Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2022 02:30

General

  • Target

    59e41ddd00ec0f9375bee65606258c6695e320af3b28344687085ab278492da1.exe

  • Size

    343KB

  • MD5

    343a036fc9dcbacc81140314bd27fe39

  • SHA1

    b69052312a15863643916ed44b037dee85017aea

  • SHA256

    59e41ddd00ec0f9375bee65606258c6695e320af3b28344687085ab278492da1

  • SHA512

    fb99cba1a4e8d31eef16d36204d14ca98ab8f9c3f0c6098fe4db5c33dd58b5e6e3572f4d39d1fcb0d332aff6ecd7a42f8c65a1e4f6db9b0f79a5894b6ceb9b65

Malware Config

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\_RECoVERY_+nhrdf.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/404CF55B2A52CCD 2 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/404CF55B2A52CCD 3 - http://yyre45dbvn2nhbefbmh.begumvelic.at/404CF55B2A52CCD If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/404CF55B2A52CCD 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/404CF55B2A52CCD http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/404CF55B2A52CCD http://yyre45dbvn2nhbefbmh.begumvelic.at/404CF55B2A52CCD Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/404CF55B2A52CCD
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/404CF55B2A52CCD

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/404CF55B2A52CCD

http://yyre45dbvn2nhbefbmh.begumvelic.at/404CF55B2A52CCD

http://xlowfznrg4wf7dli.ONION/404CF55B2A52CCD

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\_RECoVERY_+nhrdf.html

Ransom Note
<html> <style>a { color:green; }.tb { background:white; border-style:solid; border-width:1px; padding:3px; border-color:lime; } .ttl { font-size:13px; color:880000; }</style><body style="background:#33CCFF;"> <center> <div style="text-align:left; font-family:Arial; <!---4231213423142134231421342341234 --> font-size:13px; line-height:20px; margin-top:10px; width:800px; background:#F4F4F4; padding:20px; border-style:solid; border-width:5px; border-color:#BABABA;"> <b><font class="ttl"><center><b>NOT YOUR LANGUAGE? USE <a href="https://translate.google.com" target="_blank">Google Translate</a></b></center> What<!------4231213423142134231421342341234 --> happened <!------4231213423142134231421342341234 --> to your<!------4231213423142134231421342341234 --> files?</b></font><br> <font style="font-size:13px;">All <!------4231213423142134231421342341234 -->of your files<!------4231213423142134231421342341234 --> were <!------4231213423142134231421342341234 --> protected by a strong<!------4231213423142134231421342341234 --> encr<!---4231213423142134231421342341234 -->yption wi<!---4231213423142134231421342341234 -->th <!------4231213423142134231421342341234 -->RSA4096 <!------4231213423142134231421342341234 --> <br> More <!------4231213423142134231421342341234 --> information about the <!------4231213423142134231421342341234 -->encryption RSA4096 can be<!------4231213423142134231421342341234 --> fou<!---4231213423142134231421342341234 -->nd <a href= http://en.wikipedia.org/wiki/RSA_(cryptosystem) target="_blank"> htt<!--4231213423142134231421342341234 -->ps:<!--4231213423142134231421342341234 -->//en<!--4231213423142134231421342341234 -->.w<!--4231213423142134231421342341234 -->ikipedia<!--4231213423142134231421342341234 -->.<!--4231213423142134231421342341234 -->org/wiki/RSA_(cry<!--4231213423142134231421342341234 -->ptosystem) </a><br></font> <br><b><font class="ttl">Wh<!--4231213423142134231421342341234 -->at <!------4231213423142134231421342341234 --> does th<!--4231213423142134231421342341234 -->is mean?</b></font><br><font style="font-size:13px;"> T<!--4231213423142134231421342341234 -->his<!------4231213423142134231421342341234 --> mea<!--4231213423142134231421342341234 -->ns that the <!------4231213423142134231421342341234 --> str<!--4231213423142134231421342341234 -->ucture and da<!--4231213423142134231421342341234 -->ta wi<!--4231213423142134231421342341234 -->thin your <!------4231213423142134231421342341234 -->files ha<!--4231213423142134231421342341234 -->ve be<!--4231213423142134231421342341234 -->en<!------4231213423142134231421342341234 --> irre<!--4231213423142134231421342341234 -->voca<!--4231213423142134231421342341234 -->bly changed, you will not be able work wi<!--4231213423142134231421342341234 -->th them, read<!------4231213423142134231421342341234 --> th<!--4231213423142134231421342341234 -->em or see them, <!------4231213423142134231421342341234 -->it is the s<!--4231213423142134231421342341234 -->ame thing <!------4231213423142134231421342341234 -->as los<!--4231213423142134231421342341234 -->ing <!------4231213423142134231421342341234 -->them for<!--4231213423142134231421342341234 -->ever, but with our he<!--4231213423142134231421342341234 -->lp, you <!------4231213423142134231421342341234 --> can re<!--4231213423142134231421342341234 -->st<!--4231213423142134231421342341234 -->ore t<!--4231213423142134231421342341234 -->hem <br><br><b><font class="ttl"><!------4231213423142134231421342341234 -->Ho<!--4231213423142134231421342341234 -->w d<!--4231213423142134231421342341234 -->id th<!--4231213423142134231421342341234 -->is hap<!--4231213423142134231421342341234 -->pen?<!------4231213423142134231421342341234 --></b></font> <br> <!------4231213423142134231421342341234 --> <font style="font-size:13px;"><!------4231213423142134231421342341234 --> Espec<!--4231213423142134231421342341234 -->ially for y<!--4231213423142134231421342341234 -->ou,<!------4231213423142134231421342341234 --> on our SER<!--4231213423142134231421342341234 -->VER <!------4231213423142134231421342341234 -->was gene<!--4231213423142134231421342341234 -->rated <!------4231213423142134231421342341234 -->the sec<!--4231213423142134231421342341234 -->ret k<!--4231213423142134231421342341234 -->ey <br>Al<!--4231213423142134231421342341234-->l y<!--4231213423142134231421342341234-->our <!------4231213423142134231421342341234 --> files w<!--4231213423142134231421342341234-->ere encry<!--4231213423142134231421342341234-->pted with the p<!--4231213423142134231421342341234-->ublic k<!--4231213423142134231421342341234-->ey, <!------4231213423142134231421342341234 --> wh<!--4231213423142134231421342341234-->ich has b<!--4231213423142134231421342341234-->een <!------4231213423142134231421342341234 --> trans<!--4231213423142134231421342341234-->ferred to <!------4231213423142134231421342341234 -->y<!--4231213423142134231421342341234-->our co<!--4231213423142134231421342341234-->mputer via <!------4231213423142134231421342341234 -->the Inter<!--4231213423142134231421342341234-->net.<!--4231213423142134231421342341234--><br> <!------4231213423142134231421342341234 --> Decr<!--4231213423142134231421342341234-->ypting of <!------4231213423142134231421342341234 -->YO<!--4231213423142134231421342341234-->UR FI<!--4231213423142134231421342341234-->LES is <!--4231213423142134231421342341234 -->on<!--4231213423142134231421342341234 -->ly p<!--4231213423142134231421342341234 -->oss<!--4231213423142134231421342341234-->ible <!--- -4231213423142134231421342341234 -->w<!--4231213423142134231421342341234 -->ith the he<!--4231213423142134231421342341234-->lp of t<!--4231213423142134231421342341234 -->he <!----4231213423142134231421342341234 -->pri<!--4231213423142134231421342341234-->va<!--4231213423142134231421342341234 -->te k<!--4231213423142134231421342341234-->ey a<!--4231213423142134231421342341234 -->nd <!--4231213423142134231421342341234 -->d<!--4231213423142134231421342341234 -->ecr<!--4231213423142134231421342341234-->ypt p<!--4231213423142134231421342341234 -->rog<!--4231213423142134231421342341234-->ram <!--4231213423142134231421342341234 -->wh<!--4231213423142134231421342341234-->ich is on our <!--- -4231213423142134231421342341234 -->Sec<!--4231213423142134231421342341234-->ret <!--4231213423142134231421342341234 -->Ser<!--4231213423142134231421342341234-->ver!!! </font><br><br><b><font class="ttl">Wh<!--4231213423142134231421342341234-->at do I do?</b></font> <br><font style="font-size:13px;">Alas, if you <!--4231213423142134231421342341234 --> do not take <!---4231213423142134231421342341234 --> the nece<!--4231213423142134231421342341234-->ssary meas<!--4231213423142134231421342341234-->ures <!--4231213423142134231421342341234-->for the spec<!--4231213423142134231421342341234-->ified ti<!--4231213423142134231421342341234-->me th<!--4231213423142134231421342341234-->en t<!--4231213423142134231421342341234-->he co<!--4231213423142134231421342341234-->nditions fo<!--4231213423142134231421342341234-->r obta<!--4231213423142134231421342341234-->ining the priv<!--4231213423142134231421342341234-->ate ke<!--4231213423142134231421342341234-->y w<!--4231213423142134231421342341234-->ill be cha<!--4231213423142134231421342341234-->nged<!--- 4231213423142134231421342341234 --> <br> <!-----4231213423142134231421342341234 --> If you really need <!------4231213423142134231421342341234 --> your data, <!------4231213423142134231421342341234 -->then we suggest you <!------4231213423142134231421342341234 --> do not waste<!------4231213423142134231421342341234 --> valuable <!------4231213423142134231421342341234 --> time searching <!------4231213423142134231421342341234 -->for other <!------4231213423142134231421342341234 --> solutions <!------4231213423142134231421342341234 -->becausen <!----4231213423142134231421342341234 --> they do not exist.</font><br><br> <!----4231213423142134231421342341234 --><div class="tb" style="color:#880000; font-size:13px; border-width:3px;">For more specific instructions, please<!------4231213423142134231421342341234 --> visit your <!------4231213423142134231421342341234 --> personal <!------4231213423142134231421342341234 -->home page,<!------4231213423142134231421342341234 --> there are<!------4231213423142134231421342341234 --> a few <!------4231213423142134231421342341234 -->different <!------4231213423142134231421342341234 -->addresses<!------4231213423142134231421342341234 --> pointing to <!------4231213423142134231421342341234 --> your page<!------4231213423142134231421342341234 --> below:<b><hr> <!---000==-=-==-=-=-=-=-=-=---> 1 - <a href=http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/404CF55B2A52CCD target="_blank">http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/404CF55B2A52CCD</a> <br> <!------000==-=-==-=-=-=-=-=-= --> 2 - <a href=http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/404CF55B2A52CCD target="_blank">http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/404CF55B2A52CCD</a> <br> <!------000==-=-==-=-=-=-=-=-= --> 3 - <a href=http://yyre45dbvn2nhbefbmh.begumvelic.at/404CF55B2A52CCD target="_blank">http://yyre45dbvn2nhbefbmh.begumvelic.at/404CF55B2A52CCD</a> <br> <!------000==-=-==-=-=-=-=-=-= --></div><br><div class="tb" style="font-size:13px; border-color:#880000;"><b>If for some reasons the <!-----000==-=-==-=-=-=-=-=-= --> addresses are not available, <!------000==-=-==-=-=-=-=-=-= --> follow these steps:</b> <hr> 1 - <!------000==-=-==-=-=-=-=-=-= --> Download and <!------000==-=-==-=-=-=-=-=-= --> install tor-browser: <a href=http://www.torproject.org/projects/torbrowser.html.en target="_blank">http://www.torproject.org/projects/torbrowser.html.en</a><br> 2 - <!---000==-=-==-=-=-=-=-=-= --> Af<!---000==-=-==-=-=-=-=-=-=--->ter a<!---000==-=-==-=-=-=-=-=-=---> succe<!---000==-=-==-=-=-=-=-=-=--->ssful<!------000==-=-==-=-=-=-=-=-= --> instal<!---000==-=-==-=-=-=-=-=-=--->lation, run the br<!---000==-=-==-=-=-=-=-=-=--->owser and w<!---000==-=-==-=-=-=-=-=-=--->ait for initi<!---000==-=-==-=-=-=-=-=-=--->alization.<br> 3 - <!--- 000==-=-==-=-=-=-=-=-= --> Ty<!---000==-=-==-=-=-=-=-=-=--->pe<!-- 000==-=-==-=-=-=-=-=-= --> in<!-- 000==-=-==-=-=-=-=-=-= --> the t<!---000==-=-==-=-=-=-=-=-=--->or-bro<!---000==-=-==-=-=-=-=-=-=--->wser<!-- 000==-=-==-=-=-=-=-=-= --> add<!---000==-=-==-=-=-=-=-=-=--->ress<!-- 000==-=-==-=-=-=-=-=-= --> bar: <font style="font-weight:bold; color:#009977;"><!-- 000==-=-==-=-=-=-=-=-= -->xlowfznrg4wf7dli.onion/404CF55B2A52CCD<!-- 000==-=-==-=-=-=-=-=-= --></font><!-- 000==-=-==-=-=-=-=-=-= --><br> 4 - <!--- 000==-=-==-=-=-=-=-=-= --> Fol<!---000==-=-==-=-=-=-=-=-=--->low the instr<!---000==-=-==-=-=-=-=-=-=--->uctions <!-- 000==-=-==-=-=-=-=-=-= --> on the site.</div><br><br><b>!!! IMPO<!---000==-=-==-=-=-=-=-=-=--->RTANT INFO<!---000==-=-==-=-=-=-=-=-=--->RMATION:</b><br> <!-----000==-=-==-=-=-=-=-=-= --><div class="tb" style="width:790px;"><!-----000==-=-==-=-=-=-=-=-= --> Yo<!---000==-=-==-=-=-=-=-=-=--->ur Pers<!---000==-=-==-=-=-=-=-=-=--->onal PAGES<b>: <br> <a href=http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/404CF55B2A52CCD target="_blank">http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/404CF55B2A52CCD</a> <br><a href=http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/404CF55B2A52CCD target="_blank">http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/404CF55B2A52CCD</a> <br> <!-----000==-=-==-=-=-=-=-=-= --><a href=http://yyre45dbvn2nhbefbmh.begumvelic.at/404CF55B2A52CCD target="_blank">http://yyre45dbvn2nhbefbmh.begumvelic.at/404CF55B2A52CCD</a> <br> <!-----000==-=-==-=-=-=-=-=-= --> Your <!------000==-=-==-=-=-=-=-=-= --> Personal TOR-Browser<!-----000==-=-==-=-=-=-=-=-= --> page : <!-----000==-=-==-=-=-=-=-=-= --><font style="font-weight:bold; color:#009977;"><!-- 000==-=-==-=-=-=-=-=-= -->xlowfznrg4wf7dli.onion/404CF55B2A52CCD<!-- 000==-=-==-=-=-=-=-=-= --></font><br> <!-----000==-=-==-=-=-=-=-=-= --> Your personal <!------000==-=-==-=-=-=-=-=-= --> ID <!-----000==-=-==-=-=-=-=-=-= --> (if you open <!------000==-=-==-=-=-=-=-=-= --> the site directly): <!-----000==-=-==-=-=-=-=-=-= --> <font style="font-weight:bold; color:#770000;">404CF55B2A52CCD</font><br> </div></div></center></body></html>

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59e41ddd00ec0f9375bee65606258c6695e320af3b28344687085ab278492da1.exe
    "C:\Users\Admin\AppData\Local\Temp\59e41ddd00ec0f9375bee65606258c6695e320af3b28344687085ab278492da1.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Windows\oxfwtdkobqou.exe
      C:\Windows\oxfwtdkobqou.exe
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Drops startup file
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1960
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:888
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1812
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1712
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:656
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1980
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\OXFWTD~1.EXE
        3⤵
          PID:1104
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\59E41D~1.EXE
        2⤵
        • Deletes itself
        PID:2016
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1908
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:1696

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\RECOVERY.HTM

      Filesize

      12KB

      MD5

      d73f33f3fe462deb631f72580233d417

      SHA1

      84d1a19a7bf44cbcd96427a6a6de839a18c9f631

      SHA256

      d6a7e24a7998083389bb0a4911cd66f94d9fb273cacf43d42304fccf760495a9

      SHA512

      d1246fb2d1831ee14dc759c76556d21dc124d28a8696a3ccdaecb7c1714fe34fb36d5bebd841544be67cec6c1937b6df37ef82e541d98a69f918b22d06bd7a3b

    • C:\Users\Admin\Desktop\RECOVERY.TXT

      Filesize

      1KB

      MD5

      f82de9b3bbe28ef5eb178780c21b30e7

      SHA1

      40f0bf0e51802dfc325c7f5f560361181b435328

      SHA256

      b7630735cd20368b7d17ccc26fb9647bad7cf113bfc12726b55b6f932ba7a2f5

      SHA512

      17800b4d816527ca6388b7cedd705aadf0e10bf9e2a5be1706f272d43232a1421e929e31a9783890e995a734eac60ba331bc8c052be3f2e4490f7c5f34d78236

    • C:\Users\Admin\Desktop\RECOVERY.png

      Filesize

      64KB

      MD5

      7fbf8bb6cd885be905c4d61a85165e90

      SHA1

      48579f44a8eba7d301ae106622f7eed8c0a3b2d9

      SHA256

      f4a6fee60e20ac885588c5e8331453db1bef7d0c3a19c1d1f3803b71fc47c502

      SHA512

      b51182a0fa5892fcb2054b28479a93d4a57cce37c4c3ed28a80aba7387c9a65bf8a80d969570462ef95c0356e33a1746a60d6ba1de0715e98573e63287ea6de8

    • C:\Windows\oxfwtdkobqou.exe

      Filesize

      343KB

      MD5

      343a036fc9dcbacc81140314bd27fe39

      SHA1

      b69052312a15863643916ed44b037dee85017aea

      SHA256

      59e41ddd00ec0f9375bee65606258c6695e320af3b28344687085ab278492da1

      SHA512

      fb99cba1a4e8d31eef16d36204d14ca98ab8f9c3f0c6098fe4db5c33dd58b5e6e3572f4d39d1fcb0d332aff6ecd7a42f8c65a1e4f6db9b0f79a5894b6ceb9b65

    • C:\Windows\oxfwtdkobqou.exe

      Filesize

      343KB

      MD5

      343a036fc9dcbacc81140314bd27fe39

      SHA1

      b69052312a15863643916ed44b037dee85017aea

      SHA256

      59e41ddd00ec0f9375bee65606258c6695e320af3b28344687085ab278492da1

      SHA512

      fb99cba1a4e8d31eef16d36204d14ca98ab8f9c3f0c6098fe4db5c33dd58b5e6e3572f4d39d1fcb0d332aff6ecd7a42f8c65a1e4f6db9b0f79a5894b6ceb9b65

    • memory/888-65-0x0000000000000000-mapping.dmp

    • memory/1028-56-0x0000000000400000-0x00000000004AB000-memory.dmp

      Filesize

      684KB

    • memory/1028-61-0x0000000000400000-0x00000000004AB000-memory.dmp

      Filesize

      684KB

    • memory/1028-54-0x0000000076C01000-0x0000000076C03000-memory.dmp

      Filesize

      8KB

    • memory/1028-55-0x0000000001C70000-0x0000000001C9F000-memory.dmp

      Filesize

      188KB

    • memory/1104-73-0x0000000000000000-mapping.dmp

    • memory/1812-66-0x0000000000000000-mapping.dmp

    • memory/1960-62-0x0000000000400000-0x00000000004AB000-memory.dmp

      Filesize

      684KB

    • memory/1960-57-0x0000000000000000-mapping.dmp

    • memory/1960-64-0x0000000000400000-0x00000000004AB000-memory.dmp

      Filesize

      684KB

    • memory/1960-74-0x0000000000400000-0x00000000004AB000-memory.dmp

      Filesize

      684KB

    • memory/1980-70-0x0000000000000000-mapping.dmp

    • memory/2016-60-0x0000000000000000-mapping.dmp