Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18-05-2024 05:47

General

  • Target

    533d84ada8814cbc0ef940f8e0a5fcb7_JaffaCakes118.exe

  • Size

    364KB

  • MD5

    533d84ada8814cbc0ef940f8e0a5fcb7

  • SHA1

    e35293331e374f65f9213f7493391fe602c234ab

  • SHA256

    ee6665a15dd66853b035405ce04f086add92820f8eea31c890ae583aba951590

  • SHA512

    771f3eb24c042dc378daaa9ad651dfe5c928185bdedcbd3fbfe21c13fa32a8411bccc9eadb5ea0953a949910eefef8c84954d05fd78a68faa1e079f1b007397b

  • SSDEEP

    6144:KVx8UvYdINFhAOioyF5vsLgEpUc8aPts/LVpsjc8TZEseHl5WSdIaFw:InNFh0lvOvAVpsjc4peHlPdIB

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kcfbr.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/64F247DBE37395A4 2. http://tes543berda73i48fsdfsd.keratadze.at/64F247DBE37395A4 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/64F247DBE37395A4 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/64F247DBE37395A4 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/64F247DBE37395A4 http://tes543berda73i48fsdfsd.keratadze.at/64F247DBE37395A4 http://tt54rfdjhb34rfbnknaerg.milerteddy.com/64F247DBE37395A4 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/64F247DBE37395A4
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/64F247DBE37395A4

http://tes543berda73i48fsdfsd.keratadze.at/64F247DBE37395A4

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/64F247DBE37395A4

http://xlowfznrg4wf7dli.ONION/64F247DBE37395A4

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (425) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\533d84ada8814cbc0ef940f8e0a5fcb7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\533d84ada8814cbc0ef940f8e0a5fcb7_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Windows\xfcbfwtncrub.exe
      C:\Windows\xfcbfwtncrub.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2944
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2052
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2932
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2916
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2128
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3068
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\XFCBFW~1.EXE
        3⤵
          PID:2692
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\533D84~1.EXE
        2⤵
        • Deletes itself
        PID:2588
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1280
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:1248

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kcfbr.html

      Filesize

      11KB

      MD5

      d2f3b49d71e4299b596020aecc4be2e4

      SHA1

      c33731af3e561bc1155b3d691cce52b9505391e9

      SHA256

      2436a9deed88968c2c6b1e948a6567b0919817dae68743d5b002374b977af196

      SHA512

      a3a84727ecae47fbe49278d1c5cb5282dbe5547a21d0a69c5d28876a9965ae12ea2ad6c23805a5a5c43a1d83fc0abdc273068b93222380db2a284df65ee97542

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kcfbr.png

      Filesize

      64KB

      MD5

      2a426c0f7c69b9e075ddca81e1c3ff3e

      SHA1

      9ad00fd99f9446fec951e419a56347f45195dbc4

      SHA256

      cf2904ccb419602eabcc8f1f44e59b4393cb3c27ca41738b146d7d2384adaf3c

      SHA512

      866f45158f1f0cb58cc5bfa1928c2459cf04d554288d6a87bc90a04bf1c396f189d5357504b9a972526505bd021945ddb426adf1c91fd0b7c14b7b7f151a6a54

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kcfbr.txt

      Filesize

      1KB

      MD5

      c6bde31727d32aa3568fe4187463d9ff

      SHA1

      80399697ed8dbab855327356a1e95d99469d7dd7

      SHA256

      4a029505d5ca1ea5e3639b0e7cdfa997576cfdd7e46b8aedc83ba97aba7675ec

      SHA512

      061d3d67a1971f881f358c98140710c9ce8b8eb0af5f28edd5c15fa070308a9bf0790fd656e849236db50ba4bbb9d71ec4d46c3ab6c3a40ef716fea91d5a8116

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

      Filesize

      11KB

      MD5

      c52da3d391b1df67328f8a78262a1f99

      SHA1

      c3aa9d1402d57dce79539ad31290545096436c26

      SHA256

      96933a9ea2ad74489664777895f16a4545c5b5f7623099af382c2e3bc7b209f8

      SHA512

      8ca6614eade9575d9ee683332646f6818aa225743efb0982e9b70c68fb678c64e79e7b56c2f9f1a65a5d4e3966121a468fcb1aa8ec8f84e4d20da55d7490e067

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

      Filesize

      109KB

      MD5

      de023ae8e04c2da1bf01f60d712f2a93

      SHA1

      73f340d92ad719a5c05c6fea7c38fe5f7c391174

      SHA256

      7ce09b684903b5b01e53934e27d17b795c397edd1df8d0e21d2e522620c4a890

      SHA512

      751a9b3749cd8ec59b2f04dca6bae4b90c5cf07074ff8c28c4a74e1016339a6245ab102996ab305a0ccf2e7b2594410fad717218d92b1b5b5ee7c913881c7d1b

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

      Filesize

      173KB

      MD5

      31b60689b43579bfd32154132a7f5784

      SHA1

      c9d617102b79478573d8f06173dbfc1baa5881fe

      SHA256

      215a1bb7ad4fb0a46084de32c7eccc066d0fef2c1653b4fe572623d96da31bc3

      SHA512

      c4120a860f6c6fb6945b2e6c78f7d4d4679094c5a7233435c2db0ec618df8b24806f36455b050962552079eaab887671d4f0ba4a2d74f47b7540b341f2b1e674

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      0e68d761935ec0f790d44e7c96840d9d

      SHA1

      50a133bb452d8c2f9acf050f65719e051013ea96

      SHA256

      3ec146aa848c2e6bf35fddfa1a41d4f082b2bb58bed0b97f78efd2c5db6431db

      SHA512

      216b36454bbe98704dc3980781f6b267138c9d7640b31ef1dd1971272cd45b7a305738327f11ad52175e5d8a8a0861cd8bf81e32763b404f8d8497a04ecadb54

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      9cf0435ce5c11d27f5999de8a8b427d5

      SHA1

      2e01bb7b7f4f7bbdc3f8af7d96ab743444820924

      SHA256

      6b81d1ace784178af7e49ec8b00b125ef466285b40dac681ec809c6c20a8569a

      SHA512

      ef37f33d85cf298b9b2135e3c2edcb4d1cda72c6e468dc65c91126d646ab0f1f897f48c899974f0e1914d75e0f4bc4efc7020d1431fac754ba7548133fd9b686

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      27c0fb2bb8a3d1981c53cfb68eb83410

      SHA1

      98ed3e4d4deed9821335b268cf4c0b167b05a7af

      SHA256

      ee35c7bde324b6bda61c9fd00f4cd1b4b86b91e2defdf7ef085e3b33583c3890

      SHA512

      0371d4ffd8459f788f041978d3533bfb6895f2bf8f5dc1d1630eb9745c5a3ef0df475ef66d3ffb7d00b581c4ffa9f86745ca63d04591efb4b9076989974887d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      a75a2ade39457565be803f7a2d6c7c62

      SHA1

      b96df8cb098aad6ae04d606a29cc7d57a71077b2

      SHA256

      6445033013c22cd2aadad69b1a6623df7e944e6a48fdd8452f21a66511c55ae8

      SHA512

      7bf62d8257f2c0c2cf5f2ecd3ef33518968a1384f6168f5ff5e18f97210866107109bfc67cb5722490741f1b67a242f594ff8b479d7b7507f0c00dfd0be69fac

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      e0bba52390afa06c37558452cec8854e

      SHA1

      2bbbc3a05f6ee26a20b73c106b67f4a759e6a063

      SHA256

      8a1c66f783d29ab16127802a962ade3981f19d70ef2cb9e5f10875f654292c1e

      SHA512

      a3c2ca428242db901c341a9942a5481d13d67b0fb9ee1a84da63b3a3c8e71404808164c8bc0d5b179f5772bfeb13da4bcb741fde1d91b5be74f25181b6b2de53

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      87cda86f84c957486d25fa332e7b4ba2

      SHA1

      e384761438d0c3e3b93955bfe4d0877848175d55

      SHA256

      16a520f31f379b07479b3e4414b1ec741ec7b534a56b317e8e845bd49ff2d125

      SHA512

      9117dd96e00832cf64b08e25c8a141870258c8204c1a80065052142383fdf96f0056db549d2fdc06d959eaf5d05b645521303510bee01b54c0b8ee09c6d0aa76

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      fb863f139aa253880a55dfb590e56869

      SHA1

      0f7f5e1d414c7a7e4a0f73e9cf4c2ea0f5293e89

      SHA256

      081f0155f0eaf18fc0c87080ae54255de7f6ff2bb7d29f75a5f68d69b77cc79d

      SHA512

      d16df155e65de3168902608da068d74159940bdd03349250fd2dbcf8a9208a737a95b9e5e583af102a5acdc8fee43bd79be08296c616528c05f0a6b191fd6860

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      e4ffa748378c7ee8ff3f74d0da6c163a

      SHA1

      245d2b9107a687498735b3732eb4844378292112

      SHA256

      a14f3fca2aa88785704810482182a4e277e8eb69a99cfe23aa96dfbc3ff94469

      SHA512

      dacccfb966ae6e15d1c576e2a1a3fa7a1cb76fca7e9d7759c28cde60a9c2e8415abc55b6abf4dfb75c2df976116365bb8c53e0220d5871c2dfbb1015d05923ce

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      2fb26f41f8cf772575620ec4db68661a

      SHA1

      0ab43b53ac4fba294c407697ebb056fc4fae2511

      SHA256

      b73c9a0e0d14d25f9c52e879ad0b3bd4af542fd8cbf223623df494f0aceba35a

      SHA512

      4a80cddd95d702fb537a2351aacca3a692ef0f25b47a1a1be8b1bac10fe2d728031587347c644afe788ebe113fb0afd1f4f295221988e5156c81228cc7175a4a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      8e0cf111db106316d9135cfb8b5abc52

      SHA1

      cc944a79154d7794068e7bad22640a06f7fdcb1b

      SHA256

      1972cc40b6489f5416d23cc5306b5304dd1ecbfd715e45549ea5f3bd06aa4b92

      SHA512

      fdad0f95bf4d3cc19cc17f8b09ffba63d3f59b56a2113463e115c72c41dc0dbf674bd2697cf86335485ad1c80deab3f3d57a6eac2aea0c4e150079ba81edfee9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      a2aaaa072953b725bf044a446c79789d

      SHA1

      28dad620aa9e70c912facd1cf138f79c408c2ab1

      SHA256

      788dfacb0808f88bf4fc431a25aabd052a91096fed4a901e15d2ca3f349b9d47

      SHA512

      2a37951c1df7ffebd1440f22159ef155fc131af6faabe3251cc4c71a77efa396d5c82b384f1c78ecee46bbee434805d8315b43d43d2dda8e398e557429a02550

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      e418f652de0eb3180c6dec7ae3213b65

      SHA1

      6e016a34617a89fdd03b5b51ecbe0dc3795d2680

      SHA256

      1143116ea14cbd9f181bb3b35b5a59f5da72f18540ced407233c26036b1b2843

      SHA512

      24402a0a05b67bab2727ed1efd4a417613600bd58d530e0e349e3fe9bdeeb9646d5c1ae0df3dd1b430b3e98439be10ab8adea5504823d122faa95f8c144aa818

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      f452ef85ac520281056e6348dd7e8783

      SHA1

      e3733ce83cbe6caac2d1598e5a9e9a51ca6c2a49

      SHA256

      3d31f1adb9bb1eb9155af053cb71393656705ceaf723abe7a79ca67864a755cd

      SHA512

      aa0d9c95615aeee1aa1a1aec0c8f26fe214fe779f054781ca8e4cfe052877e1c27b79a20d12cc523f53c07dc795e9e293964eeb9a19a1a6225db31c355d588e5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      2ec9869fd5de30d5fed19d3427dd3aaa

      SHA1

      e639cd38b854b7c7275280b72df3ae1ca65325b6

      SHA256

      95a36e1ea459f96776e8a89f3d1f762e2feed6106f85be9f4b370ac04d522cda

      SHA512

      6c0ab95b9a64f8f8e5907d890442fb12ee44ac87ef9681264221f1cdcbcfb6ba8a2265b6884b2e966094485a0653653576747f84d9e798a5fa4f72e8483b8d1c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      123808a16bfd938a7b4fe0042bb7b56c

      SHA1

      0686a503033a73319dd27e84ab10b10fa0adf918

      SHA256

      b3d3519599a56254d2377cd0f2c3caee20ba634cd8729b46820617fc9e4b1a93

      SHA512

      fecc9278a5af3fd2801c976b81da460726827036aedb5882c3699c576c8cc8578df9d2e7003818763c7d1999437da6ae027b35a503b7dd92824bdfe85f04cedd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      aec1a8d535e76cad340544b6d490bcd8

      SHA1

      d5f02acd071dedb19f201a96f644c10a0efe42b7

      SHA256

      52183daeaeeee4c7998b90a98a554e212fedef90847dfabf3c2150000a87fa10

      SHA512

      c1d296981f22b0bd5a43510bc2659292abe14f79716dd429be84f7dff5788f3f5872ab44e1143ee1fc637a423a34f887954bb8ecbf4faa159d788a5b77accd77

    • C:\Users\Admin\AppData\Local\Temp\Tar304B.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Windows\xfcbfwtncrub.exe

      Filesize

      364KB

      MD5

      533d84ada8814cbc0ef940f8e0a5fcb7

      SHA1

      e35293331e374f65f9213f7493391fe602c234ab

      SHA256

      ee6665a15dd66853b035405ce04f086add92820f8eea31c890ae583aba951590

      SHA512

      771f3eb24c042dc378daaa9ad651dfe5c928185bdedcbd3fbfe21c13fa32a8411bccc9eadb5ea0953a949910eefef8c84954d05fd78a68faa1e079f1b007397b

    • memory/1248-6041-0x0000000000200000-0x0000000000202000-memory.dmp

      Filesize

      8KB

    • memory/2436-9-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/2436-8-0x0000000000400000-0x00000000004B1000-memory.dmp

      Filesize

      708KB

    • memory/2436-0-0x0000000001EE0000-0x0000000001F0E000-memory.dmp

      Filesize

      184KB

    • memory/2436-1-0x00000000002A0000-0x00000000002A1000-memory.dmp

      Filesize

      4KB

    • memory/2436-2-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/2944-10-0x0000000000400000-0x00000000004B1000-memory.dmp

      Filesize

      708KB

    • memory/2944-6495-0x0000000000400000-0x00000000004B1000-memory.dmp

      Filesize

      708KB

    • memory/2944-2547-0x0000000000400000-0x00000000004B1000-memory.dmp

      Filesize

      708KB

    • memory/2944-5526-0x0000000000400000-0x00000000004B1000-memory.dmp

      Filesize

      708KB

    • memory/2944-6040-0x0000000002F40000-0x0000000002F42000-memory.dmp

      Filesize

      8KB

    • memory/2944-6053-0x0000000000400000-0x00000000004B1000-memory.dmp

      Filesize

      708KB