Analysis

  • max time kernel
    1814s
  • max time network
    1819s
  • platform
    windows10_x64
  • resource
    win10-20220331-en
  • submitted
    07-04-2022 19:41

General

  • Target

    VirusShare_0d8ff116ce8976fc820c996a6ee90c3a.exe

  • Size

    324KB

  • MD5

    0d8ff116ce8976fc820c996a6ee90c3a

  • SHA1

    f04aa63508e99c54095cba747f31fb28fbfd392e

  • SHA256

    25c1c67de6ead9c4efd8372caccfbba80cc77667dd9b172e5535b1c7a7b81a5e

  • SHA512

    2c2c7b2eac7ac70d0bba26821a52e72e443428c154368c0ca173ff9901bcfdab386d81a759478ca6e85211003eb5fe3bebef076533eed647ad4803054a38311a

Malware Config

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-3729659790-1998850411-3319863756-1000\how_recover+aqr.txt

Ransom Note
________________________1234____________________________________- What happened to your files ? All of your files were protected by a strong encryption with RSA-2048. More information about the encryption keys using RSA-2048 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) What does this mean ? This means that the structure and data within your files have been irrevocably changed, you will not be able to work with them, read them or see them, it is the same thing as losing them forever, but with our help, you can restore them. How did this happen ? Especially for you, on our server was generated the secret key pair RSA-2048 - public and private. All your files were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of your files is only possible with the help of the private key and decrypt program, which is on our secret server. What do I do ? ________________________1234____________________________________ Alas, if you do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed. If you really value your data, then we suggest you do not waste valuable time searching for other solutions because they do not exist. ________________________1234____________________________________ For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gfhshhf.home7dfg4.com/A1C3162A4A639533 2. http://td63hftt.buwve5ton2.com/A1C3162A4A639533 3. https://tw7kaqthui5ojcez.onion.to/A1C3162A4A639533 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization. 3. Type in the address bar: tw7kaqthui5ojcez.onion/A1C3162A4A639533 4. Follow the instructions on the site. IMPORTANT INFORMATION: Your personal pages: http://gfhshhf.home7dfg4.com/A1C3162A4A639533 http://td63hftt.buwve5ton2.com/A1C3162A4A639533 https://tw7kaqthui5ojcez.onion.to/A1C3162A4A639533 Your personal page (using TOR-Browser): tw7kaqthui5ojcez.onion/A1C3162A4A639533 Your personal identification number (if you open the site (or TOR-Browser's) directly): A1C3162A4A639533
URLs

http://gfhshhf.home7dfg4.com/A1C3162A4A639533

http://td63hftt.buwve5ton2.com/A1C3162A4A639533

https://tw7kaqthui5ojcez.onion.to/A1C3162A4A639533

http://tw7kaqthui5ojcez.onion/A1C3162A4A639533

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-3729659790-1998850411-3319863756-1000\how_recover+aqr.html

Ransom Note
<html> <!-- 1274zskjdhfsdal9021842__ --> <style>a { color:green; }.tb { background:white; border-style:solid; border-width:1px; padding:3px; border-color:lime; } .ttl { font-size:13px; color:880000; }</style><body style="background:#33CCFF;"> <!--1274zskjdhfsdal9021842__-1274zskjdhfsdal9021842__ --> <center> <div style="text-align:left; font-family:Arial; <!------1274zskjdhfsdal9021842__ --> font-size:13px; line-height:20px; margin-top:10px; width:800px; background:#F4F4F4; padding:20px; border-style:solid; border-width:5px; border-color:#BABABA;"> <b><font class="ttl">What happened <!------1274zskjdhfsdal9021842__ --> to your files?</b></font><br> <font style="font-size:13px;">All of your files were<!------1274zskjdhfsdal9021842__ --> protected by a strong<!------1274zskjdhfsdal9021842__ --> encryption with<!------1274zskjdhfsdal9021842__ --> RSA-2048 <br> More information about the <!------1274zskjdhfsdal9021842__ -->encryption RSA-2048 can be<!------1274zskjdhfsdal9021842__ --> found here: <a href="http://en.wikipedia.org/wiki/RSA_(cryptosystem)" target="_blank">http://en.wikipedia.org/wiki/RSA_(cryptosystem)</a><br></font> <br><b><font class="ttl">What <!------1274zskjdhfsdal9021842__ --> does this mean?</b></font><br><font style="font-size:13px;"> This<!------1274zskjdhfsdal9021842__ --> means that the <!------1274zskjdhfsdal9021842__ --> structure and data within your files have been irrevocably <!------1274zskjdhfsdal9021842__ -->changed, you will not be able to work<br> with them, read<!------1274zskjdhfsdal9021842__ --> them or see them, it is the same thing <!------2333232 -->as losing them forever, but with our help, you can restore them.</font><br><br><b><font class="ttl">How did this happen?</b></font> <br> <font style="font-size:13px;"> Especially for you, on our server was generated the secret key pair RSA-2048 - public and private. <br>All your <!------1274zskjdhfsdal9021842__ --> files were encrypted with the public key, <!------1274zskjdhfsdal9021842__ --> which has been <!------1274zskjdhfsdal9021842__ --> transferred to <!------1274zskjdhfsdal9021842__ -->your computer via <!------1274zskjdhfsdal9021842__ -->the Internet.<br> <!------1274zskjdhfsdal9021842__ --> Decrypting of <!------1274zskjdhfsdal9021842__ -->YOUR FILES is <!------1274zskjdhfsdal9021842__ -->only possible <!--- -1274zskjdhfsdal9021842__ -->with the help of the <!----1274zskjdhfsdal9021842__ -->private key and <!--1274zskjdhfsdal9021842__ -->decrypt program, <!------1274zskjdhfsdal9021842__ -->which is on our <!--- -1274zskjdhfsdal9021842__ -->Secret Server!!! *</font><br><br><b><font class="ttl">What do I do?</b></font> <br><font style="font-size:13px;">Alas, if you <!------dsgdfgsdg --> do not take <!------1274zskjdhfsdal9021842__ --> the necessary measures <!------1274zskjdhfsdal9021842__ -->for the specified <!------1274zskjdhfsdal9021842__ --> time then the conditions for <!------1274zskjdhfsdal9021842__ --> obtaining the private key will be changed.<br> <!------1274zskjdhfsdal9021842__ --> If you really need <!------1274zskjdhfsdal9021842__ --> your data, then we suggest you <!------1274zskjdhfsdal9021842__ --> do not waste valuable <!------1274zskjdhfsdal9021842__ --> time searching for other <!------1274zskjdhfsdal9021842__ --> solutions becausen <!------1274zskjdhfsdal9021842__ --> they do not exist.</font><br><br> <!------1274zskjdhfsdal9021842__ --><div class="tb" style="color:#880000; font-size:13px; border-width:3px;">For more specific instructions, please visit your <!------1274zskjdhfsdal9021842__ --> personal home page, there are a few <!------1274zskjdhfsdal9021842__ --> different addresses pointing to <!------1274zskjdhfsdal9021842__ --> your page below: <hr> <!------1274zskjdhfsdal9021842__ --><b>1.<a href="http://gfhshhf.home7dfg4.com/A1C3162A4A639533" target="_blank">http://gfhshhf.home7dfg4.com/A1C3162A4A639533</a></b><br> <!------1274zskjdhfsdal9021842__ --><b>2.<a href="http://td63hftt.buwve5ton2.com/A1C3162A4A639533" target="_blank">http://td63hftt.buwve5ton2.com/A1C3162A4A639533</a></b><br> <!------1274zskjdhfsdal9021842__ --><b>3.<a href="https://tw7kaqthui5ojcez.onion.to/A1C3162A4A639533" target="_blank">https://tw7kaqthui5ojcez.onion.to/A1C3162A4A639533</a></b><br> <!------1274zskjdhfsdal9021842__ --></div><br><div class="tb" style="font-size:13px; border-color:#880000;">If for some reasons the <!------1274zskjdhfsdal9021842__ --> addresses are not available, <!------1274zskjdhfsdal9021842__ --> follow these steps: <hr> 1. <!------1274zskjdhfsdal9021842__ --> Download and <!------1274zskjdhfsdal9021842__ --> install tor-browser: <a href="http://www.torproject.org/projects/torbrowser.html.en" target="_blank">http://www.torproject.org/projects/torbrowser.html.en</a><br> 2. <!--1274zskjdhfsdal9021842__ --> After a successful<!------1274zskjdhfsdal9021842__ --> installation, run the browser and wait for initialization.<br> 3. <!-- 1274zskjdhfsdal9021842__ --> Type<!-- 1274zskjdhfsdal9021842__ --> in<!-- 1274zskjdhfsdal9021842__ --> the tor-browser<!-- 1274zskjdhfsdal9021842__ --> address<!-- 1274zskjdhfsdal9021842__ --> bar: <font style="font-weight:bold; color:#009977;"><!-- 1274zskjdhfsdal9021842__ -->tw7kaqthui5ojcez.onion/A1C3162A4A639533<!-- 1274zskjdhfsdal9021842__ --></font><!-- 1274zskjdhfsdal9021842__ --><br> 4. <!-- 1274zskjdhfsdal9021842__ --> Follow the instructions <!-- 1274zskjdhfsdal9021842__ --> on the site.</div><br><br><b>IMPORTANT INFORMATION:</b><br> <div class="tb" style="width:790px;"> <!------1274zskjdhfsdal9021842__ --> Your Personal PAGES: <b><br> <a href="http://gfhshhf.home7dfg4.com/A1C3162A4A639533" target="_blank">http://gfhshhf.home7dfg4.com/A1C3162A4A639533</a> <br> <!------1274zskjdhfsdal9021842__ --><a href="http://td63hftt.buwve5ton2.com/A1C3162A4A639533" target="_blank">http://td63hftt.buwve5ton2.com/A1C3162A4A639533</a> <br> <!------1274zskjdhfsdal9021842__ --> <a href="https://tw7kaqthui5ojcez.onion.to/A1C3162A4A639533" target="_blank"> <!------1274zskjdhfsdal9021842__ --> https://tw7kaqthui5ojcez.onion.to/A1C3162A4A639533</a> </b> <br> <!------1274zskjdhfsdal9021842__ --> Your <!------1274zskjdhfsdal9021842__ --> Personal PAGES <!------1274zskjdhfsdal9021842__ --> (using TOR-Browser): <!------1274zskjdhfsdal9021842__ --><font style="font-weight:bold; color:#009977;"><!-- 1274zskjdhfsdal9021842__ -->tw7kaqthui5ojcez.onion/A1C3162A4A639533<!-- 1274zskjdhfsdal9021842__ --></font><br> <!------1274zskjdhfsdal9021842__ --> Your personal <!------1274zskjdhfsdal9021842__ --> code <!------1274zskjdhfsdal9021842__ --> (if you open the <!------1274zskjdhfsdal9021842__ --> site (or TOR-Browser's) directly): <!------1274zskjdhfsdal9021842__ --> <font style="font-weight:bold; color:#770000;">A1C3162A4A639533</font><br> </div></div></center></body></html>
URLs

https://tw7kaqthui5ojcez.onion.to/A1C3162A4A639533</a>

Extracted

Path

C:\Users\Admin\Desktop\Howto_RESTORE_FILES.html

Ransom Note
to your files? protected by a strong encryption with RSA-2048 More information about the encryption RSA-2048 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) does this mean? means that the structure and data within your files have been irrevocably changed, you will not be able to work with them, read them or see them, it is the same thing as losing them forever, but with our help, you can restore them. All your files were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of YOUR FILES is only possible with the help of the private key and decrypt program, which is on our Secret Server!!! * do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed. If you really need your data, then we suggest you do not waste valuable time searching for other solutions becausen they do not exist. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1.http://gfhshhf.home7dfg4.com/A1C3162A4A639533 2.http://td63hftt.buwve5ton2.com/A1C3162A4A639533 3.https://tw7kaqthui5ojcez.onion.to/A1C3162A4A639533 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization. 3. Type in the tor-browser address bar: tw7kaqthui5ojcez.onion/A1C3162A4A639533 4. Follow the instructions on the site. IMPORTANT INFORMATION: Your Personal PAGES: http://gfhshhf.home7dfg4.com/A1C3162A4A639533 http://td63hftt.buwve5ton2.com/A1C3162A4A639533 https://tw7kaqthui5ojcez.onion.to/A1C3162A4A639533 Your Personal PAGES (using TOR-Browser): tw7kaqthui5ojcez.onion/A1C3162A4A639533 Your personal code (if you open the site (or TOR-Browser's) directly):
URLs

http://tw7kaqthui5ojcez.onion/A1C3162A4A639533

http://gfhshhf.home7dfg4.com/A1C3162A4A639533

http://td63hftt.buwve5ton2.com/A1C3162A4A639533

https://tw7kaqthui5ojcez.onion.to/A1C3162A4A639533

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_0d8ff116ce8976fc820c996a6ee90c3a.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_0d8ff116ce8976fc820c996a6ee90c3a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Local\Temp\VirusShare_0d8ff116ce8976fc820c996a6ee90c3a.exe
      "C:\Users\Admin\AppData\Local\Temp\VirusShare_0d8ff116ce8976fc820c996a6ee90c3a.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Users\Admin\AppData\Roaming\giiit-a.exe
        C:\Users\Admin\AppData\Roaming\giiit-a.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2108
        • C:\Users\Admin\AppData\Roaming\giiit-a.exe
          C:\Users\Admin\AppData\Roaming\giiit-a.exe
          4⤵
          • Executes dropped EXE
          • Modifies extensions of user files
          • Checks computer location settings
          • Drops startup file
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2676
          • C:\Windows\SYSTEM32\bcdedit.exe
            bcdedit.exe /set {current} bootems off
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:2308
          • C:\Windows\SYSTEM32\bcdedit.exe
            bcdedit.exe /set {current} advancedoptions off
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:3840
          • C:\Windows\SYSTEM32\bcdedit.exe
            bcdedit.exe /set {current} optionsedit off
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:4136
          • C:\Windows\SYSTEM32\bcdedit.exe
            bcdedit.exe /set {current} bootstatuspolicy IgnoreAllFailures
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:4332
          • C:\Windows\SYSTEM32\bcdedit.exe
            bcdedit.exe /set {current} recoveryenabled off
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:4428
          • C:\Windows\System32\vssadmin.exe
            "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
            5⤵
            • Interacts with shadow copies
            PID:1324
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Howto_RESTORE_FILES.txt
            5⤵
            • Opens file in notepad (likely ransom note)
            PID:1708
          • C:\Windows\System32\vssadmin.exe
            "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
            5⤵
            • Interacts with shadow copies
            PID:2768
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Roaming\giiit-a.exe
            5⤵
              PID:8
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE
          3⤵
            PID:2544
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4648
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
        1⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3748
      • C:\Windows\system32\browser_broker.exe
        C:\Windows\system32\browser_broker.exe -Embedding
        1⤵
        • Modifies Internet Explorer settings
        PID:3896
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:792
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2172
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1816
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        PID:2544

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      File Deletion

      2
      T1107

      Modify Registry

      3
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      1
      T1005

      Impact

      Inhibit System Recovery

      3
      T1490

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\how_recover+aqr.html
        Filesize

        6KB

        MD5

        e18dba1ebbcab07a2b7185a9f2153387

        SHA1

        a50ad8974c5d22deace6eace082213bf10268df7

        SHA256

        c555e14994754b6c36bcdd0bbcc3764a377c91ca42e6a99f1238bc051502b03b

        SHA512

        0f335cf12265fc0bfe634eb491803e89c6aa131348590b49c35566240810c87b2b848c11444999275f58ed2841d6f1e7af7d3ce2ecf8aeb6f307f797a6946ea6

      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\how_recover+aqr.txt
        Filesize

        2KB

        MD5

        b66aa2f0d1e866cb2cff6f450c96032c

        SHA1

        077c6ef88987c26d01a94eeadd9453f82e66a045

        SHA256

        0f941d99308f47505a2ca3d72addd1baf5684c58a388e88875766d12e524ce77

        SHA512

        8ba0459a1dc6f797b795769afbe5dd4862c0107ae173b87caac5cf126ac797ae0e4737024de6e15c890c8f0a10570c8f635d412c9b3eb374d9d0b8f13a74057f

      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\how_recover+aqr.html
        Filesize

        6KB

        MD5

        e18dba1ebbcab07a2b7185a9f2153387

        SHA1

        a50ad8974c5d22deace6eace082213bf10268df7

        SHA256

        c555e14994754b6c36bcdd0bbcc3764a377c91ca42e6a99f1238bc051502b03b

        SHA512

        0f335cf12265fc0bfe634eb491803e89c6aa131348590b49c35566240810c87b2b848c11444999275f58ed2841d6f1e7af7d3ce2ecf8aeb6f307f797a6946ea6

      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\how_recover+aqr.txt
        Filesize

        2KB

        MD5

        b66aa2f0d1e866cb2cff6f450c96032c

        SHA1

        077c6ef88987c26d01a94eeadd9453f82e66a045

        SHA256

        0f941d99308f47505a2ca3d72addd1baf5684c58a388e88875766d12e524ce77

        SHA512

        8ba0459a1dc6f797b795769afbe5dd4862c0107ae173b87caac5cf126ac797ae0e4737024de6e15c890c8f0a10570c8f635d412c9b3eb374d9d0b8f13a74057f

      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\how_recover+aqr.html
        Filesize

        6KB

        MD5

        e18dba1ebbcab07a2b7185a9f2153387

        SHA1

        a50ad8974c5d22deace6eace082213bf10268df7

        SHA256

        c555e14994754b6c36bcdd0bbcc3764a377c91ca42e6a99f1238bc051502b03b

        SHA512

        0f335cf12265fc0bfe634eb491803e89c6aa131348590b49c35566240810c87b2b848c11444999275f58ed2841d6f1e7af7d3ce2ecf8aeb6f307f797a6946ea6

      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\how_recover+aqr.txt
        Filesize

        2KB

        MD5

        b66aa2f0d1e866cb2cff6f450c96032c

        SHA1

        077c6ef88987c26d01a94eeadd9453f82e66a045

        SHA256

        0f941d99308f47505a2ca3d72addd1baf5684c58a388e88875766d12e524ce77

        SHA512

        8ba0459a1dc6f797b795769afbe5dd4862c0107ae173b87caac5cf126ac797ae0e4737024de6e15c890c8f0a10570c8f635d412c9b3eb374d9d0b8f13a74057f

      • C:\Users\Admin\AppData\Roaming\giiit-a.exe
        Filesize

        324KB

        MD5

        0d8ff116ce8976fc820c996a6ee90c3a

        SHA1

        f04aa63508e99c54095cba747f31fb28fbfd392e

        SHA256

        25c1c67de6ead9c4efd8372caccfbba80cc77667dd9b172e5535b1c7a7b81a5e

        SHA512

        2c2c7b2eac7ac70d0bba26821a52e72e443428c154368c0ca173ff9901bcfdab386d81a759478ca6e85211003eb5fe3bebef076533eed647ad4803054a38311a

      • C:\Users\Admin\AppData\Roaming\giiit-a.exe
        Filesize

        324KB

        MD5

        0d8ff116ce8976fc820c996a6ee90c3a

        SHA1

        f04aa63508e99c54095cba747f31fb28fbfd392e

        SHA256

        25c1c67de6ead9c4efd8372caccfbba80cc77667dd9b172e5535b1c7a7b81a5e

        SHA512

        2c2c7b2eac7ac70d0bba26821a52e72e443428c154368c0ca173ff9901bcfdab386d81a759478ca6e85211003eb5fe3bebef076533eed647ad4803054a38311a

      • C:\Users\Admin\AppData\Roaming\giiit-a.exe
        Filesize

        324KB

        MD5

        0d8ff116ce8976fc820c996a6ee90c3a

        SHA1

        f04aa63508e99c54095cba747f31fb28fbfd392e

        SHA256

        25c1c67de6ead9c4efd8372caccfbba80cc77667dd9b172e5535b1c7a7b81a5e

        SHA512

        2c2c7b2eac7ac70d0bba26821a52e72e443428c154368c0ca173ff9901bcfdab386d81a759478ca6e85211003eb5fe3bebef076533eed647ad4803054a38311a

      • C:\Users\Admin\Desktop\Howto_RESTORE_FILES.html
        Filesize

        6KB

        MD5

        e18dba1ebbcab07a2b7185a9f2153387

        SHA1

        a50ad8974c5d22deace6eace082213bf10268df7

        SHA256

        c555e14994754b6c36bcdd0bbcc3764a377c91ca42e6a99f1238bc051502b03b

        SHA512

        0f335cf12265fc0bfe634eb491803e89c6aa131348590b49c35566240810c87b2b848c11444999275f58ed2841d6f1e7af7d3ce2ecf8aeb6f307f797a6946ea6

      • C:\Users\Admin\Desktop\Howto_RESTORE_FILES.txt
        Filesize

        2KB

        MD5

        b66aa2f0d1e866cb2cff6f450c96032c

        SHA1

        077c6ef88987c26d01a94eeadd9453f82e66a045

        SHA256

        0f941d99308f47505a2ca3d72addd1baf5684c58a388e88875766d12e524ce77

        SHA512

        8ba0459a1dc6f797b795769afbe5dd4862c0107ae173b87caac5cf126ac797ae0e4737024de6e15c890c8f0a10570c8f635d412c9b3eb374d9d0b8f13a74057f

      • memory/8-142-0x0000000000000000-mapping.dmp
      • memory/1324-136-0x0000000000000000-mapping.dmp
      • memory/1708-137-0x0000000000000000-mapping.dmp
      • memory/1744-116-0x0000000000500000-0x00000000005AE000-memory.dmp
        Filesize

        696KB

      • memory/1804-118-0x00000000004097F0-mapping.dmp
      • memory/1804-117-0x0000000000400000-0x0000000000486000-memory.dmp
        Filesize

        536KB

      • memory/1804-119-0x0000000000400000-0x0000000000486000-memory.dmp
        Filesize

        536KB

      • memory/1804-120-0x0000000000400000-0x0000000000486000-memory.dmp
        Filesize

        536KB

      • memory/2108-121-0x0000000000000000-mapping.dmp
      • memory/2108-124-0x0000000000830000-0x0000000000833000-memory.dmp
        Filesize

        12KB

      • memory/2308-131-0x0000000000000000-mapping.dmp
      • memory/2544-125-0x0000000000000000-mapping.dmp
      • memory/2676-127-0x00000000004097F0-mapping.dmp
      • memory/2676-130-0x0000000000400000-0x0000000000486000-memory.dmp
        Filesize

        536KB

      • memory/2676-129-0x0000000000400000-0x0000000000486000-memory.dmp
        Filesize

        536KB

      • memory/2768-140-0x0000000000000000-mapping.dmp
      • memory/3840-132-0x0000000000000000-mapping.dmp
      • memory/4136-133-0x0000000000000000-mapping.dmp
      • memory/4332-134-0x0000000000000000-mapping.dmp
      • memory/4428-135-0x0000000000000000-mapping.dmp