Analysis

  • max time kernel
    133s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08/07/2022, 01:43

General

  • Target

    42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe

  • Size

    352KB

  • MD5

    0d704d7223e378e9e5c18d0f53e038da

  • SHA1

    3f6bc9426c8e3eff59b8aad08cdb050ec2d3e7cb

  • SHA256

    42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf

  • SHA512

    f8dabf5ef228f143a699a31e366aa6af3fc13ada4a39448b3982e34c30e2afaeccf3b91c5b2d267ab895b8ffbe7da0daab13f8e49474dd68e47b923c9fd2eb85

Malware Config

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+dacvq.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/779ED861476D90 2 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/779ED861476D90 3 - http://yyre45dbvn2nhbefbmh.begumvelic.at/779ED861476D90 If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/779ED861476D90 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/779ED861476D90 http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/779ED861476D90 http://yyre45dbvn2nhbefbmh.begumvelic.at/779ED861476D90 Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/779ED861476D90
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/779ED861476D90

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/779ED861476D90

http://yyre45dbvn2nhbefbmh.begumvelic.at/779ED861476D90

http://xlowfznrg4wf7dli.ONION/779ED861476D90

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+dacvq.html

Ransom Note
<html> <style>a { color:green; }.tb { background:white; border-style:solid; border-width:1px; padding:3px; border-color:lime; } .ttl { font-size:13px; color:880000; }</style><body style="background:#33CCFF;"> <center> <div style="text-align:left; font-family:Arial; <!---4231213423142134231421342341234 --> font-size:13px; line-height:20px; margin-top:10px; width:800px; background:#F4F4F4; padding:20px; border-style:solid; border-width:5px; border-color:#BABABA;"> <b><font class="ttl"><center><b>NOT YOUR LANGUAGE? USE <a href="https://translate.google.com" target="_blank">Google Translate</a></b></center> What<!------4231213423142134231421342341234 --> happened <!------4231213423142134231421342341234 --> to your<!------4231213423142134231421342341234 --> files?</b></font><br> <font style="font-size:13px;">All <!------4231213423142134231421342341234 -->of your files<!------4231213423142134231421342341234 --> were <!------4231213423142134231421342341234 --> protected by a strong<!------4231213423142134231421342341234 --> encr<!---4231213423142134231421342341234 -->yption wi<!---4231213423142134231421342341234 -->th <!------4231213423142134231421342341234 -->RSA4096 <!------4231213423142134231421342341234 --> <br> More <!------4231213423142134231421342341234 --> information about the <!------4231213423142134231421342341234 -->encryption RSA4096 can be<!------4231213423142134231421342341234 --> fou<!---4231213423142134231421342341234 -->nd <a href= http://en.wikipedia.org/wiki/RSA_(cryptosystem) target="_blank"> htt<!--4231213423142134231421342341234 -->ps:<!--4231213423142134231421342341234 -->//en<!--4231213423142134231421342341234 -->.w<!--4231213423142134231421342341234 -->ikipedia<!--4231213423142134231421342341234 -->.<!--4231213423142134231421342341234 -->org/wiki/RSA_(cry<!--4231213423142134231421342341234 -->ptosystem) </a><br></font> <br><b><font class="ttl">Wh<!--4231213423142134231421342341234 -->at <!------4231213423142134231421342341234 --> does th<!--4231213423142134231421342341234 -->is mean?</b></font><br><font style="font-size:13px;"> T<!--4231213423142134231421342341234 -->his<!------4231213423142134231421342341234 --> mea<!--4231213423142134231421342341234 -->ns that the <!------4231213423142134231421342341234 --> str<!--4231213423142134231421342341234 -->ucture and da<!--4231213423142134231421342341234 -->ta wi<!--4231213423142134231421342341234 -->thin your <!------4231213423142134231421342341234 -->files ha<!--4231213423142134231421342341234 -->ve be<!--4231213423142134231421342341234 -->en<!------4231213423142134231421342341234 --> irre<!--4231213423142134231421342341234 -->voca<!--4231213423142134231421342341234 -->bly changed, you will not be able work wi<!--4231213423142134231421342341234 -->th them, read<!------4231213423142134231421342341234 --> th<!--4231213423142134231421342341234 -->em or see them, <!------4231213423142134231421342341234 -->it is the s<!--4231213423142134231421342341234 -->ame thing <!------4231213423142134231421342341234 -->as los<!--4231213423142134231421342341234 -->ing <!------4231213423142134231421342341234 -->them for<!--4231213423142134231421342341234 -->ever, but with our he<!--4231213423142134231421342341234 -->lp, you <!------4231213423142134231421342341234 --> can re<!--4231213423142134231421342341234 -->st<!--4231213423142134231421342341234 -->ore t<!--4231213423142134231421342341234 -->hem <br><br><b><font class="ttl"><!------4231213423142134231421342341234 -->Ho<!--4231213423142134231421342341234 -->w d<!--4231213423142134231421342341234 -->id th<!--4231213423142134231421342341234 -->is hap<!--4231213423142134231421342341234 -->pen?<!------4231213423142134231421342341234 --></b></font> <br> <!------4231213423142134231421342341234 --> <font style="font-size:13px;"><!------4231213423142134231421342341234 --> Espec<!--4231213423142134231421342341234 -->ially for y<!--4231213423142134231421342341234 -->ou,<!------4231213423142134231421342341234 --> on our SER<!--4231213423142134231421342341234 -->VER <!------4231213423142134231421342341234 -->was gene<!--4231213423142134231421342341234 -->rated <!------4231213423142134231421342341234 -->the sec<!--4231213423142134231421342341234 -->ret k<!--4231213423142134231421342341234 -->ey <br>Al<!--4231213423142134231421342341234-->l y<!--4231213423142134231421342341234-->our <!------4231213423142134231421342341234 --> files w<!--4231213423142134231421342341234-->ere encry<!--4231213423142134231421342341234-->pted with the p<!--4231213423142134231421342341234-->ublic k<!--4231213423142134231421342341234-->ey, <!------4231213423142134231421342341234 --> wh<!--4231213423142134231421342341234-->ich has b<!--4231213423142134231421342341234-->een <!------4231213423142134231421342341234 --> trans<!--4231213423142134231421342341234-->ferred to <!------4231213423142134231421342341234 -->y<!--4231213423142134231421342341234-->our co<!--4231213423142134231421342341234-->mputer via <!------4231213423142134231421342341234 -->the Inter<!--4231213423142134231421342341234-->net.<!--4231213423142134231421342341234--><br> <!------4231213423142134231421342341234 --> Decr<!--4231213423142134231421342341234-->ypting of <!------4231213423142134231421342341234 -->YO<!--4231213423142134231421342341234-->UR FI<!--4231213423142134231421342341234-->LES is <!--4231213423142134231421342341234 -->on<!--4231213423142134231421342341234 -->ly p<!--4231213423142134231421342341234 -->oss<!--4231213423142134231421342341234-->ible <!--- -4231213423142134231421342341234 -->w<!--4231213423142134231421342341234 -->ith the he<!--4231213423142134231421342341234-->lp of t<!--4231213423142134231421342341234 -->he <!----4231213423142134231421342341234 -->pri<!--4231213423142134231421342341234-->va<!--4231213423142134231421342341234 -->te k<!--4231213423142134231421342341234-->ey a<!--4231213423142134231421342341234 -->nd <!--4231213423142134231421342341234 -->d<!--4231213423142134231421342341234 -->ecr<!--4231213423142134231421342341234-->ypt p<!--4231213423142134231421342341234 -->rog<!--4231213423142134231421342341234-->ram <!--4231213423142134231421342341234 -->wh<!--4231213423142134231421342341234-->ich is on our <!--- -4231213423142134231421342341234 -->Sec<!--4231213423142134231421342341234-->ret <!--4231213423142134231421342341234 -->Ser<!--4231213423142134231421342341234-->ver!!! </font><br><br><b><font class="ttl">Wh<!--4231213423142134231421342341234-->at do I do?</b></font> <br><font style="font-size:13px;">Alas, if you <!--4231213423142134231421342341234 --> do not take <!---4231213423142134231421342341234 --> the nece<!--4231213423142134231421342341234-->ssary meas<!--4231213423142134231421342341234-->ures <!--4231213423142134231421342341234-->for the spec<!--4231213423142134231421342341234-->ified ti<!--4231213423142134231421342341234-->me th<!--4231213423142134231421342341234-->en t<!--4231213423142134231421342341234-->he co<!--4231213423142134231421342341234-->nditions fo<!--4231213423142134231421342341234-->r obta<!--4231213423142134231421342341234-->ining the priv<!--4231213423142134231421342341234-->ate ke<!--4231213423142134231421342341234-->y w<!--4231213423142134231421342341234-->ill be cha<!--4231213423142134231421342341234-->nged<!--- 4231213423142134231421342341234 --> <br> <!-----4231213423142134231421342341234 --> If you really need <!------4231213423142134231421342341234 --> your data, <!------4231213423142134231421342341234 -->then we suggest you <!------4231213423142134231421342341234 --> do not waste<!------4231213423142134231421342341234 --> valuable <!------4231213423142134231421342341234 --> time searching <!------4231213423142134231421342341234 -->for other <!------4231213423142134231421342341234 --> solutions <!------4231213423142134231421342341234 -->becausen <!----4231213423142134231421342341234 --> they do not exist.</font><br><br> <!----4231213423142134231421342341234 --><div class="tb" style="color:#880000; font-size:13px; border-width:3px;">For more specific instructions, please<!------4231213423142134231421342341234 --> visit your <!------4231213423142134231421342341234 --> personal <!------4231213423142134231421342341234 -->home page,<!------4231213423142134231421342341234 --> there are<!------4231213423142134231421342341234 --> a few <!------4231213423142134231421342341234 -->different <!------4231213423142134231421342341234 -->addresses<!------4231213423142134231421342341234 --> pointing to <!------4231213423142134231421342341234 --> your page<!------4231213423142134231421342341234 --> below:<b><hr> <!---000==-=-==-=-=-=-=-=-=---> 1 - <a href=http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/779ED861476D90 target="_blank">http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/779ED861476D90</a> <br> <!------000==-=-==-=-=-=-=-=-= --> 2 - <a href=http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/779ED861476D90 target="_blank">http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/779ED861476D90</a> <br> <!------000==-=-==-=-=-=-=-=-= --> 3 - <a href=http://yyre45dbvn2nhbefbmh.begumvelic.at/779ED861476D90 target="_blank">http://yyre45dbvn2nhbefbmh.begumvelic.at/779ED861476D90</a> <br> <!------000==-=-==-=-=-=-=-=-= --></div><br><div class="tb" style="font-size:13px; border-color:#880000;"><b>If for some reasons the <!-----000==-=-==-=-=-=-=-=-= --> addresses are not available, <!------000==-=-==-=-=-=-=-=-= --> follow these steps:</b> <hr> 1 - <!------000==-=-==-=-=-=-=-=-= --> Download and <!------000==-=-==-=-=-=-=-=-= --> install tor-browser: <a href=http://www.torproject.org/projects/torbrowser.html.en target="_blank">http://www.torproject.org/projects/torbrowser.html.en</a><br> 2 - <!---000==-=-==-=-=-=-=-=-= --> Af<!---000==-=-==-=-=-=-=-=-=--->ter a<!---000==-=-==-=-=-=-=-=-=---> succe<!---000==-=-==-=-=-=-=-=-=--->ssful<!------000==-=-==-=-=-=-=-=-= --> instal<!---000==-=-==-=-=-=-=-=-=--->lation, run the br<!---000==-=-==-=-=-=-=-=-=--->owser and w<!---000==-=-==-=-=-=-=-=-=--->ait for initi<!---000==-=-==-=-=-=-=-=-=--->alization.<br> 3 - <!--- 000==-=-==-=-=-=-=-=-= --> Ty<!---000==-=-==-=-=-=-=-=-=--->pe<!-- 000==-=-==-=-=-=-=-=-= --> in<!-- 000==-=-==-=-=-=-=-=-= --> the t<!---000==-=-==-=-=-=-=-=-=--->or-bro<!---000==-=-==-=-=-=-=-=-=--->wser<!-- 000==-=-==-=-=-=-=-=-= --> add<!---000==-=-==-=-=-=-=-=-=--->ress<!-- 000==-=-==-=-=-=-=-=-= --> bar: <font style="font-weight:bold; color:#009977;"><!-- 000==-=-==-=-=-=-=-=-= -->xlowfznrg4wf7dli.onion/779ED861476D90<!-- 000==-=-==-=-=-=-=-=-= --></font><!-- 000==-=-==-=-=-=-=-=-= --><br> 4 - <!--- 000==-=-==-=-=-=-=-=-= --> Fol<!---000==-=-==-=-=-=-=-=-=--->low the instr<!---000==-=-==-=-=-=-=-=-=--->uctions <!-- 000==-=-==-=-=-=-=-=-= --> on the site.</div><br><br><b>!!! IMPO<!---000==-=-==-=-=-=-=-=-=--->RTANT INFO<!---000==-=-==-=-=-=-=-=-=--->RMATION:</b><br> <!-----000==-=-==-=-=-=-=-=-= --><div class="tb" style="width:790px;"><!-----000==-=-==-=-=-=-=-=-= --> Yo<!---000==-=-==-=-=-=-=-=-=--->ur Pers<!---000==-=-==-=-=-=-=-=-=--->onal PAGES<b>: <br> <a href=http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/779ED861476D90 target="_blank">http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/779ED861476D90</a> <br><a href=http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/779ED861476D90 target="_blank">http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/779ED861476D90</a> <br> <!-----000==-=-==-=-=-=-=-=-= --><a href=http://yyre45dbvn2nhbefbmh.begumvelic.at/779ED861476D90 target="_blank">http://yyre45dbvn2nhbefbmh.begumvelic.at/779ED861476D90</a> <br> <!-----000==-=-==-=-=-=-=-=-= --> Your <!------000==-=-==-=-=-=-=-=-= --> Personal TOR-Browser<!-----000==-=-==-=-=-=-=-=-= --> page : <!-----000==-=-==-=-=-=-=-=-= --><font style="font-weight:bold; color:#009977;"><!-- 000==-=-==-=-=-=-=-=-= -->xlowfznrg4wf7dli.onion/779ED861476D90<!-- 000==-=-==-=-=-=-=-=-= --></font><br> <!-----000==-=-==-=-=-=-=-=-= --> Your personal <!------000==-=-==-=-=-=-=-=-= --> ID <!-----000==-=-==-=-=-=-=-=-= --> (if you open <!------000==-=-==-=-=-=-=-=-= --> the site directly): <!-----000==-=-==-=-=-=-=-=-= --> <font style="font-weight:bold; color:#770000;">779ED861476D90</font><br> </div></div></center></body></html>

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon

    suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe
    "C:\Users\Admin\AppData\Local\Temp\42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\lywnyvxecara.exe
      C:\Windows\lywnyvxecara.exe
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Drops startup file
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1248
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:568
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:212
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:232
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:232 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1592
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1440
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\LYWNYV~1.EXE
        3⤵
          PID:1828
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\42B053~1.EXE
        2⤵
        • Deletes itself
        PID:1648
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:560
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:1628

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\RECOVERY.HTM

      Filesize

      12KB

      MD5

      aa93108c9fc63659bd51e38944f21eb7

      SHA1

      208a472c677904d0c82286d7967ad231a4c81314

      SHA256

      45fed373684f03044186850bcc7445486d11b51f28373d315abbd7e9d19a01fb

      SHA512

      e3bc8be71f08b05724840581866d53b394176e135c2837980b284d39bb6db56f219bf6982c6dd50270a267478b8bcaea65574abea21fa886e798bef5a0590a69

    • C:\Users\Admin\Desktop\RECOVERY.TXT

      Filesize

      1KB

      MD5

      07ee92b341201ae74248b206650e50e0

      SHA1

      d5ae1fc341ab234bd927989146f6050eaf7c15b3

      SHA256

      5d317444e56e990fc69a36ba79c3358c6d45f928991f0e2f2f0d3ba3f3809a84

      SHA512

      bb0d97fed3c61f282e7597ca9ff8f5601cb8bb7db3835b992452061f079aad2b0526cbe8e18d014151b00dd2738df9c8c242ebe5913bc587985a4edc9b52c010

    • C:\Users\Admin\Desktop\RECOVERY.png

      Filesize

      64KB

      MD5

      4ec4c9d4c2873ddd4d085e1a024f9060

      SHA1

      2863846684b833ea3a2d399afd3175cec9a979bb

      SHA256

      3d5828d87db739327c7ad0b0f5106a81544323fc8e07f4c271aedf2f2377a518

      SHA512

      f536c067799e10ee22fb6b9a3e3290ed4cbcae2fde5ed451ada5188403cf7f3de4383c5ab0a96c7938e32a8a78e43386d1f010f06a21af8964228bf0d504fe5b

    • C:\Windows\lywnyvxecara.exe

      Filesize

      352KB

      MD5

      0d704d7223e378e9e5c18d0f53e038da

      SHA1

      3f6bc9426c8e3eff59b8aad08cdb050ec2d3e7cb

      SHA256

      42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf

      SHA512

      f8dabf5ef228f143a699a31e366aa6af3fc13ada4a39448b3982e34c30e2afaeccf3b91c5b2d267ab895b8ffbe7da0daab13f8e49474dd68e47b923c9fd2eb85

    • C:\Windows\lywnyvxecara.exe

      Filesize

      352KB

      MD5

      0d704d7223e378e9e5c18d0f53e038da

      SHA1

      3f6bc9426c8e3eff59b8aad08cdb050ec2d3e7cb

      SHA256

      42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf

      SHA512

      f8dabf5ef228f143a699a31e366aa6af3fc13ada4a39448b3982e34c30e2afaeccf3b91c5b2d267ab895b8ffbe7da0daab13f8e49474dd68e47b923c9fd2eb85

    • memory/1248-62-0x0000000000400000-0x00000000004AE000-memory.dmp

      Filesize

      696KB

    • memory/1248-64-0x0000000000400000-0x00000000004AE000-memory.dmp

      Filesize

      696KB

    • memory/1248-74-0x0000000000400000-0x00000000004AE000-memory.dmp

      Filesize

      696KB

    • memory/2024-54-0x0000000076011000-0x0000000076013000-memory.dmp

      Filesize

      8KB

    • memory/2024-61-0x0000000000400000-0x00000000004AE000-memory.dmp

      Filesize

      696KB

    • memory/2024-56-0x0000000000400000-0x00000000004AE000-memory.dmp

      Filesize

      696KB

    • memory/2024-55-0x0000000000290000-0x00000000002BF000-memory.dmp

      Filesize

      188KB