Analysis

  • max time kernel
    128s
  • max time network
    110s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    10-04-2023 01:51

General

  • Target

    87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d.exe

  • Size

    692KB

  • MD5

    cb28c211ca8292894f3eef43ce5a6cd4

  • SHA1

    70e0bc5fce5534e6dbe5200d9c965c925b596ee3

  • SHA256

    87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d

  • SHA512

    b56c612e389f7b58218a2e66a66bddea55425ed5f99a22921e2a16b2a65ca415f0dc39fbe7c88fffe082ab4bc27923dcea652396cc922d06fd82baea76b356bd

  • SSDEEP

    3072:UkmGgnjAYn2Fj5ohpzBovjtALLXOixtjOQ0hV09ZIR5YkHk7wELOhr1DwTTRpAe:g6mLD1OQW094YkHk7wsO7wPXAe

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+xbsgq.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/334F503A21D7CA22 2. http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/334F503A21D7CA22 3. http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/334F503A21D7CA22 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/334F503A21D7CA22 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/334F503A21D7CA22 http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/334F503A21D7CA22 http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/334F503A21D7CA22 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/334F503A21D7CA22
URLs

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/334F503A21D7CA22

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/334F503A21D7CA22

http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/334F503A21D7CA22

http://xlowfznrg4wf7dli.ONION/334F503A21D7CA22

Extracted

Path

C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\_RECoVERY_+xbsgq.html

Ransom Note
NOT YOUR LANGUAGE? USE Google Translate What happened to your files? of your files were protected by a strong encryption with AES More information about the encryption AES can be found https://en.wikipedia.org/wiki/AES at does this mean? his means that the structure and data within your files have been irrevocably changed, you will not be able work with them, read them or see them, it is the same thing as losing them forever, but with our help, you can restore them How did this happen? Especially for you, on our SERVER was generated the secret key All your files were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of YOUR FILES is only possible with the help of the private key and decrypt program which is on our Secret Server!!! at do I do? do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed If you really need your data, then we suggest you do not waste valuable time searching for other solutions becausen they do not exist. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/334F503A21D7CA22 2 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/334F503A21D7CA22 3 - http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/334F503A21D7CA22 If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser and wait for initialization. 3 - Type in the tor-browser address bar: xlowfznrg4wf7dli.onion/334F503A21D7CA22 4 - Follow the instructions on the site. !!! IMPORTANT INFORMATION: Your Personal PAGES : http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/334F503A21D7CA22 http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/334F503A21D7CA22 http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/334F503A21D7CA22 Your Personal TOR-Browser page : xlowfznrg4wf7dli.onion/334F503A21D7CA22 Your personal ID (if you open the site directly):
URLs

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/334F503A21D7CA22

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/334F503A21D7CA22

http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/334F503A21D7CA22

http://xlowfznrg4wf7dli.onion/334F503A21D7CA22

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d.exe
    "C:\Users\Admin\AppData\Local\Temp\87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Windows\hynfrvphhfox.exe
      C:\Windows\hynfrvphhfox.exe
      2⤵
      • Modifies extensions of user files
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:840
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:988
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:236
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1672
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1136
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1192
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\HYNFRV~1.EXE
        3⤵
          PID:204
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\87FECA~1.EXE
        2⤵
        • Deletes itself
        PID:1608
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1060
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:816

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+xbsgq.html

      Filesize

      11KB

      MD5

      a09771521e9ceef0a376ec9ef599d5a6

      SHA1

      8a1fa9fa6ec448ffe2ed7dd1518ab2889e54d95f

      SHA256

      ba6609b5079d5ffcf7a82377e9c34c4f3a0b2d45da8191fa648719d06fb78418

      SHA512

      a66d92b0cf0321c54535f2ed1fcbeb845800827835e7f97904021fc58e35aee39815a6c8539463a9c2608e279f70d008c528801f453970b589a7d62a9e2433dd

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+xbsgq.png

      Filesize

      64KB

      MD5

      ce7b6806e73f142a1c71de20af39fc35

      SHA1

      68553395577fc028064a869e9bc975f372fd186b

      SHA256

      30c0b33cae79818b989c887dd59b99523baf6b31876018794892837d3b95adc0

      SHA512

      d7d23aafc3b40219b45f15c0024a9679f8148f3c16f79d6056b3d1dd2f3d85900bf6294a13f943b0e9b49fdbcf0283b8682d053ccfe781f020a1f762e003ed42

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+xbsgq.txt

      Filesize

      1KB

      MD5

      6666c736914fd9c511b2a6f8b7c5941f

      SHA1

      1e03bd3dc8217cde88a7831f7a7dd66cb4f7e184

      SHA256

      9e47ad0cccccdf534d0d6c748ffc467339e48641c58ef7cf4175f518f8d4e037

      SHA512

      844b620ccdca83a89e353914d5c88211f74ef6bb674c8f79907fc61e2d2a3dcc54d27beea0676dae9ce77b6afbf534d248293d6782ed0c4109b329587d67c9a4

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

      Filesize

      11KB

      MD5

      9c203c89bb0967d13178ea66e41ba244

      SHA1

      6f0235b3445f6b8acc398ac124405c713d9cb2ea

      SHA256

      e5aa5e7a32eeb7d9701342939b961fe1e7e1aa0cd650bbf8a343ce2063f078b9

      SHA512

      eea5de5bb7bf276884d75d32ad25a19f20d558fdb5c543d18a02c0170cb68378198a2d1526896a2c7cbdb1c52877c694584ccb0f2032daa01e74a18e5ab74456

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

      Filesize

      109KB

      MD5

      380fa908b9dd8a199c398121e6355bd9

      SHA1

      7a3c3bee5bfbfe095ffb7ee63058308111ad201d

      SHA256

      f54ff9c4496bccf6d4a9843f25c08e6ca89a4f603cb4929839e488fc6e462fd1

      SHA512

      6a490d328b449b68f928a198fe2601b5558c335dbb061732a28832b3e8981341c1c0a3b85c5ea1d26af90bbfc754c9868c9caca9d69c15b4007d2f2146f21aec

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

      Filesize

      173KB

      MD5

      338daaf90933ceef4a9bd7d6c8ad044c

      SHA1

      d27a0cd24517b05dd13c7368a510867a8781f80a

      SHA256

      d7d9c2b90b561b570a23993fd27dfe4ced3c61ecd8147008e3ef822e24f926a1

      SHA512

      d3d85992803c1a74bd986a6ebe38cf8f471d868917ab28b5e7611a6c96bd71640d9d2742fd9ebfcff6f931881fbcbe1654cc9aa381b6a4f4e42a01c66e309333

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      e2b5c4fd812d8ebcf552a65fb135978b

      SHA1

      733b738b750918e20b69efca1b749bfb9ef431ab

      SHA256

      739d30d019c646c3324275b247eac66aab69d84143826cb18645a7eae6fdb3ca

      SHA512

      22e81e30ae14a8987b352787400638e032dc0972165c1324cc714fcc6e4e0b1858b0e56117e2d05ab3f029cb5a7463542e45360c927744a07df83df1c051e4c8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      41a0e6e78932a6f9f2e9eac6874e4b3f

      SHA1

      e720909f42277c40450bcde1d8e5f1eac86e8a44

      SHA256

      49fa87de2129499f66e4bf2b20fa7e356b5c00d87301f96b224f0c544f86cb84

      SHA512

      8cbbc455d5e3eca3397396aea3e77c4ba2f80e5b20ba23bdb3af7fc6a539df13f4f85f708b7120d88ebcc6c5323934a4a68a7f30d9df5156ed026a622ce8f928

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      b3dfc904a302e99fa0f7c8e3dfe1ad31

      SHA1

      2c1478a69ecdf51857e95f3950b2b2771995e4ff

      SHA256

      871c6ba34d444d9baae67077fccc8560cd34352d8acd39d6339a76ddcc5e6992

      SHA512

      f0120d81089a3e6f829356b3adc47c4f6bc3e29fc14d4c5a68f06e002dc747deeaecc98467bbc0762822ef2ff55260e6f803562c603f30f7bf97a074a192260b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      a716ae5f15731c3e999a5ff85e922cbe

      SHA1

      619e18d19ce98971912a5eb07e24eea41ac407c5

      SHA256

      943be766102dcefab81516321de5617b67b12ea1340438c301f763ba8e457e15

      SHA512

      8542da51a83ea32014bebce9e64d5379893474aaf79baf714c6e66a94a75b6a812082bd3b42fbf4aefb32028c041915ba7512d477ce732280c8d836501b8bd54

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      9c0a72bd6ac81311cc8695045ca19169

      SHA1

      806180a4a9bbd3f72875d69a913767a84451da3a

      SHA256

      39df5a8aba27a0c707a5778b7941dcf289146d946a4ee239b173eb0c96d112d7

      SHA512

      daef82fa166b8e8ddf10a536adbdb689d7eb2d512440f79c1dd91ddd8151e3c06ac0192ea11b57af24f59c775e8ee09ebc92a9cc7b04a9059eedf298b7de9f09

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      718ceb0647bed85cf098b009570ffe17

      SHA1

      f7aea0508eec5088dd8b4b326b80021722a8d34f

      SHA256

      fef68f14eb722c48ce0f3716f003f93cc8fafbf5a620d25a46b5724007659689

      SHA512

      3205a05a1ad06a6b61baefbcc3fe925f73ae4e6a7c35c2933587ce76c8869fa7c1477b9b81d6c991373b58e14a8452c73c4a28c6d7170a4a6e99aa685fd9f4b2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      20f7ba45b99c7d02c4fca243feb05b67

      SHA1

      15cef33381661301f5737da491c5f47fa5f41c1c

      SHA256

      3a5c0b5d4087e40e89df9bffb611c999ef292fb1347488f18bcb60bbf63397c8

      SHA512

      2c6a89bb0a4984e175654df8a0282702fb4d1cafa229ec3d2e959e81893ef96fc904a06b2d0e6662622bb76ef4b587f21db625783f8c7d9a519f60e14b3162cb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      842a88b38b488b72848b6929ff02a32c

      SHA1

      447a7b2ee7d522d2702b14c783fd5417bea52a7e

      SHA256

      0cadf0e33ba0e15f98681aa7e04784acae3ce602658091f242d69a05b076a87d

      SHA512

      ffe576d4e7ecd74145866d5706603402bf5e062bbff034f6645ccffd110fd81cf307c916b011dff05a8c4eab8fe9caba4e9d413f7e5b066c5012949b7d74a3ae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      842a88b38b488b72848b6929ff02a32c

      SHA1

      447a7b2ee7d522d2702b14c783fd5417bea52a7e

      SHA256

      0cadf0e33ba0e15f98681aa7e04784acae3ce602658091f242d69a05b076a87d

      SHA512

      ffe576d4e7ecd74145866d5706603402bf5e062bbff034f6645ccffd110fd81cf307c916b011dff05a8c4eab8fe9caba4e9d413f7e5b066c5012949b7d74a3ae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      b30fb6825458f37b7436b8311426e290

      SHA1

      10935be957733c6df8f22a545c13244b345de9f1

      SHA256

      dbaa8798fa9a7fe1aab087806791a1aa635a9863cc3a3bdbc1c1ac8927665274

      SHA512

      5a6d73e6a64b6d66831b76141db4def547756afc428150722cfdb4b554b869571265538aedec404bda0af24c8decec5a0cf0423633a3e433147272f9894b23c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      068a2a33ba6043581ab8d1de84ec09a9

      SHA1

      6302dd25b282da01c282a9afb9be0ad0027006a4

      SHA256

      cd5b29a2d076ca23a9b1dbb8323cc1e6e0860bf0eb94aa14a01ba361e39e44d4

      SHA512

      8508e282abaf56f3fb079eedca7f010d4255ff7b4288ae747c3ce64f8e472b40a0ecda2e2cba12d5e83c42d358093d7094e0b32c38e13e06dbb39fdd00244c68

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      d357c85ae2ee90d753fe494ee7f4550b

      SHA1

      367a95f7634e6dbb489c201fbd76dcd57528ceec

      SHA256

      740cb610bba1c9429d28ee3d3dc997a4d075d99d6f588b02b43ce11847038363

      SHA512

      6363ca56c6861d7655504d5b4386d1fd69b2bbf827695733d326f728f9f05b765f4c26d9099a78384c9262b2eb0a5b79f51dd3aee75ffa64a88942cd4867ab54

    • C:\Users\Admin\AppData\Local\Temp\Cab9D6C.tmp

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\Cab9E4A.tmp

      Filesize

      61KB

      MD5

      e71c8443ae0bc2e282c73faead0a6dd3

      SHA1

      0c110c1b01e68edfacaeae64781a37b1995fa94b

      SHA256

      95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

      SHA512

      b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

    • C:\Users\Admin\AppData\Local\Temp\Tar9EAB.tmp

      Filesize

      161KB

      MD5

      be2bec6e8c5653136d3e72fe53c98aa3

      SHA1

      a8182d6db17c14671c3d5766c72e58d87c0810de

      SHA256

      1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

      SHA512

      0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\_RECoVERY_+xbsgq.html

      Filesize

      11KB

      MD5

      a09771521e9ceef0a376ec9ef599d5a6

      SHA1

      8a1fa9fa6ec448ffe2ed7dd1518ab2889e54d95f

      SHA256

      ba6609b5079d5ffcf7a82377e9c34c4f3a0b2d45da8191fa648719d06fb78418

      SHA512

      a66d92b0cf0321c54535f2ed1fcbeb845800827835e7f97904021fc58e35aee39815a6c8539463a9c2608e279f70d008c528801f453970b589a7d62a9e2433dd

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\_RECoVERY_+xbsgq.png

      Filesize

      64KB

      MD5

      ce7b6806e73f142a1c71de20af39fc35

      SHA1

      68553395577fc028064a869e9bc975f372fd186b

      SHA256

      30c0b33cae79818b989c887dd59b99523baf6b31876018794892837d3b95adc0

      SHA512

      d7d23aafc3b40219b45f15c0024a9679f8148f3c16f79d6056b3d1dd2f3d85900bf6294a13f943b0e9b49fdbcf0283b8682d053ccfe781f020a1f762e003ed42

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\_RECoVERY_+xbsgq.txt

      Filesize

      1KB

      MD5

      6666c736914fd9c511b2a6f8b7c5941f

      SHA1

      1e03bd3dc8217cde88a7831f7a7dd66cb4f7e184

      SHA256

      9e47ad0cccccdf534d0d6c748ffc467339e48641c58ef7cf4175f518f8d4e037

      SHA512

      844b620ccdca83a89e353914d5c88211f74ef6bb674c8f79907fc61e2d2a3dcc54d27beea0676dae9ce77b6afbf534d248293d6782ed0c4109b329587d67c9a4

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\_RECoVERY_+xbsgq.html

      Filesize

      11KB

      MD5

      a09771521e9ceef0a376ec9ef599d5a6

      SHA1

      8a1fa9fa6ec448ffe2ed7dd1518ab2889e54d95f

      SHA256

      ba6609b5079d5ffcf7a82377e9c34c4f3a0b2d45da8191fa648719d06fb78418

      SHA512

      a66d92b0cf0321c54535f2ed1fcbeb845800827835e7f97904021fc58e35aee39815a6c8539463a9c2608e279f70d008c528801f453970b589a7d62a9e2433dd

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\_RECoVERY_+xbsgq.png

      Filesize

      64KB

      MD5

      ce7b6806e73f142a1c71de20af39fc35

      SHA1

      68553395577fc028064a869e9bc975f372fd186b

      SHA256

      30c0b33cae79818b989c887dd59b99523baf6b31876018794892837d3b95adc0

      SHA512

      d7d23aafc3b40219b45f15c0024a9679f8148f3c16f79d6056b3d1dd2f3d85900bf6294a13f943b0e9b49fdbcf0283b8682d053ccfe781f020a1f762e003ed42

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\_RECoVERY_+xbsgq.txt

      Filesize

      1KB

      MD5

      6666c736914fd9c511b2a6f8b7c5941f

      SHA1

      1e03bd3dc8217cde88a7831f7a7dd66cb4f7e184

      SHA256

      9e47ad0cccccdf534d0d6c748ffc467339e48641c58ef7cf4175f518f8d4e037

      SHA512

      844b620ccdca83a89e353914d5c88211f74ef6bb674c8f79907fc61e2d2a3dcc54d27beea0676dae9ce77b6afbf534d248293d6782ed0c4109b329587d67c9a4

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\_RECoVERY_+xbsgq.html

      Filesize

      11KB

      MD5

      a09771521e9ceef0a376ec9ef599d5a6

      SHA1

      8a1fa9fa6ec448ffe2ed7dd1518ab2889e54d95f

      SHA256

      ba6609b5079d5ffcf7a82377e9c34c4f3a0b2d45da8191fa648719d06fb78418

      SHA512

      a66d92b0cf0321c54535f2ed1fcbeb845800827835e7f97904021fc58e35aee39815a6c8539463a9c2608e279f70d008c528801f453970b589a7d62a9e2433dd

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\_RECoVERY_+xbsgq.png

      Filesize

      64KB

      MD5

      ce7b6806e73f142a1c71de20af39fc35

      SHA1

      68553395577fc028064a869e9bc975f372fd186b

      SHA256

      30c0b33cae79818b989c887dd59b99523baf6b31876018794892837d3b95adc0

      SHA512

      d7d23aafc3b40219b45f15c0024a9679f8148f3c16f79d6056b3d1dd2f3d85900bf6294a13f943b0e9b49fdbcf0283b8682d053ccfe781f020a1f762e003ed42

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\_RECoVERY_+xbsgq.txt

      Filesize

      1KB

      MD5

      6666c736914fd9c511b2a6f8b7c5941f

      SHA1

      1e03bd3dc8217cde88a7831f7a7dd66cb4f7e184

      SHA256

      9e47ad0cccccdf534d0d6c748ffc467339e48641c58ef7cf4175f518f8d4e037

      SHA512

      844b620ccdca83a89e353914d5c88211f74ef6bb674c8f79907fc61e2d2a3dcc54d27beea0676dae9ce77b6afbf534d248293d6782ed0c4109b329587d67c9a4

    • C:\Users\Admin\Desktop\RECOVERY.HTM

      Filesize

      11KB

      MD5

      a09771521e9ceef0a376ec9ef599d5a6

      SHA1

      8a1fa9fa6ec448ffe2ed7dd1518ab2889e54d95f

      SHA256

      ba6609b5079d5ffcf7a82377e9c34c4f3a0b2d45da8191fa648719d06fb78418

      SHA512

      a66d92b0cf0321c54535f2ed1fcbeb845800827835e7f97904021fc58e35aee39815a6c8539463a9c2608e279f70d008c528801f453970b589a7d62a9e2433dd

    • C:\Users\Admin\Desktop\RECOVERY.TXT

      Filesize

      1KB

      MD5

      6666c736914fd9c511b2a6f8b7c5941f

      SHA1

      1e03bd3dc8217cde88a7831f7a7dd66cb4f7e184

      SHA256

      9e47ad0cccccdf534d0d6c748ffc467339e48641c58ef7cf4175f518f8d4e037

      SHA512

      844b620ccdca83a89e353914d5c88211f74ef6bb674c8f79907fc61e2d2a3dcc54d27beea0676dae9ce77b6afbf534d248293d6782ed0c4109b329587d67c9a4

    • C:\Users\Admin\Desktop\RECOVERY.png

      Filesize

      64KB

      MD5

      ce7b6806e73f142a1c71de20af39fc35

      SHA1

      68553395577fc028064a869e9bc975f372fd186b

      SHA256

      30c0b33cae79818b989c887dd59b99523baf6b31876018794892837d3b95adc0

      SHA512

      d7d23aafc3b40219b45f15c0024a9679f8148f3c16f79d6056b3d1dd2f3d85900bf6294a13f943b0e9b49fdbcf0283b8682d053ccfe781f020a1f762e003ed42

    • C:\Windows\hynfrvphhfox.exe

      Filesize

      692KB

      MD5

      cb28c211ca8292894f3eef43ce5a6cd4

      SHA1

      70e0bc5fce5534e6dbe5200d9c965c925b596ee3

      SHA256

      87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d

      SHA512

      b56c612e389f7b58218a2e66a66bddea55425ed5f99a22921e2a16b2a65ca415f0dc39fbe7c88fffe082ab4bc27923dcea652396cc922d06fd82baea76b356bd

    • C:\Windows\hynfrvphhfox.exe

      Filesize

      692KB

      MD5

      cb28c211ca8292894f3eef43ce5a6cd4

      SHA1

      70e0bc5fce5534e6dbe5200d9c965c925b596ee3

      SHA256

      87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d

      SHA512

      b56c612e389f7b58218a2e66a66bddea55425ed5f99a22921e2a16b2a65ca415f0dc39fbe7c88fffe082ab4bc27923dcea652396cc922d06fd82baea76b356bd

    • C:\Windows\hynfrvphhfox.exe

      Filesize

      692KB

      MD5

      cb28c211ca8292894f3eef43ce5a6cd4

      SHA1

      70e0bc5fce5534e6dbe5200d9c965c925b596ee3

      SHA256

      87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d

      SHA512

      b56c612e389f7b58218a2e66a66bddea55425ed5f99a22921e2a16b2a65ca415f0dc39fbe7c88fffe082ab4bc27923dcea652396cc922d06fd82baea76b356bd

    • memory/816-5821-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/816-5819-0x00000000001E0000-0x00000000001E2000-memory.dmp

      Filesize

      8KB

    • memory/816-6306-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/840-5818-0x0000000000E70000-0x0000000000E72000-memory.dmp

      Filesize

      8KB