Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2024 13:34

General

  • Target

    054d68e1b21ca7d723170ab0a76ecade_JaffaCakes118.exe

  • Size

    336KB

  • MD5

    054d68e1b21ca7d723170ab0a76ecade

  • SHA1

    36495fdc5e9784e09e8c11838c3ad3653f987fa8

  • SHA256

    85fbae8101c1214be4247bba710cbda6d4af6889cdce838a0ace154f1487f581

  • SHA512

    1f517a80a5eb9c77b1c5a56421c27b6653b75e35728d121576340a9f99dbfb10a59a0e5459b2df592851cd122dfaffb970feb9423a13ca09c2bfba95df3b7555

  • SSDEEP

    6144:vaq1F7UiBDVWXP+t/tCPS0U1R+6OxuQ6jEUxrSrdqD2Ig7Uf++z3EJ29iV:b7rPW/6tCPSxN8IoUfvUJ2g

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+qrhsh.txt

Ransom Note
__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#! NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/C226E7F456D5DFD2 2. http://b4youfred5485jgsa3453f.italazudda.com/C226E7F456D5DFD2 3. http://5rport45vcdef345adfkksawe.bematvocal.at/C226E7F456D5DFD2 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization 3. Type in the address bar: fwgrhsao3aoml7ej.onion/C226E7F456D5DFD2 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/C226E7F456D5DFD2 http://b4youfred5485jgsa3453f.italazudda.com/C226E7F456D5DFD2 http://5rport45vcdef345adfkksawe.bematvocal.at/C226E7F456D5DFD2 *-*-* Your personal page Tor-Browser: fwgrhsao3aoml7ej.ONION/C226E7F456D5DFD2 *-*-* Your personal identification ID: C226E7F456D5DFD2
URLs

http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/C226E7F456D5DFD2

http://b4youfred5485jgsa3453f.italazudda.com/C226E7F456D5DFD2

http://5rport45vcdef345adfkksawe.bematvocal.at/C226E7F456D5DFD2

http://fwgrhsao3aoml7ej.onion/C226E7F456D5DFD2

http://fwgrhsao3aoml7ej.ONION/C226E7F456D5DFD2

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (406) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\054d68e1b21ca7d723170ab0a76ecade_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\054d68e1b21ca7d723170ab0a76ecade_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\lkccchvsalkt.exe
      C:\Windows\lkccchvsalkt.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2836
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2724
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2732
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2504
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\LKCCCH~1.EXE
        3⤵
          PID:2476
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\054D68~1.EXE
        2⤵
        • Deletes itself
        PID:2604
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1656
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:1236

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Indicator Removal

    1
    T1070

    File Deletion

    1
    T1070.004

    Modify Registry

    3
    T1112

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Impact

    Inhibit System Recovery

    1
    T1490

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+qrhsh.html
      Filesize

      8KB

      MD5

      ad828999ad8bc48f164c02e0b70851db

      SHA1

      56a624f0f7783d3b2c9c33bfbec0b68794863675

      SHA256

      095c333bd55716f79dfc7a899d5e59605a043ee696530ba257dbdaafd5595230

      SHA512

      eb5687c3c9d9023417c2f09b8c21c7b5da4c8507c3b9ec3007fff8078c087e375cef93e64849a82d9108f1d4fb43451854a9ca9f606d6be1b4dbf8e641586e5d

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+qrhsh.png
      Filesize

      68KB

      MD5

      769554f40a716377a57be675b3747802

      SHA1

      c2a14564784ce16808c9453857cd88850e4f7b85

      SHA256

      d58099760e122b7524e9c12d9b424f035a9aeb852941c0150eef74af914a3c2e

      SHA512

      b8eba66b4ae9548eae929b8eb3ca8e5d3a4723abe86e03e923fff01551358d9c47fd82cb03211ccf68c1a98918122a8785e0d126becf122465e4332840715884

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+qrhsh.txt
      Filesize

      2KB

      MD5

      77e7d50c6ea53ae14de26687d3634af9

      SHA1

      01375286101d46bdca3cb615850f616c1f9f802d

      SHA256

      3e7f829492b7060a6dbd27d19bc7b97be21581b9c4e1097bb37e879cf277bc1b

      SHA512

      d238f65f4d90f4a70ca41d21bcfb6be0018df947417dd444062df28837cbf859738697e40fe5bf71a9bf6a69dcd340e14f97c7828f834d979bc640854f9955ba

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
      Filesize

      11KB

      MD5

      ad05dcc0e87d511ef477226861bef4c4

      SHA1

      01e6da16dfd6298c846ffbe81676f52dd253a74a

      SHA256

      f528d58afde0e131da7f55d74226e4ddcf77bfb8518bb5249bb6068a1d1b1c31

      SHA512

      26fab4320c3c4a6417943610479fbb0e7dc593e6d162b96b83eedff17b096ce8f803fee2f011a4ffae359ffb4276a7736c15f57bd063f2e0784a8b2fd434688a

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt
      Filesize

      109KB

      MD5

      97ae2870efbc5aa3e20dd1aca41ef059

      SHA1

      9ea81ff0474173a0a30a4928a9b149aab2b37379

      SHA256

      da70e54cd81476e141fb1d216881d441741147ebf28a38cad7837b3649eb4c9b

      SHA512

      b4bb24cc189dea29a5055163c9f02ac7432cf73a453d05a8b0ecf4690c40d6308913d0c357b0949f33f550613a4757dc0f92b473aa18c92a1dc352ccaa8afc42

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt
      Filesize

      173KB

      MD5

      8454d4d9d3ee550843320f99659a102a

      SHA1

      7d2150ee476c59b7de5c0fe6e1e7d662da47d31b

      SHA256

      d6b0d2b0dff59d694ffcc34eaaf52d0c8c414eb3706f6dabc99f959ce74a8c34

      SHA512

      615e067a566f24cf4b3c7e4f7f2899696df6cb5d0cc7d7854818464324257a54060b4874dc0f82c307611937e1620b05dc787f2a79e07745dc5de2c260fb8fd4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ad6524369aea103254094f42561c7a39

      SHA1

      4821b4a2d5c89dbc4ba35c870fd9d86f17af04f9

      SHA256

      00e9351bb149d9a04ad990a8fbdac352405cad2923e0e8f80158e4387c76b46a

      SHA512

      79b9ebf944a7b09a7e9ad5b65d5a0a7a81c6a12e3f33a26fec14d9991f88c7e9d6eaed68114d23c457de4a1259df5e0ef65daf2fe6566257d3cd2b16d0e928b8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ed41bac9e2668be2d18b1b3a840edd14

      SHA1

      1da59c1cb2f86e98987bb4247a2c5caa7ca670a9

      SHA256

      03961a0086c66a1b4cde4ffa9f757bd1929e1d8e451e89a0c72f9bca0c2230d6

      SHA512

      224c4cd03f2fd49f31421f042f46e2cf5c598f505bc32f7e1413cae17e51e09052b5796d71f4f88dab13b93593798ac0923aea2c763c192e55493a7bb35e7787

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ce7b43ddff0d1e67c8ce784e41e84b74

      SHA1

      bb6984c479cfb8f4cdba74fdd856c94bf061ecf2

      SHA256

      802dceb683a924a13bebe2de8ef24be7253e3da562e3df8c16dc826bf8965b45

      SHA512

      89ca39169940fd6d82ecc68ecc9665b9c28d521487efbab5b1d12557e9722d37027a90a38628c3de37e04b49c6a934fb25cbe491aecc07b5974caf2bf0036939

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1a5852b1f6324d26fd15099c76f0b7f1

      SHA1

      05c61ab62336be45b360588a1b742705779fb4bf

      SHA256

      ff4fa05d8d88566ca1ed8c1f98c9baf9ddaee17772dd9232ea9a429abfb4a773

      SHA512

      a1e0ab40ebad12ea10a28089418d96bde4f81fe2d5a54f61328ce9c4a88a0b2af47d29e027ff9d6d4cdf024c7e9a9fefda6c4db1213db570f689b6d619281492

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      58abffc5635d971e84390920cc8cd3ac

      SHA1

      37e2cc6bbde413961a88c202a1280b30987ca35a

      SHA256

      256a679f57232377d2e73c6e13eff4c2ff42febf7260f0d8f65fa3390e7a347b

      SHA512

      5f342d6fc84274d578d64047b6f4cb9011d937f55c7125367962c2a27927cc08513bf6db9ecf26d53330d82c2e579841f0333b1066e0810dc7a9a2a1ce17d8d2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      efbd4b26b75724b2143890ecc0a02be6

      SHA1

      18096bf352ac1afdea77b12b1e149b85b504b956

      SHA256

      04458e9653d981c723a84d5c937bf44ab1ab6f84cdfd52daa087433134f1bbd1

      SHA512

      ccc75d2a8331350ce19526552bcab035c33b7a9e242d80c3990f9af1df82a8652a05543a18b817401c9009ca5ac1d48068a123e6beb0d9d87e768ab04cebdc61

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8a00d587a79f9c031d1e12a7c60c7f7e

      SHA1

      7350840ed0ab995794e1cd1ebad7420e9edbef0a

      SHA256

      27f56ce7637dbdfde7d5548f85fc874afb048a68d73dca73bd07f0d2dd1d32be

      SHA512

      bd4508283d86932dddb0adecba9929098f22923ffd9d7bfd4f457300ad152f9fa01646a6836a52f264a8c2ceb177f0b9d736318209c71c3cf1215b2095c6e270

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      97085461197ac5107c6898f404e13b8d

      SHA1

      02722f415f4d37db4a61e5379bd91af8c97114c8

      SHA256

      12659632e28a52f05dd9396623f6402fa67b6aaabd46dc5b524067531f0b35d0

      SHA512

      282f5141f3a5d8e5bb2fc3209b2cac8530e5362536df6867efc58cc8e799d0026456066486a699f017b3153d5a119f3cb9cad537a77adc8beaa752a434cbaaa3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f6da279670175538d24992a08f475a39

      SHA1

      2b6218751870877f1daa2eab28a7064f5cb6cb21

      SHA256

      cf7d41943a5b5800fa73333d60f0fc9e211ba7a4ae91bdab2718bf6d1fd57379

      SHA512

      7727daa344c73904a3567ebec3ce2513720bcf334b1e8c39173729c3214560da4c8b56e987a931644af7dfd5487d2812b6c5e9c5efac15c96421db609371f460

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      fb78a30bf96c020a696993e752da8cd3

      SHA1

      b39ef18d918154cb21948098f520749a51dc1d4c

      SHA256

      5d57c1c05880b464e7590fc30d30d1ec07b00f2af9d84a2109b8793ae93a0907

      SHA512

      96d5cea580fe9bbd44824551611b9fc6150aaeabb4602033de840808197c3c4b98f5722a07ff131fdd283ad7170160e823f6daad3a5b547ff469e270eed152d3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5f2c4ee316be84c9e0c521dac01f5e11

      SHA1

      9d12bbc00156b576e0a60784c16ad99efa84142a

      SHA256

      6f737bc58e556a4b1e48de408474057e9efef9a3b4822b0642b9b3f2683cad89

      SHA512

      7de191595c87b63e00bf4444f189bff2dd7ae416aba26b153032e488b479222a703ccf9f7d31f692c80e22698a1de6fdec34ce7cc27094c706e4a9f8c139457e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      af28d6344d21301ee5c306f8a9c22ac7

      SHA1

      7b2d6b369c9f884870ced4e41ef9043f1b12cfb1

      SHA256

      ebfdee9a7398963d5577180ecdf1bb9d3283be707c94e52e301e942b71a5499a

      SHA512

      d4cb2abd571e7479b102cb6d5423f6fcd401764218ec127e5a1ad1609e0cf4dc7afb203e0aabb9007282fd44ee00ac07d0731630f20e3a4b3bddf1150570cae2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4f75b28d0e70bfad3b74fea37a0eb067

      SHA1

      f576937de28eb809b18a9ba4d5a12b747db84e54

      SHA256

      24a93718a6973bc7e9c9eaeb1e3380e33373c440b9ebcd99059e7252a7ad3303

      SHA512

      aacfc47093da2982e80d1aade10a015ca0119abdf18d45f170afcc0e28dc022e0688d4d2b2b418d4b39e44c2dc9466db1f62fd789dda95c75203cbd6f4d3ea67

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      139d671882c90139718aa3feaaec7a3c

      SHA1

      7d15441720954e2c21d09f1c5b677b4a225a9c84

      SHA256

      eea794ff7c9e4d312ec3c164c7fbff444cb60e7e68732a7ac8cfeb5db3aeb9bb

      SHA512

      97738890581a44b7d3bc346fd6eb675589d9de0f288641036a658e7fc7e4f58c8f07f3ff4b46703f03f7f45c96af24f00e131745b74179cbeb85801018d301a8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      d5549a79290e479bf97aa220052cb367

      SHA1

      3f53f3f228fc8435db17e953b605d65e289beff3

      SHA256

      b208283116a9c21c8a265762e96796cbff019e7ec9a1c8e844fee704aa0fab6a

      SHA512

      ab86ed1c9249f6a85fb1f4ed5cca6561e2af24d3841851f6e8dbc0199a5edac028c44f9f7b3842ec11ad3729051bb8a1e9715916159a178ca107e5f23fd0f022

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      e8ce59996e85fbefa8e7a64333994f55

      SHA1

      d54507e8e9d13f5245015a61bda08554dd92097b

      SHA256

      df91bcdd4e8ab8ddf78440314eaf6861ce0f779133af3a8ea64d9ad87b6ea3bb

      SHA512

      9294474c2fb202b238c44d1963a861b3214286766fb488a8e9d7fb066f28b17e290e7973bd49a25dcdc56d4535ee1c023d3a0d913a411ff274d694840200dcd8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f7f355f0ca0055145c1e4af109538997

      SHA1

      537a85c28d1e3e268a6f333d2847e9d90074dc30

      SHA256

      de7c3c1f7cb392254ded36d05226a4f99948fb744d1367812440676aebe4e87a

      SHA512

      dc2eb6a71fdbe12fa88aec00a5d3e54469680d3e79549ab160129dacf638d695160b36fbb9a96a57ac602e0a59425fdc9de49dda2ee842a712348d256d9a42ef

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ee8440bfb273bb4a313ac1b7d324f0bb

      SHA1

      36b35b8ef50a3c3bb32be08cce2a963cc08c8fee

      SHA256

      d7b649427202b0b9324ddbd4df23cb2fa301c722779ebda2b233c50a6a7bb746

      SHA512

      f1a37296bbbec9bc2143de8c22ca0cfeff9e4500148f13807cecfc5a26121202d3256f108b1c24b290c698378131010b98abf2e1fc6f7c2025bdc68739462671

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b1e587793dc2c6a82b7cef8805092e3f

      SHA1

      0b995cd4b97cb8cba83d270e43d5574ed26b937a

      SHA256

      84dfba0ef98ab0ce6ca3666238a54af78f5b81ce89f680b9321ff3fcbb9f34ef

      SHA512

      831902314987e436a6e19c0a8a83d981aa947537c1b0840866d6cc88103da3007620eb688c9f7f26e330f8a028c8575c06681678360dfab7eb3b869630daa1a0

    • C:\Users\Admin\AppData\Local\Temp\Cab83D3.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar84A5.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Windows\lkccchvsalkt.exe
      Filesize

      336KB

      MD5

      054d68e1b21ca7d723170ab0a76ecade

      SHA1

      36495fdc5e9784e09e8c11838c3ad3653f987fa8

      SHA256

      85fbae8101c1214be4247bba710cbda6d4af6889cdce838a0ace154f1487f581

      SHA512

      1f517a80a5eb9c77b1c5a56421c27b6653b75e35728d121576340a9f99dbfb10a59a0e5459b2df592851cd122dfaffb970feb9423a13ca09c2bfba95df3b7555

    • memory/1236-5953-0x0000000000130000-0x0000000000132000-memory.dmp
      Filesize

      8KB

    • memory/2012-16-0x0000000000700000-0x0000000000785000-memory.dmp
      Filesize

      532KB

    • memory/2012-1-0x0000000000400000-0x0000000000485000-memory.dmp
      Filesize

      532KB

    • memory/2012-0-0x0000000000700000-0x0000000000785000-memory.dmp
      Filesize

      532KB

    • memory/2012-15-0x0000000000400000-0x0000000000485000-memory.dmp
      Filesize

      532KB

    • memory/2836-6440-0x0000000000400000-0x0000000000485000-memory.dmp
      Filesize

      532KB

    • memory/2836-6157-0x0000000000400000-0x0000000000485000-memory.dmp
      Filesize

      532KB

    • memory/2836-5952-0x0000000002F20000-0x0000000002F22000-memory.dmp
      Filesize

      8KB

    • memory/2836-5714-0x0000000000400000-0x0000000000485000-memory.dmp
      Filesize

      532KB

    • memory/2836-2680-0x0000000000400000-0x0000000000485000-memory.dmp
      Filesize

      532KB

    • memory/2836-14-0x0000000000270000-0x00000000002F5000-memory.dmp
      Filesize

      532KB