Analysis

  • max time kernel
    138s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 00:57

General

  • Target

    6cd9b22cd6b3ac432bf8690eba4d5348_JaffaCakes118.exe

  • Size

    340KB

  • MD5

    6cd9b22cd6b3ac432bf8690eba4d5348

  • SHA1

    c4983823c3e53ce2eed20939b7c2b2e098fff7b9

  • SHA256

    0c3627d59f3087a2b3a83b4446eb4446b662c2351f52db9cc0729dda9bcdee43

  • SHA512

    9227b3543c6a79d714bc81a5b16b55a7ec63e4691f31d6fb68416ad2c3473a97ef827189eea10d7d05ec7bb4b957cf3ad677aecbc1e654ddcc9e90be5f2cabce

  • SSDEEP

    6144:0WFLFLkNpvlmNCp27PoWZRwwXvFw0OH2paKZwE+VcF3GCF9IyjVLe:0Wnkbvlm3FeHdKZICF3nb1j

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+nqmlh.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/8616E713519132C2 2. http://tes543berda73i48fsdfsd.keratadze.at/8616E713519132C2 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/8616E713519132C2 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/8616E713519132C2 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/8616E713519132C2 http://tes543berda73i48fsdfsd.keratadze.at/8616E713519132C2 http://tt54rfdjhb34rfbnknaerg.milerteddy.com/8616E713519132C2 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/8616E713519132C2
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/8616E713519132C2

http://tes543berda73i48fsdfsd.keratadze.at/8616E713519132C2

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/8616E713519132C2

http://xlowfznrg4wf7dli.ONION/8616E713519132C2

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (396) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6cd9b22cd6b3ac432bf8690eba4d5348_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6cd9b22cd6b3ac432bf8690eba4d5348_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Windows\gnyfkhxjdltb.exe
      C:\Windows\gnyfkhxjdltb.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2844
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2628
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2728
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1208
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2000
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\GNYFKH~1.EXE
        3⤵
          PID:1804
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\6CD9B2~1.EXE
        2⤵
        • Deletes itself
        PID:2372
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2340
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:1516

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+nqmlh.html

      Filesize

      11KB

      MD5

      c81ca4ecdbd2e353e13eeca6f7188885

      SHA1

      d16883315e028cf0cdd7275851161d8453087b0e

      SHA256

      b5363d06672dcad5ff743768ff0f57d8baca255a59cbe9ffff338db5eae01399

      SHA512

      b105b7759dd98b171b9e331a0f8918cf14465fe078b79609031cef7396df89fbc2e51ef62f98252b7163a67f8641b72c8649d9fd62c30c8fa014bef93e848a0f

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+nqmlh.png

      Filesize

      63KB

      MD5

      e589d62a04a7cf4806bc697f29349440

      SHA1

      d54a05e1b41f029b8b4a507bfa6fd1ccf8f40197

      SHA256

      3d49f73ceae5d5cbf3f61e85c9aaa3a04a9c35b1a68b56449d5b11e517692d14

      SHA512

      271869df6612a4fe97de869b875bb493c6fe1c728dedc5d9d97234548d6cb70db71ec79462218653f9922f9e2ee8487d800aed9500445612ca23e8e30c1931fd

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+nqmlh.txt

      Filesize

      1KB

      MD5

      cf47706543a84673ca221d43f3796d6c

      SHA1

      7f7226ad8b5db46cdec59bc42f6c17e087ce25c9

      SHA256

      ae893f90bd9ca39715fbce0e6f14c7230956d681846ebf8d4f901578b51e014e

      SHA512

      bd67860874d37157a20b7b45764c455087a584546bf94f41e8e184597057347e9e9729c6dc82ad78844ad22e1d888c032283cfda599a3701aded3b4ecd16ba15

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

      Filesize

      11KB

      MD5

      3d8651d0837062c5949aa54ddd7e21d8

      SHA1

      04f7453b7a6cca36ae8e9b54b662dd6b92277335

      SHA256

      2701f11b94154f66d00aed360d1b4dccd6cc23cac399e77eea50419b94160c2e

      SHA512

      01d5f5f041f1fcedd113a3fffa265867ea3098eada8b8cfdb10db494989e90cdd69e8761cd1ce5cb8fcf2900e3df4a48f9654dad522219e66b1adbac28490eac

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

      Filesize

      109KB

      MD5

      46de53f52ac28d9e087b9daf98340e1b

      SHA1

      06f887e68da6e9fbb8ee54e5d088b7d08dc2495b

      SHA256

      764a315a1a1be0cdc8d6830bb75ab86cd747ff9162564341fdb88787c6769b18

      SHA512

      936523ff98f1fbb658f9383ffa387a64531cb7b65ffdcd161df80fc7e89c2ab4d3735fbb636d541760a94797ec4a00a7ed4a40423780aa25b7d6b22c6c2c804c

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

      Filesize

      173KB

      MD5

      2228bf4725e82906167f966d3d091bb9

      SHA1

      66d50d3b840bf42b1b1c01022ff0c95040fc5895

      SHA256

      67e05edbe436e3b33c7cd7988b3c448d6e1fc949895ca3e6812a3430b1acb568

      SHA512

      131efeb1db02292ee42083573d026c02efa192123f9554db5cda147e97e62c46030d4eff3e8223b9142726f7e1383171c2833d59f34e158146ec51898bea43b8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      c15cf75b5f88e7cd27fbad53207a18cf

      SHA1

      a2801bd579e97c87fe1681942db334ca4a509994

      SHA256

      7829f2b89aac5f7d42069ce1167e74cb56bb711e3f9997d82af942741a6a6b31

      SHA512

      4e2181cb69f32d4e2a37da33681d27d9298cefaeef603708cba8b3703402d9f82ccd4fc68b129cdc2ea23a4028988d211f42e275b278dd2f8172d2052d44d046

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6b1bdb3bf8089694bbf6c147186b6f97

      SHA1

      7eda7d90e866d71f9b0d85960d1f70965ca7d383

      SHA256

      f0a282f61f0f0afe9d25051e8dee7bc79d32fb01c967fd5a78833b1cc3e6fb26

      SHA512

      9eb808aa492a85d2355a9f6326de14a181890f0a7363313f092fe7289e06b018ac2edd78a0d2a416791531f39ad8d219aa81f78b570a5410ce4589510e43a23a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      76cb44b4f60cd54c94869abb3345230d

      SHA1

      3092fc6aa4f830a5e2619611b4ca36665cdfb3a3

      SHA256

      c1cec55d9d4e9f86ef4eae501696f533cd6585e3fe30e0eb31d9bb8558905d78

      SHA512

      b8fff40c57ed1292babd5cfe5778a4b120751b47fe4b790a06c17809d2a6bd9d549ac68f45472650a6e49b250696ec1d46769995a45aa13e488e26e48cef102a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      165afa24d51149a3ec14f79d1dee0dae

      SHA1

      8c87e3e2863ee5e5a6a72c68022c048d2a9296db

      SHA256

      72b00bd19f1d53965bf81eaa4e6167cbc6d79c8619f123bb8605d71f6719bfc6

      SHA512

      e775de1d878bd616bea676e265412bf348a11a3913a7cb566f8989a65f1898ef7af611def5f9adf65d1a0271c53ebe9cfe468e7f9d43c720b3a4ddd274102adc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2679c8c6b4b78d7c9e5de93b83131518

      SHA1

      90a26874a56b77dc56fa15a2c139c7358ed2c553

      SHA256

      a5fc673fc547e8eb870b75d38e62d867f2b69cd06a98c8860f088331a5d4185a

      SHA512

      fdfe8bd5925831ba2e7dc7cf53cc583701fd425db505cb9a4b0f5cae0b64afaf6e398928ca0565649a849a5d3681c5260384ada47320c826ded1c37e25e9898a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      831df779cd272e27a0d5bac1f3c2ad7d

      SHA1

      4423232a861e7c106196e10702b581ffea28f848

      SHA256

      eb3283bd97d95b1aab205c642f1096c73d35f75a58972048647a5c5b36d83e1e

      SHA512

      3b1c6bf6ec888b73850162d9c241e7b60da40c0e5e32aa33915b6f9a18c9f24b9359967ac1b24d90c232e483cc45d6cb23c2ae94b2d896599cdcd5195b9b8289

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5baaa572d07516fa60d3d008186b40f9

      SHA1

      1e14938671b30bf22abc8f9e6cce6e0852d6d7da

      SHA256

      5b14ad9ec27dcc1490330e31107897aa62b17bbfe575f623f6beb406eebb8223

      SHA512

      a72363f533151786f2e035733ec7cd4cf59e149c17bbc04507d093798def175768d54fac095a3572201099e617973b1cdc70b583d639160516c5a2ba6c7ad4d5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      bb91a4162784eb012144b8e6bfe81de0

      SHA1

      5639f5b60a59f903f7ddde1ffa6552b7a09ed621

      SHA256

      9725db8b5e119ad5b7a91c60c9db601614f9a5565db36f497026215068139628

      SHA512

      ce0dbce0ad2bf1e81922b2f3aad41706a1b7786be96fdfea02c891b8c25146391f722971492c8893874e06f0d6b0485a566828fe3458d9a7f64a197901ec6efd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      664fa5c51ad6b15ab74820ddfb850cf1

      SHA1

      5b0a8737c3553fecb0e456456db7ebf8f49c76f4

      SHA256

      233a6fa23a94a4f53c8bcf3c5c90391124d9c5f9758c07269e3e70c12fe921ea

      SHA512

      f4a2fe877640a32a2899760da4e4098544ed42fd23e8675a481f6c6463ce559ebc310277e06129b8f7362881f59be9dac03ea5d6436bb2afb18a8f3ff988cf59

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f49a842d2a17c0e7e5e3039880bc66bf

      SHA1

      a0e5e7594e5512e780f3e634af02d6acd9d2797f

      SHA256

      6b9fc1a12e06d8a4a7824801d074f1e8de8b340143bca17af384ab8cab5e0c2e

      SHA512

      9717ce0a637b13357901ae48d5f74b4420edeaaf0f1ce49186afb0137ec475ea4c22c182b53707cea83d78faafc16bd9537277dc209c5e3b8b9e47fe0f8f5f51

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a16643d62e8d09bb8e3be2ba0aaefee8

      SHA1

      b52199f359c062fb8f566f2bf5827c48eb262adc

      SHA256

      6831cdef33da4b3bb494eee385bf55348cd169e95c9e6105b469f700585cd8ff

      SHA512

      0032981a45c05734941b3dce680888ab5fe2863c60215a6fdd754e3c33549ea1159a5ae60b2af3de1cd20e7148d3e292915b06d1f4e6b03e208b1ec1ced46804

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6be470629e09cf82f893b7ef070520d5

      SHA1

      27e61ab6bea832affe82a03dc0d925142bf16aa9

      SHA256

      93b94d62b9c0659062f146819119055689f84a35b5e3016de70c5c59ca4e2dfb

      SHA512

      b80b172cede3482c7ccc2b499cea1f949be016ac6c7ce61904d6d052fdf8ff77fb497b22fab45770b26f6961bb8ce61b3d25d3899a67279da39fe3d14bfd035d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      33043b04aa95512df56dcf657038800e

      SHA1

      0c066e531e093bc1cd964d47255343a30b19ea5f

      SHA256

      00803bb15b5a895bbfe5c3ec7636923d37fbfdd529d0fa42792e8c15932b2ec7

      SHA512

      c886f116778424269daf951bed40dab724f123671d02c049340a1efb90473298f0f0b3dc3ad55c1922109583be1dfdd8d2af88bb37ba0a13cec0dd1c297a5942

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      90195294d40ffaff07d1273c34ef3243

      SHA1

      24078165b9427128110c7b0f448052d86f811dfb

      SHA256

      b09dc5f1ceb1a85463a37462cefc0e92bd21073b8b4c05e1fbcee2034727899f

      SHA512

      52f1c3b9f1ea39171d774058c90f2a42c63bcc2ea7a3780d40c2a85404dd28477893a5e6f075d6aa43b60398cf0becafbcc94cd7db7e5485fb763ec685fb7baa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      be39a1cc1a0520f70f67fd49c1efb750

      SHA1

      3a34dabdd614a314d5f645f509dd947249105fb6

      SHA256

      2cfaba7913fbce3afad31e83e828a7ddbfa7b309ebf5540df562160968d9e86a

      SHA512

      fdd1d57800a8bf4de7435a6de64074266bafd8dca6cd621fed9c92d042ac6424f0a580b49ff636f13ee6d15e860ca19ceea44000a7c2082af7a389dbc5d5cd37

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      995184b7493a6bde3166b1ef1953ac48

      SHA1

      84ec56c1d645afc17c9e80157a49e5d57bfb5892

      SHA256

      701fa2836e5ddf1c96e6c92e730206dee4ca1948a2e894ef1a4987cc579fff9b

      SHA512

      52f136db4cdd4e08b3300b96a5fc7d56660e4b3d2d669fa5cf97bfa80fc349edb4b5002cca791016a7370668a3ff4bdbf794f52083f366b4d3ecbffcda5a87f2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      969039c8248ef939a251b60f28311de9

      SHA1

      280311de1296f82f0cfc5949a5aa4250a8534d23

      SHA256

      41d7974eebf5539abf60e10e5b8d30bd4a478370ffc2100949c9533b0379e19e

      SHA512

      12d84d1ff8953a82af5446bfb79e571416c54818ac79292e7a5573ca11470d912f5058ff8237989bb31d3e215fba17005d4c6b261496242edca5c30a67afb88a

    • C:\Users\Admin\AppData\Local\Temp\TarB12D.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Windows\gnyfkhxjdltb.exe

      Filesize

      340KB

      MD5

      6cd9b22cd6b3ac432bf8690eba4d5348

      SHA1

      c4983823c3e53ce2eed20939b7c2b2e098fff7b9

      SHA256

      0c3627d59f3087a2b3a83b4446eb4446b662c2351f52db9cc0729dda9bcdee43

      SHA512

      9227b3543c6a79d714bc81a5b16b55a7ec63e4691f31d6fb68416ad2c3473a97ef827189eea10d7d05ec7bb4b957cf3ad677aecbc1e654ddcc9e90be5f2cabce

    • memory/1516-5903-0x0000000000120000-0x0000000000122000-memory.dmp

      Filesize

      8KB

    • memory/2504-0-0x0000000001C30000-0x0000000001CB6000-memory.dmp

      Filesize

      536KB

    • memory/2504-2-0x0000000000400000-0x0000000000497000-memory.dmp

      Filesize

      604KB

    • memory/2504-15-0x0000000000400000-0x0000000000497000-memory.dmp

      Filesize

      604KB

    • memory/2504-16-0x0000000001C30000-0x0000000001CB6000-memory.dmp

      Filesize

      536KB

    • memory/2844-5358-0x0000000000400000-0x0000000000497000-memory.dmp

      Filesize

      604KB

    • memory/2844-2103-0x0000000000400000-0x0000000000497000-memory.dmp

      Filesize

      604KB

    • memory/2844-886-0x0000000000400000-0x0000000000497000-memory.dmp

      Filesize

      604KB

    • memory/2844-618-0x0000000000400000-0x0000000000497000-memory.dmp

      Filesize

      604KB

    • memory/2844-3171-0x0000000000400000-0x0000000000497000-memory.dmp

      Filesize

      604KB

    • memory/2844-4202-0x0000000000400000-0x0000000000497000-memory.dmp

      Filesize

      604KB

    • memory/2844-5916-0x0000000000400000-0x0000000000497000-memory.dmp

      Filesize

      604KB

    • memory/2844-14-0x00000000002A0000-0x0000000000326000-memory.dmp

      Filesize

      536KB

    • memory/2844-5902-0x0000000004050000-0x0000000004052000-memory.dmp

      Filesize

      8KB

    • memory/2844-5915-0x0000000000400000-0x0000000000497000-memory.dmp

      Filesize

      604KB