Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-10-2023 23:46

General

  • Target

    jkas.exe

  • Size

    731KB

  • MD5

    724841114acf0bbde3a70c4a7cb54bcc

  • SHA1

    1d298b3bf3b2d0c4ccd0615597ba9510e8f180c7

  • SHA256

    4c80c0a0d3c211c3aa52b734b4ccb40d50bd0d14b0364fd1160c0c4887df9cf1

  • SHA512

    cfd0494247c5dd11dbd9852c54131e90f5a4bf7ee1097c7a8be70bf958eb497c31d94c80ba8759e798c408704d9c89bc606b341af1dafec1d3941d29dba82d90

  • SSDEEP

    6144:P3BBCqxV6VsgHTQer7CZ1wwE5P4j8P6pfnFczW0AQxe2gHcb998g4iBCXtzrf78f:P3+A6hXqamQP6pfFCGVu8g4sCXtzr7O

Malware Config

Signatures

  • Renames multiple (3380) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 26 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 52 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\jkas.exe
    "C:\Users\Admin\AppData\Local\Temp\jkas.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:508
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHkAZwBjACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGcAYgBsACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHgAcwB1ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHAAYwBoACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1860
    • C:\Windows\RansomBy Lilteca.exe
      "C:\Windows\RansomBy Lilteca.exe"
      2⤵
      • Executes dropped EXE
      • Sets desktop wallpaper using registry
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /IM mysqld.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4292
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /IM sqlwriter.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2856
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svcran.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svcran.exe"
        3⤵
        • Executes dropped EXE
        • Drops desktop.ini file(s)
        • Drops file in Program Files directory
        PID:1816
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /IM sqlserver.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:740
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /IM MSExchange
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1864
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /IM Microsoft.Exchange
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4124
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /IM explorer.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3288
      • C:\Windows\explorer.exe
        explorer.exe
        3⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4556
  • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.8.0_66\db\bin\NetworkServerControl

    Filesize

    5KB

    MD5

    1bcb30f121288412c8c0dc1d84ca9601

    SHA1

    e99a571779e65efb7857f7ae55a0f1140ff78282

    SHA256

    517131a83847c3a2573da9b5478e3597c2889c29d714ef8b69a0baa6e50e1b72

    SHA512

    b402e69ec6eada5fab29e6db5bbc96a30563922f4e251a4b39fc11ca72bcc1693e58e69c4daf936ed2a5f795b92e88e96d8b351040e4beaf900aa4a33e1099dd

  • C:\Program Files\Java\jdk1.8.0_66\jre\bin\plugin2\msvcr100.dll

    Filesize

    809KB

    MD5

    56727ace0b33ccfd99b7e694dbaecf57

    SHA1

    4da4e6a04194ede2dee3d09ce3ad5be499dc85e1

    SHA256

    156507bcfa8ae42f2ebf6e06c57ec0a243b84f30da7ecc1c81570b170157297a

    SHA512

    ade4d637c33795ae826b2078347f5eca17e83a4b0ba0fd488ea0bcc2a9c5b8427764d36211d7d00a95a31013ef71249e8fd8a35ba8012e693d6069778047d48d

  • C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_LinkNoDrop32x32.gif

    Filesize

    160B

    MD5

    915f78e030811eedd8b08ad4caa77672

    SHA1

    1fa5ba96b2fc65e60a2299936194fa3ec9ea9f39

    SHA256

    50b7f848036d9882fd9157dcb1635780e5fafca8c254ffa19f95b3e0169b0a4d

    SHA512

    75b86e3ca5f66a9cba9832b559c254c1226dfddeaba6f3bf73cd4039bbb29e56ecf1c4e0970e10f08affaa170a63538e42f14c920b2e4e239a026c3264078c8e

  • C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\trusted.libraries

    Filesize

    16B

    MD5

    de6a72e4b811802be3b9e2c04a2045de

    SHA1

    20679710ab8eccff9c4faa6ecb92b80cc7812815

    SHA256

    0716ecdfe4b96984bfd6e43e47b91da217b9c54e6d54fb90d0ccbde4ecee09d2

    SHA512

    629808d551b8f421da119863f020b52fc447a152e5efc224d88a91856a1ac5029b75e2650d87b1e2858058f6531566a24e7ce87a713f156c4e9141ed5addb78c

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

    Filesize

    12KB

    MD5

    c1d8d64cdcc5eb866e91007b5c470663

    SHA1

    07b13ca8c22e0619249e1f8240850bceee6b9de4

    SHA256

    b37f0b8353942abc78e87993bbc4a17da43cb0d55fc019804551127474e0c119

    SHA512

    2e704107269541dacdfa15bbcab9b3a1738918e016bd291dab0776a693dc8a3f665de58d97243b94e4ad8c5e35543229e38ee29b6b80b516b442837ef613f61a

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

    Filesize

    8KB

    MD5

    74aa70b119e7090b7f6827f23fc999ae

    SHA1

    556c8dba521197adba301095a2f44276cfdf5133

    SHA256

    bd73c338d57fd17805dc37bb9b3d11be0301dba53488ee8300e0bab4e566a199

    SHA512

    cd1390333e754a66a65cc4a2d2793d783761cc9f39da3254126feec142348b0234b6f5e9c10d06c9002c0a6cc632611bd438dce30ca76d076cee4a1a7dcfb39a

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\eclipse.inf

    Filesize

    64B

    MD5

    9745da3ffbb3cafdb1cbbee784c2efc2

    SHA1

    e5013f9470c193b776e159b28f45d82ce0c91d15

    SHA256

    3ea76fd0557ef35df76cd74e97038d12f16f65fb3a028b264094ac3964b1a822

    SHA512

    687555efdadbf249b224ef898c3fa15460d8520942b1549a0d7ffd39c254fecc1af0df645b16789de7280b265f295598ba94581834b7ae54de6d72304ee4eaa1

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.RSA

    Filesize

    7KB

    MD5

    e316f968daf7f0e382eecf63728fb0a9

    SHA1

    d80fd483f6837ae1ca2a870fcda50410b53c36db

    SHA256

    5cba5aa17554fd03b46d9cf76b687dd75611938176965f4e2aa07a79f689acb7

    SHA512

    ac240d67196356aaa9d6b591993183698c29e050a5658dce7d84a5734f980f08111325a272cd858d9440745eb01d238122a88186a9f79475092b60645d516a0a

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    3332892035b05ae678c989f216b3d00a

    SHA1

    008d1834fc503abc5ddd0252f9f5e4e398b231a9

    SHA256

    016c23131272ae5dee041f4dcbe8f95757f063dc5720d2ac9b06edb3b4f7a490

    SHA512

    a2f138d212f190cb637f02203737918391edd858e885403981e917dfafc131b45ae352f176ea101f5c04c62e622827175a4bf8bb12974ce9bacc06b7d019b6e1

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA

    Filesize

    7KB

    MD5

    d7291948394ec04fbb260222211c2753

    SHA1

    78cbc05dfad3eefb5a3522af86299e2f45557a88

    SHA256

    f5b64f8e22e4ca98f47e729b1af59bcedf8086928430a9e314cd7c2b13f34b26

    SHA512

    42230b435149cc2ba5e0588a9dba7eb84169ce572b6dee7bcb36a8f0c7aa8f9d5b78c9ad67ffaf5af777f07bf324c4601e28f8fd091247a8a83d9611aa40ecd4

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\MANIFEST.MF.exeSaherBlueEagle

    Filesize

    144B

    MD5

    06ef85fd26f96b40dab209f67b202cd5

    SHA1

    765b59309aa1668dbbb0541d68f9caf260e6180f

    SHA256

    158d8545e3be5b03d5fca869b0540d76530479bc7412ad6b5fe45cf743478599

    SHA512

    e603ea29b1dd51786e0d2d6f9206606a790c6f3650f1b8a1295eacd8c962bccb1720493430fd829011db074ae8556fa9ae8af6b64617d7536659e082437bc9af

  • C:\Program Files\Java\jre1.8.0_66\COPYRIGHT

    Filesize

    3KB

    MD5

    a61292c2721418b1e618500a8b30d088

    SHA1

    fe25e83d7793a556db8343c88deb4b6804f686ed

    SHA256

    d9d0df4a21ba745b548a02f537160bc890a244d26db027de43aa1bae36125058

    SHA512

    4443c2c56fec32ccc51675e9caa14e38a58e14dc5dc54dd050db08eedf32476c48c0add5343393ff7565065adf894372d4b9ba66035044ba4182ef332329dd2b

  • C:\Program Files\Java\jre1.8.0_66\LICENSE

    Filesize

    48B

    MD5

    ddf5c9de9508e59629746f40ea26b516

    SHA1

    2fc498c99545331019a7993969ab62843df7aa12

    SHA256

    c88f55931db0c0349fa0ae00072f154412dfc7ef64693e5c6ec8e582e93ce0f3

    SHA512

    b627ccb566bfc5f92459f1727161a3fd4d55e55671bcdc01d0a7d9f16f3dd1b19710a713cff462e56e188510c77316a9a3a14ea74d1ceb8964c37ce19ccd8975

  • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    107KB

    MD5

    338421dbcc811fbf780a1227f9f7612e

    SHA1

    56ec74a4946ad8f64e7b25a7253f68ff348c00c9

    SHA256

    2144784f37f643f34478e6abcd8880476350dfdec266915f8b9485f2ea7f2943

    SHA512

    3cfc338d2d4bd8c22cb59cd9498c2406b3569aa849b1d27059d71fe3adf48b7171bcbcbc8dad605c317672b21ead86ea743ac4024f84d57b98b9ff4e980af599

  • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME.txt

    Filesize

    172KB

    MD5

    42d88108dcea533abad42e3dc96d303b

    SHA1

    119d7a1a52fa7b54a3aa37117c1808b390f7a944

    SHA256

    99cba67ce5331e92c3e2efb49fc8eb4a735c62cfb86cbd70460e9b05f4cd2eba

    SHA512

    878a1671d9f4954a55f6d7d0b48b1e871ad1b52a7336abd7d1705f2641f2ace63dabacf2306dba8d9f318d2ec9a8bfa9a49c0389bbe0d81d8b98396972dbea56

  • C:\Program Files\Java\jre1.8.0_66\lib\deploy\messages_zh_HK.properties

    Filesize

    3KB

    MD5

    6c17464223ea3113b6a396a007aced91

    SHA1

    1405e51b7f7ed964758dccd19ae20e2dc438988a

    SHA256

    0c17ca85b28b3bd9c5d39434c4e8aade0ab78f943fa5777b3dad31d5b89eb9fd

    SHA512

    50197593278c791c6118f87cdd757d87801f962c95155cfc92bb19bdbb0c0ae427351e7a54a2f5da3ea90330a8bd18570f2a9cf1caf7d4fb8b291cbbbd822fde

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-core-file-l1-2-0.dll

    Filesize

    18KB

    MD5

    637b3a8de84e140465ec7ed3aa31caf3

    SHA1

    1b8fb02a04794e16da4ed29692f4f5c8a27c1bb3

    SHA256

    9d67afc2c95681f40129b18c5f9766fd03767ab3ab24a391a700be87bc2d8083

    SHA512

    62eab336b944e3894d62288d5760d2063e592451fad215dfddc370f5ba11130273f62f126bda223b6c088099c29b1cefd3ab754d2de1eb9f0ac5106dc65f9e5a

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-core-file-l2-1-0.dll

    Filesize

    18KB

    MD5

    fceb358d47520d980bb392aa6effa749

    SHA1

    4ca8e57106a1bb8130fea4d4257e5f27f1ad6f1c

    SHA256

    84b9d06ee705334d22b793ecb1bc50cfe88091f0a6aef19b192c5f73fab68096

    SHA512

    942090534fd7cc8b812ee0ea145b4639c05eb78fe8b43312cad7b9ab15838532c14ef3a846dc6948f3301665df0c1cadcdeaca8d7498896411865b8443348d9c

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    20KB

    MD5

    9cf3cf56fc9490f9fa56ea8f1242fea6

    SHA1

    d4735ec05e93cf9d8233d45ed4d6ab862c4768bc

    SHA256

    cc71b948b93a6da19db4892118c801cb85a18080cc8111a201fcd44bfed40c69

    SHA512

    24504201322abb0b9aae9bf89f0034193bd2e4497aa875fe40ce092857619645e8a588847e34a92a7cbf1b61666f292a099353955cc17a2a5c748334e5235352

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    18KB

    MD5

    23dc1bc8376f79d5f5f42df2fe7a965c

    SHA1

    19f34fbc9a10d7aea002df27aba712eaf618103c

    SHA256

    afbf56d7b2dce068e86cd7d32c27aa84498c6e1cfd9e205f169cd54b109efc19

    SHA512

    a8dd189dce906d1a8f3625cbaf0e24560ee183e79346d7bbae249527e4bbdd0e89f0722849f6608107c600e89b12ab09111b64f77f51fd550b8d7376305055d9

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-core-synch-l1-2-0.dll.exeSaherBlueEagle

    Filesize

    18KB

    MD5

    2b25a1d60bb1b4c8798f7c86622aa2a4

    SHA1

    fe22b728b53d533028cb488d0c529afafcb2b2df

    SHA256

    fbff0aad4dc7fd2035eb728255a7c7f7cc1074c790eb488000a64a00523f636f

    SHA512

    0c41b47ad8cb6db53476ab3382743cce14b695c86b3a22d1884efc727eee9c1a461c158fdd07246be2198690619e523ed62140e24d0dcc11be8133ef932b07df

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    18KB

    MD5

    40aaa6bf9fc4b93d3494b57ff3ccf84e

    SHA1

    7352ef2a764c0ca0042e35814759c3c50af0504b

    SHA256

    354d96949d748dccd4afc5a4378da98a34fb89cce3d2263138afcc04b91a87f4

    SHA512

    4b0afdf2d94ff9385f2c2d4cdf6c954c9e9e88d0b7e62ec08da199c81ee7782cca985e2bff92baad27390e46f9c7097a6c37d39028eef48c4613d2e87b6aa90f

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-core-xstate-l2-1-0.dll

    Filesize

    11KB

    MD5

    0aaf471d0be74899152ee7e002731de7

    SHA1

    fa40406413a594a962903fe983704eb452f1579b

    SHA256

    6a1e6fa449930c0d4a54717aa5b9f396bfba87daf74ad3abc85a0ab305da37f3

    SHA512

    76e21d3946e6b52e7727f19cc38bff7ce18e396e9a8b8e33b32076335c3800016e32528d0e7aeb90d4f21d39859bcff2ce40ea83de266479d9266b8884ded973

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-conio-l1-1-0.dll

    Filesize

    19KB

    MD5

    81572f86a1af4aa1a61cfb699d2b2b1f

    SHA1

    3bdfe648c1e67e1c5fe34667ec2180d98d361e93

    SHA256

    266299d4421effae017e8eeac1fabd0355e7a34b12ba39677ece37fb1ecf6cc9

    SHA512

    e0e1434628a91dfefabf7df99c9ac8ff174ceb1540e0a3f4d981a5c4a4ff89a4fa57e2b9587518da354ee62f5cc0f9ff59b94be1ea8eecfc1d69e47bdd6dfa96

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-convert-l1-1-0.dll

    Filesize

    22KB

    MD5

    c13f3739ed48b12a50e7693fd6c6fd59

    SHA1

    1a6ad2bc218adfa2cbd1c64d437869ec401eabd1

    SHA256

    e43f04a0f423f3de243e8b02b1863e4956041cfe553886bf97d204e8b548a3c0

    SHA512

    8af3de766ce2d4822c4957996b43145fa98633d371f2dc967ab8965945120a574b998519004a92fd5b5730085628094acda2479419d4622f198037f23d59d7eb

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-environment-l1-1-0.dll

    Filesize

    18KB

    MD5

    61c4d1dce6d618a50224f3784124b694

    SHA1

    c7d2b6df442b8ab47f176cbb34a6e2d674e51857

    SHA256

    eebadc33df1a2b2f90320fdcd26642efceb863376d1cfe202c3d3e043e9ee023

    SHA512

    97b9dbaa4aee9b4f745874b25fc67e0345b2643f4475358f6c5e1b89fa99d7badf0059ee018d331beba7b2fa2f5ce6155763e42f6fc51ce068a765d31495e628

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-filesystem-l1-1-0.dll.exeSaherBlueEagle

    Filesize

    20KB

    MD5

    6f07e0fd566908ca70f8061d4738c278

    SHA1

    399d7eb9d9bb6e01935740215c9151e33196dc51

    SHA256

    006b2ae1b686afcc7195f99d8ecb9adc3e9daaad08b10954a7d7548386d455fc

    SHA512

    181353d97ffda673f5ff4a2a61c551470f93ec4fd2d0c70138032fc90883b60d55c7a8d180a2dd9db49a90d3e6775d5e3999756c9146cadc33dee57d9365f307

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-heap-l1-1-0.dll

    Filesize

    19KB

    MD5

    5c0953a02b8fbc146a8b7df6df5d8406

    SHA1

    db52b2a965e1220c45178409ee21a751fcc9fa48

    SHA256

    3893b46ce22dca17ce8d1077520a45265066e75a34f56d0e4c9ca4e190fc0b4c

    SHA512

    f63b051606242cb477a958e0311a26ee8a6c62092bb65b161ebc151af30c9c1d02418cc430e2546fd6074d35e8257d4d921c5280a3ad66fd301df93730503f03

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-locale-l1-1-0.dll

    Filesize

    18KB

    MD5

    074f490236803503511e9b75c2be38d9

    SHA1

    ec6082499057280d7b5b795255677c400d6f7feb

    SHA256

    e4f4c7da6b54bc9ef0811a6c6469f161cc1a508358210180793263cd66296722

    SHA512

    df250fb52caa532fb5f753851de201b2010299f24459aed73a6380f584a5348a63881b1c3083830e204eef85d06016b194ad078bfef4fd6addfd3ade2be57302

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-math-l1-1-0.dll

    Filesize

    27KB

    MD5

    41ab7d1a38ecbc3f97e1da83db4be2af

    SHA1

    ad5ff9d18e979ddc4a378916e79bc4d71fcb620a

    SHA256

    f84227907a32b6ab3db8287a119249b3f3d7b11b76b25dde33cf7ddb8e5d5005

    SHA512

    578a8a863c54edf724b03ff36149d57a0224cc53a346a3a92d2b6ca8b11200acad9bf829ca30cf8aa1704e339dbb021c615df928b7655b651305dd9af8829f3a

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-multibyte-l1-1-0.dll

    Filesize

    26KB

    MD5

    45427e923f1ae93572c7efc462fe7b71

    SHA1

    9c98a71eb5460c9ef53aaf4a8959da8ff0eac6f5

    SHA256

    7bb7841299f3bf6257563f5f934711c0c64fc08e10add2c77bacfc2faa69a679

    SHA512

    0abe8859a1730475e44fb8636ce87c83e37558a6a9905ff2bf0b811f75b20f86259cb11162a93bc919070e40fb47aef424215059408ca208111985248d70f733

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-private-l1-1-0.dll

    Filesize

    69KB

    MD5

    567db6b30fc429b54427b7d4ce30a9cc

    SHA1

    969fae9ec91f1558d22c67c6b7edb458c7a4d21d

    SHA256

    906b75160e6447e6e31c7c27b8cf091082e51718ce62190c9117c54eacfcd234

    SHA512

    b0f994a389b94b0c70a9c347c6f00e3799ea5068960372c3ee097fb12a8fb270f37dc005fbdc0433006b7ce1ddfd8cc46c76922a9b2ae1a01dfb454d9653c075

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-process-l1-1-0.dll

    Filesize

    19KB

    MD5

    bb4f1ca65e22383144e37ab44f8ef5c9

    SHA1

    33dd64699b97e8b65a36242ca55bf109a868fcdd

    SHA256

    310e76499b683ae54cc74e7174703128f731a98076ba7087618877905cbc5664

    SHA512

    830190544ab43324288a78de8907798027500b55423455dc0d6d9197b9a4c2b5d95a27695e37135034a6526b2e1ab5fa15f4687d335ddbc4ee9603c9cd631baf

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-runtime-l1-1-0.dll

    Filesize

    22KB

    MD5

    154128b70ba1714ba2b26c078dc44f5b

    SHA1

    0aac9c2a56caf6fc0b5e74cdefa0e6f052b31f2f

    SHA256

    b97d0c080b17d06d6d70b4000f1346e5a4217bcbded7b2be3657773449fafb9f

    SHA512

    2e0c79e4403aa3366bfcf7602abea69d4309a05e95df7a2f5991049a7e8e096bad03aaf8b49c8c59324067381566fa836ceaad7891e38da413e984683c84274c

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-stdio-l1-1-0.dll

    Filesize

    24KB

    MD5

    f9f63715156d4485bb005be1ba9aa085

    SHA1

    0c13b55f04b54b52ff8bb6b8f281f4c20d81cfbf

    SHA256

    abfa7ce88999e62b255d1d89ed5d777a9904dce56da7349a9bff23981affff9d

    SHA512

    910a0d4521eefc2e2938f55b569d273f9f9f94df7f7f895455fed1e3a2feb427d55e88b754008548aa91262895f5b6d428550d830432090080e4d86b667ce982

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-string-l1-1-0.dll

    Filesize

    24KB

    MD5

    2e667dd84b71f2c4a154907ea7f2e587

    SHA1

    de6d658c83ebdf688c97eef8d957b0855c626c78

    SHA256

    dddfe30d12aa93a12b10c7a0a69d938c26a70bdf11ef7a525039223000a09f39

    SHA512

    d177b0b51c5c1538040cacf611c7f8d837b511ba1e29ef993413ed4ccb5ba5af11adac74416b848f636224d40ac022f2eccbb864f7e4dba71a05456c5e32eb3c

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-time-l1-1-0.dll

    Filesize

    20KB

    MD5

    a3bd6fc88a9ea678a9863beeacc1d1bc

    SHA1

    bc98ef72887b977c7413787be12cf5a814246494

    SHA256

    112b19be6620fc602d5ae3473422b522f451d8851a230353ed134766a668f414

    SHA512

    c6aff75c7e9953f589a844f22d727a18fb28c433d16c4aedbda970a54047715da3723a61c0ff6b8eb0d79fa6ab0b0faa55247f85bad8f7462a3b6e9b72965b0d

  • C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-utility-l1-1-0.dll

    Filesize

    18KB

    MD5

    2ba7e350d60988220c0572a4d7173288

    SHA1

    66be1b8ad2c050c6dc114c34abeba38b897d37d9

    SHA256

    3a08967ee8c3f6026370d732585130f99d68c118101d3cc667203138e61287cc

    SHA512

    8be74406326332f6530134c49a52fb1140fb021afd63166478f1bfbe45b1882e005ad2344cf6ec782a31e921d83b1a903f87116837384fb6a005e2ed19349ae1

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_i5pxhwmu.dat.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svcran.exe

    Filesize

    83KB

    MD5

    baaed72fac342c09f9bd3e55beedd048

    SHA1

    80f36401a2f2c791e801ed072e12dc37d830daed

    SHA256

    66895e31ed416fb679bd81667da49b62c30b78344db21f86bb68a7b4bc24b795

    SHA512

    91b3968eb5710dda149e18219690433530a5d1e6b067cff0fe48fb64a250233f87b7de3539d379454df567d40f97d9ef1a56d4e5a9c310c9ae94fcd72370047d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svcran.exe

    Filesize

    83KB

    MD5

    baaed72fac342c09f9bd3e55beedd048

    SHA1

    80f36401a2f2c791e801ed072e12dc37d830daed

    SHA256

    66895e31ed416fb679bd81667da49b62c30b78344db21f86bb68a7b4bc24b795

    SHA512

    91b3968eb5710dda149e18219690433530a5d1e6b067cff0fe48fb64a250233f87b7de3539d379454df567d40f97d9ef1a56d4e5a9c310c9ae94fcd72370047d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svcran.exe

    Filesize

    83KB

    MD5

    baaed72fac342c09f9bd3e55beedd048

    SHA1

    80f36401a2f2c791e801ed072e12dc37d830daed

    SHA256

    66895e31ed416fb679bd81667da49b62c30b78344db21f86bb68a7b4bc24b795

    SHA512

    91b3968eb5710dda149e18219690433530a5d1e6b067cff0fe48fb64a250233f87b7de3539d379454df567d40f97d9ef1a56d4e5a9c310c9ae94fcd72370047d

  • C:\Windows\RansomBy Lilteca.exe

    Filesize

    726KB

    MD5

    6fd647d78d9af5b5e25a3a2b4fcf58cd

    SHA1

    9db70b728aeea2b604eea6fe365a4bffd6bed776

    SHA256

    01db6baa97f0452eb0bd17244f3b3081129c276d5e4d38a830973b6dbb0f9568

    SHA512

    cb5f2cc5514a9adc2d45128caf586588cb681eb284610e94db7f741fa726bf109813a1522ba09e4432d9b1b1a1a9216670c9a72072268e84526dbb1768c34c55

  • C:\Windows\RansomBy Lilteca.exe

    Filesize

    726KB

    MD5

    6fd647d78d9af5b5e25a3a2b4fcf58cd

    SHA1

    9db70b728aeea2b604eea6fe365a4bffd6bed776

    SHA256

    01db6baa97f0452eb0bd17244f3b3081129c276d5e4d38a830973b6dbb0f9568

    SHA512

    cb5f2cc5514a9adc2d45128caf586588cb681eb284610e94db7f741fa726bf109813a1522ba09e4432d9b1b1a1a9216670c9a72072268e84526dbb1768c34c55

  • memory/940-872-0x0000026B65BA0000-0x0000026B65BC0000-memory.dmp

    Filesize

    128KB

  • memory/940-868-0x0000026B65A00000-0x0000026B65A20000-memory.dmp

    Filesize

    128KB

  • memory/1772-9-0x0000000073800000-0x0000000073DB0000-memory.dmp

    Filesize

    5.7MB

  • memory/1772-7-0x0000000073800000-0x0000000073DB0000-memory.dmp

    Filesize

    5.7MB

  • memory/1772-599-0x0000000003060000-0x0000000003070000-memory.dmp

    Filesize

    64KB

  • memory/1772-12-0x0000000003060000-0x0000000003070000-memory.dmp

    Filesize

    64KB

  • memory/1772-21-0x0000000003060000-0x0000000003070000-memory.dmp

    Filesize

    64KB

  • memory/1772-341-0x0000000003060000-0x0000000003070000-memory.dmp

    Filesize

    64KB

  • memory/1772-807-0x0000000003060000-0x0000000003070000-memory.dmp

    Filesize

    64KB

  • memory/1772-195-0x0000000073800000-0x0000000073DB0000-memory.dmp

    Filesize

    5.7MB

  • memory/1816-664-0x0000000002930000-0x0000000002940000-memory.dmp

    Filesize

    64KB

  • memory/1816-663-0x0000000073800000-0x0000000073DB0000-memory.dmp

    Filesize

    5.7MB

  • memory/1816-46-0x0000000073800000-0x0000000073DB0000-memory.dmp

    Filesize

    5.7MB

  • memory/1816-44-0x0000000073800000-0x0000000073DB0000-memory.dmp

    Filesize

    5.7MB

  • memory/1816-45-0x0000000002930000-0x0000000002940000-memory.dmp

    Filesize

    64KB

  • memory/1860-92-0x000000007EEC0000-0x000000007EED0000-memory.dmp

    Filesize

    64KB

  • memory/1860-18-0x0000000007750000-0x0000000007AA0000-memory.dmp

    Filesize

    3.3MB

  • memory/1860-96-0x000000006E3A0000-0x000000006E3EB000-memory.dmp

    Filesize

    300KB

  • memory/1860-700-0x0000000073050000-0x000000007373E000-memory.dmp

    Filesize

    6.9MB

  • memory/1860-93-0x0000000008E60000-0x0000000008E93000-memory.dmp

    Filesize

    204KB

  • memory/1860-108-0x00000000090E0000-0x0000000009185000-memory.dmp

    Filesize

    660KB

  • memory/1860-117-0x00000000013A0000-0x00000000013B0000-memory.dmp

    Filesize

    64KB

  • memory/1860-120-0x00000000093A0000-0x0000000009434000-memory.dmp

    Filesize

    592KB

  • memory/1860-204-0x0000000073050000-0x000000007373E000-memory.dmp

    Filesize

    6.9MB

  • memory/1860-22-0x0000000008010000-0x0000000008086000-memory.dmp

    Filesize

    472KB

  • memory/1860-347-0x00000000013A0000-0x00000000013B0000-memory.dmp

    Filesize

    64KB

  • memory/1860-20-0x0000000007CE0000-0x0000000007D2B000-memory.dmp

    Filesize

    300KB

  • memory/1860-19-0x0000000007BA0000-0x0000000007BBC000-memory.dmp

    Filesize

    112KB

  • memory/1860-97-0x0000000008E40000-0x0000000008E5E000-memory.dmp

    Filesize

    120KB

  • memory/1860-17-0x00000000076B0000-0x0000000007716000-memory.dmp

    Filesize

    408KB

  • memory/1860-16-0x0000000007640000-0x00000000076A6000-memory.dmp

    Filesize

    408KB

  • memory/1860-15-0x0000000006F30000-0x0000000006F52000-memory.dmp

    Filesize

    136KB

  • memory/1860-14-0x00000000013A0000-0x00000000013B0000-memory.dmp

    Filesize

    64KB

  • memory/1860-11-0x0000000007010000-0x0000000007638000-memory.dmp

    Filesize

    6.2MB

  • memory/1860-13-0x00000000013A0000-0x00000000013B0000-memory.dmp

    Filesize

    64KB

  • memory/1860-352-0x00000000013A0000-0x00000000013B0000-memory.dmp

    Filesize

    64KB

  • memory/1860-10-0x0000000073050000-0x000000007373E000-memory.dmp

    Filesize

    6.9MB

  • memory/1860-613-0x0000000006B30000-0x0000000006B4A000-memory.dmp

    Filesize

    104KB

  • memory/1860-8-0x0000000004820000-0x0000000004856000-memory.dmp

    Filesize

    216KB

  • memory/1860-620-0x0000000006B20000-0x0000000006B28000-memory.dmp

    Filesize

    32KB

  • memory/4556-845-0x0000000003DF0000-0x0000000003DF1000-memory.dmp

    Filesize

    4KB