Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-03-2024 09:31

General

  • Target

    2024-03-09_658060b052dbf94206ae3b50fc61916a_teslacrypt.exe

  • Size

    255KB

  • MD5

    658060b052dbf94206ae3b50fc61916a

  • SHA1

    ca2d8283531ec56532cdc14b4cb0932f1555c5c7

  • SHA256

    6404bcfac5f3523b2f32b79360567aac98a56420c73341fae74d96b847e2c229

  • SHA512

    4d8fd98691520cd2eacdd3032c461015444d31ccf815c7635ed9ee178743548747523d275088bff613a4552609c199d42602d385721c0158575a8d09f16483c5

  • SSDEEP

    3072:ZLhtgSlZAeKoNhb64VzKHJWpLXOe/TYUAklbIlHE+Emh/KCN2NFtzK2MTRp3r:psHWp9TYURsKjmh/KCN52mX3r

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+pcvfn.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/B23DFBC0EDADBD77 2 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/B23DFBC0EDADBD77 3 - http://yyre45dbvn2nhbefbmh.begumvelic.at/B23DFBC0EDADBD77 If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/B23DFBC0EDADBD77 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/B23DFBC0EDADBD77 http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/B23DFBC0EDADBD77 http://yyre45dbvn2nhbefbmh.begumvelic.at/B23DFBC0EDADBD77 Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/B23DFBC0EDADBD77
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/B23DFBC0EDADBD77

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/B23DFBC0EDADBD77

http://yyre45dbvn2nhbefbmh.begumvelic.at/B23DFBC0EDADBD77

http://xlowfznrg4wf7dli.ONION/B23DFBC0EDADBD77

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (383) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-09_658060b052dbf94206ae3b50fc61916a_teslacrypt.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-09_658060b052dbf94206ae3b50fc61916a_teslacrypt.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Windows\qsfbmglcwgqs.exe
      C:\Windows\qsfbmglcwgqs.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2160
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2520
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1716
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1124
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1124 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:280
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1572
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\QSFBMG~1.EXE
        3⤵
          PID:2224
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE
        2⤵
        • Deletes itself
        PID:2492
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1288
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:1260

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+pcvfn.html

      Filesize

      12KB

      MD5

      1775294120e06d809df42463515f6f28

      SHA1

      718d6aeacd7b85fc1c41b03bec090d8e56491870

      SHA256

      b8eb54f0cc34774a7cf573fc006dae19c8aedd5d5222153a9848b7ca4f681b9b

      SHA512

      c93b4faa1ab6699efc564b8181de436aa531e6332cbc8251fa28316baad5da8310520adb603bc7dd92cfa7007cea5d43934ff327c4cd1becb81e322e814707aa

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+pcvfn.png

      Filesize

      64KB

      MD5

      2060df2bf43c1a43af262cac3b0745b5

      SHA1

      708560d25e1e5936acdbb3627a0a55a997a49768

      SHA256

      11fa84fce41d43d959aebb7d34e579c8b1d81998adf89229093f94dc6a95c738

      SHA512

      d3a2c861e49caf562d442d48b9a05155c67688f1ce96048fb98c9eaeae300f320e6d3a297e777f1e75022e8a7b08ebc1c30130393d4422cda56ad3fcb1b3fae5

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+pcvfn.txt

      Filesize

      1KB

      MD5

      fff20ff74d62a6e77fbc6a91c0a65ffa

      SHA1

      e49c6f9f56fcfe5e42db101d60eb2eae46046005

      SHA256

      8d5d82b049f72f2cf08a1b14a5c3718f70886c477e7386b6e7555f07d8a5a044

      SHA512

      5b4a545f3aa3dd19da769d0da7266ff63930eb92009d96ba08bc209f5c28be5ead7b62c58ce5ebb76475a8e1e4d7e9f847c879b8f22eb5e365c1ded7ac028738

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

      Filesize

      11KB

      MD5

      fd4e885780a7e85ae7f971e4a1eea425

      SHA1

      464c2e5363a50a146d0711d96bcfbba3845f90a6

      SHA256

      ebd89532c1f26bafc8e17becfed2647bf055f7520843207be8a0408497386892

      SHA512

      6b8f1149873b0e82b1db852a3aefe825009d64e965c2e73c544be1bd386a9cfa6e5e6f2b652f1a12d84e54a361e992b9dc47c50fd7e8f4fc178ef3fc40407a23

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

      Filesize

      109KB

      MD5

      aa1b215145df1ee328d480e2eafd0c5b

      SHA1

      033ce50f694a40e0a5d0980a5c59fe488d8ba877

      SHA256

      db6bf1313194a9270c3b74c17019af8ed5143ba9b3b71ce8d879efa1dae11ac3

      SHA512

      e973c5a424c450e9310d9e3ae36c6ff29115c209611023c9404274fa7845855889a4c3d331ca7d181a10f352dd2b025570b062b84a4c65bbd6f4df09dd6fc276

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

      Filesize

      173KB

      MD5

      5f58e053ea25adefe7b58acf0aeb4d11

      SHA1

      7820a743ca41f528ab9415a28004533ce5a942e5

      SHA256

      45f0e2d60054cef755e0e99aad6d8a4160a593a5eeaf5e8048460aa10164639a

      SHA512

      c42bbba5db01ef75e1ed8a8d9b7af817dc20ad2fcac69df32c044095f68972fb052bd89c58ee4ad9251675fc22d425beb8e06e5b1a472cdbe36daa1a7189f377

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7a44124c7b1e0ec33fa91a835dc64924

      SHA1

      7494c68fc7d9171c822a5e96085e23d1d9e8bbc4

      SHA256

      0014f2351b866d60d968a4fd0df61c8bd7ea2ac9a85d9284faf497f2790d9ad5

      SHA512

      97eed07e94c52b83aa2c2fb6a8786cba09df777edeabe6a92fc2a60ba839cb3e178c02a4aaae2d7a3a2f1ded1f50a44dee0c6a0e78646407e63b10b49f3c177b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      92a18065bf5121fd19e198e98afe2abe

      SHA1

      4a44c9117dbf486b5c2f9849c89a5300320e147b

      SHA256

      1fd612452e7fee9eb9f439e5520ec9b7e101390f7fd6fa1874c1164e6e38b7b3

      SHA512

      66c5bdd535f27e5e25b57f6a216ab29e831303889dad75eddb0d79ad9fac687312f32dbc71e943b46b9a6f0cd1eca375b893f07c0e286c8ee22f487ad82979bb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c803d15dcae56a6a5f62fb5e630cad67

      SHA1

      3e02ff8a24cf8b0a8dd7d1cc3d22034fd1002cf1

      SHA256

      e8bbeb02fc38776b63695a6e0d8a014c5a19d06f7bc9f8fc44232e4450d04e7a

      SHA512

      c1e577e71700c7765fc62a26b88e8d715d7a379a453707e0098bbbb6b344f7c280ecfa404a8d44ab56f38438a3d185fc24587b54acef4d0e7c5274943742130b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      849e0a216958d5006caa11b49a04b89e

      SHA1

      702444717c31bfc897acd358570a8f2a531f52b8

      SHA256

      61d289e56f834a5d738c1370620f9333db476105355d2a3b7b04243611238239

      SHA512

      eeb9eff9963a03e6b307afdbdcb54875e56fc74cf4e77667083e12d83bc6763b1b860f70f2b6c0eac96fcc27d3e587122549bbe63f21ab40a3b7a3dfba70e62c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      02b971d8b9e070b20959380788a14acf

      SHA1

      dfc0d5c2feb4846fc6247f21a4cc5aa1af65fb00

      SHA256

      d184948a2cabd3cba8e4dabbe0e5167e065004c8f7f816456e99668bdac863b7

      SHA512

      b0056e385120736908ac99c317d3b799c53507edb4cc9f89b83b8b626b7229aa606108dd35c16fb350a6a34f7da54c7a84331a88c38a11c2680e85b2ccee015f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      17081c9425789329a84f8d99d47bd6f7

      SHA1

      ad46924f5a60ec27d68785e43b3a83525ec19d6e

      SHA256

      d03ed5d0d357ba77be88c52dc91f285d81b870458a5a75c10aa2a76a9645f9fc

      SHA512

      0d787068f8abbe49d2c991dd29eed163c6446ba6f19d9d897c8c634093e8478e27239b5449a966170ee8088b946e727674531e797af04c7c2bb97f7c4b9b696b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ec9c7be7f44aefa420b7f6434f5f2352

      SHA1

      ca4932c9eee1867512b4228a8cdd822aae457e4b

      SHA256

      b7e3e2e9d2d890fc19872e59a23546feeb60e955b7b5bafcaed63324b667f246

      SHA512

      b8bc50c5a5f55eb676830f1b43df6373ba8a8bfcbda2fd86b1e051e62511636171ffa5144fed1ac9939b347aa1a1f98135992deb32b5f9b04e3a6ba2fa36ebd0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7c75b017df60f871a4b7e29a4ba39c69

      SHA1

      a8447f58afcbf973b0143a2c6de84f526b988197

      SHA256

      256b053a2640df627f7746284a64e902ef39f01f36aecc402b30985c3ee5b42c

      SHA512

      412fcd8f1139792464caf9b07ae49ce4145d0af0b71a27972eb4d65dcc02150ae79b0ecf6402b57f6278fd941156e2568b97ddcb527a51428bf7bb27426054bd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9f677ffd9603fb63adf158d26b601bb6

      SHA1

      2ef5a0da7fb6ce046fbbb01199b86d57f07eea9d

      SHA256

      9b4ffdea5b3a1d728653526a3c8d4c1fa23f7146b063e5a6135686124c900884

      SHA512

      0cbe163d4b486e522a682d85ad8ceecc2e805d6729dc22c93d9858a8cf2851113fef1c06d5a9038e0d80a0720b05dfb006890db838a1047bfd23630dd71ae50e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e0c450ad0d18a032f97d569cf91cf7c6

      SHA1

      cfd8fa446bddf2214f1a0631bf8b3de2461845db

      SHA256

      6148a9a9130df88376cf9ea0c30bc2035b8842fb3f4d187dd48545dcea6d41bd

      SHA512

      1bc138ca51f5b9b8696791200350d3bcdaf7f35df61e6061d100b959a5c4a83b6c99f6d9dab651e7622254a5251e380e74e1fc81c127186278aed611bf268fdc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a13fcff40ced784d5b93959bae2d9b32

      SHA1

      e49356ad53435c1cac112be0d81f60905af7eb0e

      SHA256

      31b5343966b6a246ef68dcbfe7d01292adccaf14c2435d57460e28bcc97adcb0

      SHA512

      f6429083a60becb5d741c85658830cc172f9e6a10087201e38174f1a8777f13c73d887f7c002c509275986d8534a805bd8da27eaf64500dd735b2b5d48c9bf16

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b2e0ba32b6357c11e0a1a35315c67b44

      SHA1

      02ae696d212f5e65ce64e48d0902a24c9af37a66

      SHA256

      decb7b45ddb985566d54cd281657d847c9fdc7f5e0b3e8b0d27b08eaa73e0145

      SHA512

      1dec7813cbb863870c70208cb6816693bc6e77f97b5478d6f21f209a014fcb78096cb87698dd1db962766617f735fe129296efad3b240b4c80f1ff968eb48453

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cd6fb2217ac2de33c87a02d107622c6c

      SHA1

      ff28b854454d94a58f5bba861c9540696357c303

      SHA256

      48a6737a09c780ecb794ed0d288798eb09ddb9c94de68a65b36434bb32aa5250

      SHA512

      d4910c6f94f91d603cb2bcffb8cad117077bd818188c14c29501a09fd600848dee13a11db8598648afdc132f257cc425320239e6c6d2e5821acc92af3287229d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      862f941780e37e110bb34b693706398e

      SHA1

      d45cdaca9c146ce79e1195ab4d72cce2a4f711fd

      SHA256

      447c44902ca03a5fb86ad9dbfe14315c314259a78e5214f033fd6a63b5028bbe

      SHA512

      f1efc42c1e3970ca5fa10b2a86c97f3f1707fac85b817281ef0d65ca9e6acede94125148131f7626e2e41c566f780d9e4a646a452d77479d0e867eee72a50052

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0f256e98e283304aae7f154645573b4e

      SHA1

      abcccaefc5e8b7f2d8b50db73557745f1dfe27de

      SHA256

      e36541e3f2a68ab92ea69fd3bdde4e9f11f463933da8fb880bc8bf8cae28a829

      SHA512

      7ffa0deef18fed4ee07f46592d5c74c389ee8a049a0c17de0892791231f39dd44d21b9d66bf14f724685bb2589f4a186e8cab50bf4815617b9dc3be6672564ea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c5e20c8533ce4fe200d5218df300ca35

      SHA1

      a54a1733017ee3be0e9c8ec2d05c026aa1186670

      SHA256

      21c4fe1ac0001518b3da4fa0863be1b7f363439dee35e0de8fde68e0a75f7034

      SHA512

      39fddcd96dce948dd6b9293a6385a711700b0514630b1c5278046bab2485cba66ff7c538e23cfab9891a7fb4cbe72750129c8fa6fdbe10c3ecae75bc5013a00e

    • C:\Users\Admin\AppData\Local\Temp\CabA68F.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarAC31.tmp

      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • C:\Windows\qsfbmglcwgqs.exe

      Filesize

      255KB

      MD5

      658060b052dbf94206ae3b50fc61916a

      SHA1

      ca2d8283531ec56532cdc14b4cb0932f1555c5c7

      SHA256

      6404bcfac5f3523b2f32b79360567aac98a56420c73341fae74d96b847e2c229

      SHA512

      4d8fd98691520cd2eacdd3032c461015444d31ccf815c7635ed9ee178743548747523d275088bff613a4552609c199d42602d385721c0158575a8d09f16483c5

    • memory/1260-6290-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/1260-5805-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/1260-5804-0x0000000000180000-0x0000000000182000-memory.dmp

      Filesize

      8KB

    • memory/2160-5803-0x00000000006C0000-0x00000000006C2000-memory.dmp

      Filesize

      8KB