.exe Token: SeRestorePrivilege 2912 vssvc.exe Token: SeAuditPrivilege 2912 vssvc.exe Token: SeIncreaseQuotaPrivilege 1296 WMIC.exe Token: SeSecurityPrivilege 1296 WMIC.exe Token: SeTakeOwnershipPrivilege 1296 WMIC.exe Token: SeLoadDriverPrivilege 1296 WMIC.exe Token: SeSystemProfilePrivilege 1296 WMIC.exe Token: SeSystemtimePrivilege 1296 WMIC.exe Token: SeProfSingleProcessPrivilege 1296 WMIC.exe Token: SeIncBasePriorityPrivilege 1296 WMIC.exe Token: SeCreatePagefilePrivilege 1296 WMIC.exe Token: SeBackupPrivilege 1296 WMIC.exe Token: SeRestorePrivilege 1296 WMIC.exe Token: SeShutdownPrivilege 1296 WMIC.exe Token: SeDebugPrivilege 1296 WMIC.exe Token: SeSystemEnvironmentPrivilege 1296 WMIC.exe Token: SeRemoteShutdownPrivilege 1296 WMIC.exe Token: SeUndockPrivilege 1296 WMIC.exe Token: SeManageVolumePrivilege 1296 WMIC.exe Token: 33 1296 WMIC.exe Token: 34 1296 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2928 iexplore.exe 2332 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2332 DllHost.exe 2332 DllHost.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2488 2532 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 31 PID 2532 wrote to memory of 2488 2532 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 31 PID 2532 wrote to memory of 2488 2532 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 31 PID 2532 wrote to memory of 2488 2532 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 31 PID 2532 wrote to memory of 2488 2532 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 31 PID 2532 wrote to memory of 2488 2532 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 31 PID 2532 wrote to memory of 2488 2532 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 31 PID 2532 wrote to memory of 2488 2532 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 31 PID 2532 wrote to memory of 2488 2532 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 31 PID 2532 wrote to memory of 2488 2532 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 31 PID 2532 wrote to memory of 2488 2532 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 31 PID 2488 wrote to memory of 3012 2488 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 32 PID 2488 wrote to memory of 3012 2488 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 32 PID 2488 wrote to memory of 3012 2488 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 32 PID 2488 wrote to memory of 3012 2488 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 32 PID 2488 wrote to memory of 2840 2488 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 33 PID 2488 wrote to memory of 2840 2488 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 33 PID 2488 wrote to memory of 2840 2488 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 33 PID 2488 wrote to memory of 2840 2488 fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe 33 PID 3012 wrote to memory of 2492 3012 gfnlkxsrkuqd.exe 35 PID 3012 wrote to memory of 2492 3012 gfnlkxsrkuqd.exe 35 PID 3012 wrote to memory of 2492 3012 gfnlkxsrkuqd.exe 35 PID 3012 wrote to memory of 2492 3012 gfnlkxsrkuqd.exe 35 PID 3012 wrote to memory of 2492 3012 gfnlkxsrkuqd.exe 35 PID 3012 wrote to memory of 2492 3012 gfnlkxsrkuqd.exe 35 PID 3012 wrote to memory of 2492 3012 gfnlkxsrkuqd.exe 35 PID 3012 wrote to memory of 2492 3012 gfnlkxsrkuqd.exe 35 PID 3012 wrote to memory of 2492 3012 gfnlkxsrkuqd.exe 35 PID 3012 wrote to memory of 2492 3012 gfnlkxsrkuqd.exe 35 PID 3012 wrote to memory of 2492 3012 gfnlkxsrkuqd.exe 35 PID 2492 wrote to memory of 2112 2492 gfnlkxsrkuqd.exe 36 PID 2492 wrote to memory of 2112 2492 gfnlkxsrkuqd.exe 36 PID 2492 wrote to memory of 2112 2492 gfnlkxsrkuqd.exe 36 PID 2492 wrote to memory of 2112 2492 gfnlkxsrkuqd.exe 36 PID 2492 wrote to memory of 2708 2492 gfnlkxsrkuqd.exe 43 PID 2492 wrote to memory of 2708 2492 gfnlkxsrkuqd.exe 43 PID 2492 wrote to memory of 2708 2492 gfnlkxsrkuqd.exe 43 PID 2492 wrote to memory of 2708 2492 gfnlkxsrkuqd.exe 43 PID 2492 wrote to memory of 2928 2492 gfnlkxsrkuqd.exe 44 PID 2492 wrote to memory of 2928 2492 gfnlkxsrkuqd.exe 44 PID 2492 wrote to memory of 2928 2492 gfnlkxsrkuqd.exe 44 PID 2492 wrote to memory of 2928 2492 gfnlkxsrkuqd.exe 44 PID 2928 wrote to memory of 2672 2928 iexplore.exe 45 PID 2928 wrote to memory of 2672 2928 iexplore.exe 45 PID 2928 wrote to memory of 2672 2928 iexplore.exe 45 PID 2928 wrote to memory of 2672 2928 iexplore.exe 45 PID 2492 wrote to memory of 1296 2492 gfnlkxsrkuqd.exe 47 PID 2492 wrote to memory of 1296 2492 gfnlkxsrkuqd.exe 47 PID 2492 wrote to memory of 1296 2492 gfnlkxsrkuqd.exe 47 PID 2492 wrote to memory of 1296 2492 gfnlkxsrkuqd.exe 47 PID 2492 wrote to memory of 2224 2492 gfnlkxsrkuqd.exe 49 PID 2492 wrote to memory of 2224 2492 gfnlkxsrkuqd.exe 49 PID 2492 wrote to memory of 2224 2492 gfnlkxsrkuqd.exe 49 PID 2492 wrote to memory of 2224 2492 gfnlkxsrkuqd.exe 49 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System gfnlkxsrkuqd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" gfnlkxsrkuqd.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb25ae4ad306c725f65805a5860afbc2_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\gfnlkxsrkuqd.exeC:\Windows\gfnlkxsrkuqd.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\gfnlkxsrkuqd.exeC:\Windows\gfnlkxsrkuqd.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2492 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT5⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2708
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\GFNLKX~1.EXE5⤵
- System Location Discovery: System Language Discovery
PID:2224
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\FB25AE~1.EXE3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2840
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2332
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5e74bed4c7738ecd8c91c2fb8033fa766
SHA1216b2fd2cce950fe2169220e3b35988c867a70cd
SHA25642d378ee045da9c4d2ff1b1db48488e29ec4f87dc1fd0183b213801c13613d38
SHA512e90befcf4b80b0e487a9a3e387a727f54e8162307f9b4287301b413880dcf317d8970115634265eafd47623d73565d822d173c934d7bf356ef2ba86e2b3b46f7
-
Filesize
65KB
MD5a70873de3e11b005545afc774c545f4c
SHA14d1466fbe6b296446d6655bce7d6db9ba6777813
SHA2565ec7d851c4a6c46c09ce91d6cb32e18fe38e220acbcd03ec14e1e91e31bc7c37
SHA51219dacee6a454e1cee86fe8577ee1d1362fa4bd5ab688713c0fed5085ea40053049a8f2598fd7488282b0127eac1affb05f61473fb99539fd8907b8fcdeefa614
-
Filesize
1KB
MD5285a376a7db69bec5c30d9c8aafce070
SHA16d75001ecb87f3ce6efaa128e7f1fdc77ef1f519
SHA25600712ca2e5bb46457183a584323cd776ddb36f0566fed1532d592d9bd29ae504
SHA5124f4292589e2deeb7eaf86feff782553a7c34b610d895fe057d1a0819d73f04882ee8fa258e1ec1972336c9b82db4867cb50c0086d95846cdaafde065d08a752f
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD56a53fcb3831db22170f83e9e2570ac84
SHA1c1ebc912d6f97a20c90de802ac76ef15a9ebcfed
SHA256d978b668b82520ad75ff82b94972474d73d20dbd100789079b12fa93a2af110c
SHA51254cf6b5c9b2380d8a8a31dfef8436c28c475381a7492d575b34400d39986a8b1d008fed34442c8a5aecb93d40be1ae00e2ab954be19bf13678c33ba7c60de75f
-
Filesize
109KB
MD5858d98396ea67156863c2cce299e781b
SHA1f5e25cad5846fc3eb195075bdf5ac7de1d6316fa
SHA256c42b450ecf36ab8e78e134063b5f596d99e2cfc43e15bc8ec079fbf9dc271e11
SHA5125a1fba41f06179a99932021f22deedc7397e5c974187a8e1b417c14fba9a5bea8c9efc569c64bdace09aaa7cd1d852cf9fc9041c04581b837bb19139e3f2e344
-
Filesize
173KB
MD505402a4056ec43ac38b55854b11fd897
SHA11b391ad34b0652f37baff5487b0aa1735419d7b2
SHA256e35fc98bafb905538a5107c5063892a1ad56c9216b9ffa1dc70f8b22eb9fb773
SHA51212baa2843f63932e67746ef72e7fab3635f64b296cfb8a2ee7734570c14669eed17783bfa3f2a6d343643cd23c68bed8939f855d8784152f3c4f2996fb6cb52d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587453a74c13db3b72f7c8803faad6a01
SHA148fb47925124ca7fa7a20dc7d125cf9e8f14399e
SHA25672bf27a031afb7414d6a540f2fa98f9c8961928337109257a57972a44ff768ed
SHA5128a37f7df29c7dd3c309191545571546e0f53b3947f45b8ce787e6131e93bc3005752b51b3765b42d7c79dcb3b5557961eeb9b85abd198a542f1cd136d633b100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59336b824cdee7c7667abb45901a0dd4f
SHA1db2ab5c03c4e4aef75fdd6d5ac995202bdb8cd14
SHA256580210ead6ec047aee9bfca9c16d2562f64d85397aae090a1112c26b7806516c
SHA512fd235eef4b7046f7332552dab7279c3c3cba31ec2f2db4efeb90ba03cdbe739fe09c6b2ff043fafa54bb74a31ac016ba074aca822ab3f0cf63757983182ce80e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a5199af1ce5e93f7ff7404824a988b7
SHA1b8a3e4a81a7dcbd7428192c638d978cf07369b79
SHA256ad0565c5893196fcc46b56d0a13eea53c34286aeafadf64579b00aa48d647794
SHA512b6311a989c0a77bc36859fd2fb58e382c5d5c69f8f33053143e74749164e4d86ed295c548f34c9e049a659cfed76ed94cdf41b71d360ce36592fe4bb3279e0c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0883e9c212aadaa8b218f63f87d0a24
SHA1926e40aba77ba65f3f029049dbd4bf08290d4565
SHA256bb12cdfbe2983e8bd4f2b874fa194e0bda5bd75852b072a1b01a31b87ab0ee17
SHA512986a2ee861ea64826f757160359eaac48c7187dc95b7f476eb5d7e5fc32b45c7741a9f08dc6b0fe5ae3ea6dfa020dde7fb55d9a52a5a89495f50ff50636eb3f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b47542b3fdbd175aa832f3dce667975
SHA14fae342c846720078f24b27cf45e7504a6429e0c
SHA25649587d687fa78be99f0a6668c1e83451bb9d00e374fd8ea7083cfabd57eebbf1
SHA512e69c530a7f8a8c92a34092135747b7b56b59b345174dec37e5a0df01a5de09533abdce1cb2bbc90e4a6594554f75a17cb88ce98b435086ca5948b125bfdea854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5787845cda271a0e22a2bf464c161aac1
SHA19514f1653ee03bb484eef6ecd9f6fe05540daa0d
SHA25685b10fb3074e6b1b89fcc17e7a3488307114036c9cb5dc7da747898bc24f842e
SHA51246f0c90222996383e613b762d403d32bb25e49544eb44490d639b2864e9a4486f4e24b0aa4bdede3ed1ec592e41389c5617bc19686abb56df7765f303504d4e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563e002cea6de82cf9dc8980109f50db7
SHA12be5f10cb1aeeba913baeb909937352c3f490ac5
SHA256a75ad375062a260d3193b8b1daeefdb9ca74cb52da4b7dc4aac3e0a5f24c3074
SHA5124ec94b61e596e2ef1b5a412c74a6d6775951197a057f2c227b1a58ae205ddce2aaf70f4100d5e083f8db6f719757f1f9a95fb32c0137e533115f10e3d2c09fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f21f0e371570768fb05e7994ea08265f
SHA1ba43defa9c6f2c2c5c155bb40c1572647288e290
SHA2567d97154c05094e8773173690cdc3e73bebaa536005bb172b94670577fc9723d2
SHA512c65dc61862dda0efea79e3bc0ad87be96880a592bbb9c936035bf7c4d03b755780098743bb05791039510bef7d25d519e838636a83dc71325710180fc04a21a3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
348KB
MD5fb25ae4ad306c725f65805a5860afbc2
SHA195f37a9897a9e87ebeac02af07dad74e065f5402
SHA256ff643671b6b76520a3a2478674914bd64ff41c7de9021e77bdeeb78df2b4a807
SHA5128f2e1467d576be29937bd58586b8e1678b68f17b51579610fc4d51aca8d80ae1491f3704a9f7459165197fec2b61b68a919e11477560aa9665fc4ac461d29eb7