Analysis

  • max time kernel
    156s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 22:12

General

  • Target

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a.exe

  • Size

    524KB

  • MD5

    6d876affccf4b9be765d462ed5b5e6c9

  • SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

  • SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

  • SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • SSDEEP

    6144:7IXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHUSCnDU:7IXsgtvm1De5YlOx6lzBH46Ut4

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 24 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 25 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 25 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a.exe
    "C:\Users\Admin\AppData\Local\Temp\cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\xsglwjgvhcq.exe
      "C:\Users\Admin\AppData\Local\Temp\xsglwjgvhcq.exe" "c:\users\admin\appdata\local\temp\cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4312
      • C:\Users\Admin\AppData\Local\Temp\gtyelk.exe
        "C:\Users\Admin\AppData\Local\Temp\gtyelk.exe" "-C:\Users\Admin\AppData\Local\Temp\speuluqiziggzjzr.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:3376
      • C:\Users\Admin\AppData\Local\Temp\gtyelk.exe
        "C:\Users\Admin\AppData\Local\Temp\gtyelk.exe" "-C:\Users\Admin\AppData\Local\Temp\speuluqiziggzjzr.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:3604

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ghaupccytgimjxrntrcd.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Users\Admin\AppData\Local\Temp\gtyelk.exe

    Filesize

    724KB

    MD5

    7737e9a530730b5320deed9cdd3552bc

    SHA1

    e426f3f47e8c91a47ada51abdbd1886af97dec79

    SHA256

    511de226aa13070a121249d75fd5ef23226868e5929155783730f489ce9335ef

    SHA512

    ed7dc56dc3b1afbee9f9be59c45a55955253d3aa4fcf0246883b84bb3da72a0d706eee271c9d177fedb49db4946cfddcbe43d696629dcf9232c4b9e019aa18c8

  • C:\Users\Admin\AppData\Local\Temp\gtyelk.exe

    Filesize

    724KB

    MD5

    7737e9a530730b5320deed9cdd3552bc

    SHA1

    e426f3f47e8c91a47ada51abdbd1886af97dec79

    SHA256

    511de226aa13070a121249d75fd5ef23226868e5929155783730f489ce9335ef

    SHA512

    ed7dc56dc3b1afbee9f9be59c45a55955253d3aa4fcf0246883b84bb3da72a0d706eee271c9d177fedb49db4946cfddcbe43d696629dcf9232c4b9e019aa18c8

  • C:\Users\Admin\AppData\Local\Temp\gtyelk.exe

    Filesize

    724KB

    MD5

    7737e9a530730b5320deed9cdd3552bc

    SHA1

    e426f3f47e8c91a47ada51abdbd1886af97dec79

    SHA256

    511de226aa13070a121249d75fd5ef23226868e5929155783730f489ce9335ef

    SHA512

    ed7dc56dc3b1afbee9f9be59c45a55955253d3aa4fcf0246883b84bb3da72a0d706eee271c9d177fedb49db4946cfddcbe43d696629dcf9232c4b9e019aa18c8

  • C:\Users\Admin\AppData\Local\Temp\ihyqjusmfqqsnzrlpl.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Users\Admin\AppData\Local\Temp\mpkgdsuspeiondzxffsvqm.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Users\Admin\AppData\Local\Temp\speuluqiziggzjzr.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Users\Admin\AppData\Local\Temp\ttleykjeyklokxqlqnx.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Users\Admin\AppData\Local\Temp\vxrmiwxuqehmkzuryxjlf.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Users\Admin\AppData\Local\Temp\xsglwjgvhcq.exe

    Filesize

    320KB

    MD5

    8520562835b2d08fe703af454237c887

    SHA1

    b486f4b83603a47b572d9ad398c4f15263482e7f

    SHA256

    0816dd593349b804a1c21e8c8aada16e5cd5f3ff110d8b25284623616e7dd4f4

    SHA512

    258fbb50c43e54c31af23ac0e99611190d47e7e8e554f144b24629a5a87e26d39ba516fcc2ae404fe4f90f3a053db3487d43dd6cf9f143e4a0ece25d46ab5621

  • C:\Users\Admin\AppData\Local\Temp\xsglwjgvhcq.exe

    Filesize

    320KB

    MD5

    8520562835b2d08fe703af454237c887

    SHA1

    b486f4b83603a47b572d9ad398c4f15263482e7f

    SHA256

    0816dd593349b804a1c21e8c8aada16e5cd5f3ff110d8b25284623616e7dd4f4

    SHA512

    258fbb50c43e54c31af23ac0e99611190d47e7e8e554f144b24629a5a87e26d39ba516fcc2ae404fe4f90f3a053db3487d43dd6cf9f143e4a0ece25d46ab5621

  • C:\Users\Admin\AppData\Local\Temp\zxnewgdwoyxysdunq.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\SysWOW64\ghaupccytgimjxrntrcd.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\SysWOW64\ihyqjusmfqqsnzrlpl.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\SysWOW64\mpkgdsuspeiondzxffsvqm.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\SysWOW64\speuluqiziggzjzr.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\SysWOW64\ttleykjeyklokxqlqnx.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\SysWOW64\vxrmiwxuqehmkzuryxjlf.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\SysWOW64\zxnewgdwoyxysdunq.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\ghaupccytgimjxrntrcd.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\ghaupccytgimjxrntrcd.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\ihyqjusmfqqsnzrlpl.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\ihyqjusmfqqsnzrlpl.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\mpkgdsuspeiondzxffsvqm.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\mpkgdsuspeiondzxffsvqm.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\speuluqiziggzjzr.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\speuluqiziggzjzr.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\ttleykjeyklokxqlqnx.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\ttleykjeyklokxqlqnx.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\vxrmiwxuqehmkzuryxjlf.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\vxrmiwxuqehmkzuryxjlf.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\zxnewgdwoyxysdunq.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca

  • C:\Windows\zxnewgdwoyxysdunq.exe

    Filesize

    524KB

    MD5

    6d876affccf4b9be765d462ed5b5e6c9

    SHA1

    fbb771808fa9b0803ca411135fcd19ee47d0ed9e

    SHA256

    cc5302e5c02a5faff7a95df266bb2bae22881ba04465ebbf5d6cfbb18a69fa5a

    SHA512

    612acdc38cca5c1406312cebdb909770d6a3fd0be3424af214ec28a9957af7f8ab925dd41cfc8af6e1a0987c60c9913637a0e30c7eaffb3dfefcea90dec8a8ca