Analysis

  • max time kernel
    298s
  • max time network
    299s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 19:12

General

  • Target

    Worship.zip

  • Size

    3.0MB

  • MD5

    a434b381dcb08f556173d1f11d161d54

  • SHA1

    19c9f4b392bc8fafa41ad3b4a724fb66c761564f

  • SHA256

    dc71309d185aa1c39ae1ce97daab077bdb1f9ca1617e2fccd741d15a9be8648b

  • SHA512

    fd009c2b60d8540120b8fcc5e3e652e7356a665d29fdc2367da787a3b72f0b1d44d04ff715ddaf62b774c42aa430283df60d89790607e549186016a35f6f0c4d

  • SSDEEP

    49152:hNTjSwTYLIE3gF+5b6ECl5w2FgaaPVgIGH2B/Ca2IXNxmfHzPhfTiiz:7uQYLISr1Ss0QgIY24qXm51z

Malware Config

Extracted

Family

djvu

C2

http://cajgtus.com/test1/get.php

Attributes
  • extension

    .watz

  • offline_id

    Lc3VTezPWbMhuVAQFzJUdeA68PwI7UDpc5aKHYt1

  • payload_url

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/abe121434ad837dd5bdd03878a14485820240531135509/34284d Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0874PsawqS

rsa_pubkey.plain

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

147.45.47.36:30035

Extracted

Family

lumma

C2

https://stamppreewntnq.shop/api

https://locatedblsoqp.shop/api

Signatures

  • Detected Djvu ransomware 2 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 19 IoCs
  • Loads dropped DLL 26 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 9 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • System Binary Proxy Execution: Verclsid 1 TTPs 1 IoCs

    Adversaries may abuse Verclsid to proxy execution of malicious code.

  • Suspicious use of SetThreadContext 12 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Worship.zip
    1⤵
      PID:2092
    • C:\Windows\system32\verclsid.exe
      "C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401
      1⤵
      • System Binary Proxy Execution: Verclsid
      PID:2756
    • C:\Users\Admin\Documents\Worship\Worship.pif
      "C:\Users\Admin\Documents\Worship\Worship.pif" C:\Users\Admin\DOCUME~1\Worship\y
      1⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Users\Admin\Documents\Worship\Worship.pif
        C:\Users\Admin\Documents\Worship\Worship.pif
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Users\Admin\Documents\iofolko5\VV_22__2DLz8ViM1jrF_R6iL.exe
          C:\Users\Admin\Documents\iofolko5\VV_22__2DLz8ViM1jrF_R6iL.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:2084
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            PID:1560
        • C:\Users\Admin\Documents\iofolko5\eruy1u628ynibrJHWsmyxp6E.exe
          C:\Users\Admin\Documents\iofolko5\eruy1u628ynibrJHWsmyxp6E.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:2340
          • C:\Users\Admin\Documents\iofolko5\eruy1u628ynibrJHWsmyxp6E.exe
            "C:\Users\Admin\Documents\iofolko5\eruy1u628ynibrJHWsmyxp6E.exe"
            4⤵
            • Drops startup file
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            PID:2448
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf HR" /sc HOURLY /rl HIGHEST
              5⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2496
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf LG" /sc ONLOGON /rl HIGHEST
              5⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:1172
        • C:\Users\Admin\Documents\iofolko5\xVgYPV_K4LUHOzKuQoDbXikQ.exe
          C:\Users\Admin\Documents\iofolko5\xVgYPV_K4LUHOzKuQoDbXikQ.exe
          3⤵
          • Executes dropped EXE
          PID:976
        • C:\Users\Admin\Documents\iofolko5\JyqIGlqdhrNdXxdhVmHXzcwY.exe
          C:\Users\Admin\Documents\iofolko5\JyqIGlqdhrNdXxdhVmHXzcwY.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:2504
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
              PID:2644
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
                PID:2396
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                4⤵
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:1540
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminEBGDHJECFC.exe"
                  5⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:2748
                  • C:\Users\AdminEBGDHJECFC.exe
                    "C:\Users\AdminEBGDHJECFC.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:2628
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • Checks processor information in registry
                      PID:2160
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & rd /s /q "C:\ProgramData\AFBKKFBAEGDH" & exit
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:2592
                        • C:\Windows\SysWOW64\timeout.exe
                          timeout /t 10
                          9⤵
                          • System Location Discovery: System Language Discovery
                          • Delays execution with timeout.exe
                          PID:584
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCAFBGHIDBG.exe"
                  5⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:2396
                  • C:\Users\AdminCAFBGHIDBG.exe
                    "C:\Users\AdminCAFBGHIDBG.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:2884
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      7⤵
                      • System Location Discovery: System Language Discovery
                      PID:2596
            • C:\Users\Admin\Documents\iofolko5\h2PXVUpO7VPPDpwHJlB_xBgz.exe
              C:\Users\Admin\Documents\iofolko5\h2PXVUpO7VPPDpwHJlB_xBgz.exe
              3⤵
              • Executes dropped EXE
              PID:2024
            • C:\Users\Admin\Documents\iofolko5\etZM4gVUuzTcVn5cNb9lQsv7.exe
              C:\Users\Admin\Documents\iofolko5\etZM4gVUuzTcVn5cNb9lQsv7.exe
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2196
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                4⤵
                  PID:2960
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  • Modifies system certificate store
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2780
              • C:\Users\Admin\Documents\iofolko5\ilV6EjsxgVOJNFHFQBfEzPHa.exe
                C:\Users\Admin\Documents\iofolko5\ilV6EjsxgVOJNFHFQBfEzPHa.exe
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1744
                • C:\Users\Admin\AppData\Local\Temp\is-LASPI.tmp\ilV6EjsxgVOJNFHFQBfEzPHa.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-LASPI.tmp\ilV6EjsxgVOJNFHFQBfEzPHa.tmp" /SL5="$50228,3518631,54272,C:\Users\Admin\Documents\iofolko5\ilV6EjsxgVOJNFHFQBfEzPHa.exe"
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:896
              • C:\Users\Admin\Documents\iofolko5\jq6xYRjzX_hXFXec5SaVIZIM.exe
                C:\Users\Admin\Documents\iofolko5\jq6xYRjzX_hXFXec5SaVIZIM.exe
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:960
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2812
              • C:\Users\Admin\Documents\iofolko5\OmTpmUm9O4I7wa71Z1lUcWVa.exe
                C:\Users\Admin\Documents\iofolko5\OmTpmUm9O4I7wa71Z1lUcWVa.exe
                3⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:1224
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                  4⤵
                  • Power Settings
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2488
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                  4⤵
                  • Power Settings
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2716
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                  4⤵
                  • Power Settings
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2756
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                  4⤵
                  • Power Settings
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2836
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe delete "VIFLJRPW"
                  4⤵
                  • Launches sc.exe
                  PID:2888
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe create "VIFLJRPW" binpath= "C:\ProgramData\xprfjygruytr\etzpikspwykg.exe" start= "auto"
                  4⤵
                  • Launches sc.exe
                  PID:1072
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop eventlog
                  4⤵
                  • Launches sc.exe
                  PID:2664
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe start "VIFLJRPW"
                  4⤵
                  • Launches sc.exe
                  PID:2840
              • C:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exe
                C:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exe
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2488
                • C:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exe
                  C:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exe
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2656
                  • C:\Windows\SysWOW64\icacls.exe
                    icacls "C:\Users\Admin\AppData\Local\2e348701-bad8-4ce5-88bd-01049c8e5222" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                    5⤵
                    • Modifies file permissions
                    • System Location Discovery: System Language Discovery
                    PID:2036
                  • C:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exe
                    "C:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exe" --Admin IsNotAutoStart IsNotTask
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:2760
                    • C:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exe
                      "C:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exe" --Admin IsNotAutoStart IsNotTask
                      6⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3048
          • C:\ProgramData\xprfjygruytr\etzpikspwykg.exe
            C:\ProgramData\xprfjygruytr\etzpikspwykg.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            PID:1076
            • C:\Windows\system32\powercfg.exe
              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
              2⤵
              • Power Settings
              • Suspicious use of AdjustPrivilegeToken
              PID:2400
            • C:\Windows\system32\powercfg.exe
              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
              2⤵
              • Power Settings
              • Suspicious use of AdjustPrivilegeToken
              PID:1576
            • C:\Windows\system32\powercfg.exe
              C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
              2⤵
              • Power Settings
              • Suspicious use of AdjustPrivilegeToken
              PID:960
            • C:\Windows\system32\powercfg.exe
              C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
              2⤵
              • Power Settings
              • Suspicious use of AdjustPrivilegeToken
              PID:2172
            • C:\Windows\system32\conhost.exe
              C:\Windows\system32\conhost.exe
              2⤵
                PID:2516
              • C:\Windows\system32\svchost.exe
                svchost.exe
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2572

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\AdminCAFBGHIDBG.exe

              Filesize

              334KB

              MD5

              24b1ff1f8ba8c5e20613a652b7ddcafb

              SHA1

              48cb72e8fb1bb1d586ccde26de74154130d2b219

              SHA256

              c45735085c630196f711708160c78f204d8fa3fd36dc7c49cfc039442ae4c9d7

              SHA512

              d277a6a0830dabc5b7d535f3d84c948a70ae3fd9a16948b55ccd69340726390f6346c91098c0a48d8f40cb76a83299fcfccf92b59675f36692b8537bbd720c8c

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

              Filesize

              1KB

              MD5

              7fb5fa1534dcf77f2125b2403b30a0ee

              SHA1

              365d96812a69ac0a4611ea4b70a3f306576cc3ea

              SHA256

              33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

              SHA512

              a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

              Filesize

              436B

              MD5

              971c514f84bba0785f80aa1c23edfd79

              SHA1

              732acea710a87530c6b08ecdf32a110d254a54c8

              SHA256

              f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

              SHA512

              43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

              Filesize

              174B

              MD5

              aaa5656ebde7fc2d9987fb2d30a3411b

              SHA1

              7ce08cb33f17e42f1ea3a1e5c36c00e29313e7a7

              SHA256

              78014e8477aa9c0973e84a7ae12098071f58492c479b117557c128667206e88c

              SHA512

              b98a6f3fabdaca1f2129be8ea6a4df83e5b5a5228e53b2b846ddf8bf42df113559db90c8a5be7b05a1cd166f309b561c83edba8d7b5ddd367518a487679b9c2e

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              66b4da8ae7cd3a69f847e5c45bea7a1b

              SHA1

              b8620a8257078e0ee6b495485edcae3861ed3e4c

              SHA256

              5ed078547bde6344eedccc14798d86c2e37c846dcadcbf206f8f22159fe04bb9

              SHA512

              3de840c81f8f873a00bc18c2735226a5713dca0ad784e0b534e1fb6c36c00bc7b3eca73d52571333d2453203d810f1bc92531c2a9c7b8298cb69d9112056587f

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              0d9dec15dfbc0665b36c7e4b3ad9568b

              SHA1

              61cb4655163305064b8291ed9a75daa7ea2fd807

              SHA256

              9c09b541860b4b24527945913a9abbeb0f4fa7ac351a1db9132d7b3ff561c4aa

              SHA512

              578b1a0c25c4cbef58cb31d9a4e99c40673433b1709fb9d8961a0db0a673e42fff591414aa083e1ff885e6db71c78bdc5afd523f6244966a6a115a672e8bc7eb

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              752ca4da5e54ec39a658b9097897635f

              SHA1

              fafc0762bdddfe862acef7c3b6de17a242813132

              SHA256

              6e27bb5f036a7e5c3499164e4f6f6e51adada013f049a469e28828bcd54c406d

              SHA512

              e5f658cb0c26b649d32a318598de2c9fa0927f9c6f32da13dafb17e42b75ee07cd3e0581694c52de5926a4cc54311aef0da58a160c17351c8c6b7a3c79c45b4e

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              f6367443401adba8d66f0370a687b594

              SHA1

              fab4f9cc7815be5a700a49285aadc70b0bf1a8a8

              SHA256

              27eb51f1e22b34c5f455d7d1fb76d656558708845a47a69c52fa606853acc282

              SHA512

              d86bc42968cc1a351317ac29638267854d06a0648269e5339665617b4c93261fcad1fe0adb39cd72e0f68ed943b5be59782f5c8264bbeba8fc9e4d9652a844e2

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

              Filesize

              170B

              MD5

              597fc57b8e02218b1471e7f63c54d12f

              SHA1

              6dcc7ad714752deafa3e11e39bc829839d713853

              SHA256

              4337d5fc263a5915da5f22b35564f6b25f9a47f740908fbbd7a256111edba5a6

              SHA512

              b1de0ab069452bf953daefad3e28a775546acb7bd769dccb19cdb47f0ebe85263fc373f0f984ede6e8718b77f36142be01d569839178f8aabe88129ae157afbd

            • C:\Users\Admin\AppData\Local\Temp\Cab4818.tmp

              Filesize

              70KB

              MD5

              49aebf8cbd62d92ac215b2923fb1b9f5

              SHA1

              1723be06719828dda65ad804298d0431f6aff976

              SHA256

              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

              SHA512

              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

            • C:\Users\Admin\AppData\Local\Temp\Tar48F5.tmp

              Filesize

              181KB

              MD5

              4ea6026cf93ec6338144661bf1202cd1

              SHA1

              a1dec9044f750ad887935a01430bf49322fbdcb7

              SHA256

              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

              SHA512

              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

            • C:\Users\Admin\AppData\Local\Temp\Tmp4A79.tmp

              Filesize

              2KB

              MD5

              1420d30f964eac2c85b2ccfe968eebce

              SHA1

              bdf9a6876578a3e38079c4f8cf5d6c79687ad750

              SHA256

              f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

              SHA512

              6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

            • C:\Users\Admin\AppData\Local\Temp\is-LASPI.tmp\ilV6EjsxgVOJNFHFQBfEzPHa.tmp

              Filesize

              680KB

              MD5

              56c6aeb0a4efc6f2312f8337fdb77d10

              SHA1

              28d9890a37b96c119fe2eeb3c5f48103e7468738

              SHA256

              7fc4e6672e1aa983e1ed885f71bc3710309b5e5d487184434945cfd2fd763dd2

              SHA512

              f2e2d3f84327717a7cfd143bc0a23fe304d59deeb250eee07b5fc861fab26af3a5fc7a5058ec9a3d0d446e661b101655e6532cf4898f8af1f15ac0d0998cad00

            • C:\Users\Admin\Documents\iofolko5\JyqIGlqdhrNdXxdhVmHXzcwY.exe

              Filesize

              206KB

              MD5

              ab68db6a238464a75b669938a3512ae1

              SHA1

              48a7e2ed179d29d783d55fe610598474825bdf95

              SHA256

              86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5

              SHA512

              b811a8f5d3d2fab469a97a9a0d59d6b132b4fecbc7048dd203d25c938e7047b487e9a85799f8d9b04c0e01f307f3ff1bd0c3af967a8813c3ab0d72c69650364c

            • C:\Users\Admin\Documents\iofolko5\OmTpmUm9O4I7wa71Z1lUcWVa.exe

              Filesize

              10.4MB

              MD5

              025ebe0a476fe1a27749e6da0eea724f

              SHA1

              fe844380280463b927b9368f9eace55eb97baab7

              SHA256

              2a51d50f42494c6ab6027dbd35f8861bdd6fe1551f5fb30bf10138619f4bc4b2

              SHA512

              5f2b40713cc4c54098da46f390bbeb0ac2fc0c0872c7fbdfdca26ab087c81ff0144b89347040cc93e35b5e5dd5dc102db28737baea616183bef4caecebfb9799

            • C:\Users\Admin\Documents\iofolko5\VV_22__2DLz8ViM1jrF_R6iL.exe

              Filesize

              313KB

              MD5

              8e0ae87939388dfd7d6470bdd397b309

              SHA1

              3af328c5c81fe77ab5d74cc97866e03490e5d080

              SHA256

              5ed77020f0296739fb5b4ef5133bbdd84a0c8f69ac71cec490343b26dd066c4d

              SHA512

              d3cfb86296b49744ac9a89b6a4a402e44a3d65c137a4a1f814c698001a2c609f0c7ce9fadd483511f6ec43811a5f81bd145dd1899be728ed3d7a9b3e0bf9a756

            • C:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exe

              Filesize

              812KB

              MD5

              7972b08246e568495d9d116fc2d0b159

              SHA1

              3e12225494f08369858453fd9fc7481b4f788165

              SHA256

              2a6c90c8db27e6ac04c7e339dfe4b3c2d47a292bcf6fc1c5b4e0ae62fc81ff84

              SHA512

              f0ead246f31d1badb3cd5fd67cb5b3081f027fdad44dd50364734d61722f1bc2cacb1ad5d842ca3f7000a2699e7bdf059a508b54a95f5e155ae274d70e833ff7

            • C:\Users\Admin\Documents\iofolko5\eruy1u628ynibrJHWsmyxp6E.exe

              Filesize

              2.9MB

              MD5

              d4ac1a0d0504ab9a127defa511df833e

              SHA1

              9254864b6917eba6d4d4616ac2564f192626668b

              SHA256

              a29c9ebecbe58f11b98fa8f685619e46bbe0a73ca7f770a71a14051aa0bd9848

              SHA512

              59b707d1c4f3c66337ec2f913de4b3506786a31108fc621bdbe7201490e91b0f7b70505763f71d53eee0eaacf477dc6ef9cd50769881654daf1b678eaaf994c5

            • C:\Users\Admin\Documents\iofolko5\etZM4gVUuzTcVn5cNb9lQsv7.exe

              Filesize

              282KB

              MD5

              9d1e5520a634731ed9747be9e9af7c5d

              SHA1

              6bc547c7e26073f71be0017e29c8702ddea2fc11

              SHA256

              90c0395f668f198d1aed010aaabbdab7c7f78b5a8c90072f4a2225683ebaac36

              SHA512

              3cc597e4b451252361707740fe58ea18ff8734a9adad48458760518d1828beb55bd0ddb080daf7c1a29cda462b7cabab3c3829fc5c811b1d3069a5d507b7cbaa

            • C:\Users\Admin\Documents\iofolko5\h2PXVUpO7VPPDpwHJlB_xBgz.exe

              Filesize

              215KB

              MD5

              f88b5bbdd03e0467d18e6f436ab2683c

              SHA1

              dd9300fc17bfd44c08e5995ebc772a6d3d32170d

              SHA256

              507c4f043a45ee6897ef1ceedbc1df125afd88c5a850a61b8a62d2d3a81a8d21

              SHA512

              c7c0cf8f07d916af26f797dce7ddc9b501265ce61d356753b37c377e8e796ee3e0798923da6013ac29c3f90ae0db1b7483eff911364b0ff0ee946a612c738590

            • C:\Users\Admin\Documents\iofolko5\ilV6EjsxgVOJNFHFQBfEzPHa.exe

              Filesize

              3.6MB

              MD5

              2dd856fd610de4ef190dc02bce097b73

              SHA1

              fceaa9f208ec87b296cb0989988d98ccee206c14

              SHA256

              9764001c0b991b432e236f3dcd4bce60c92505decc02939b8096bbcbe6f43958

              SHA512

              ddd87d9012d4a9c59307f7b88cd6d2ec787d2977f4f9ec397a93b571d5a2efe5c8837dbbe51e23385f75c8ecf868f912c214a2c600497f266ec4b382ab7070c5

            • C:\Users\Admin\Documents\iofolko5\jq6xYRjzX_hXFXec5SaVIZIM.exe

              Filesize

              516KB

              MD5

              d8ecb462d3046a0ee172551c5d505c8e

              SHA1

              54f9e16b497579964e9afc90c3c0c208f16b4418

              SHA256

              afb9edbf499a4726d798cda9f0f372b4b1019033b68d5eb87a8a83ecb7463d6f

              SHA512

              9eed44c24a71b44e90efc853b75d2103faa3f8518e1efad45c8c4733ee0396c51e8ea11ba6e7d2ac4f30234e6380c3325227cced8d1753373581eb45073c012e

            • C:\Users\Admin\Documents\iofolko5\xVgYPV_K4LUHOzKuQoDbXikQ.exe

              Filesize

              271KB

              MD5

              8cb57865f3a9a465a2b06c7cfad880d8

              SHA1

              27ec8d1902fbbf1035a60d2d58436f759e02f50f

              SHA256

              4cbe05e05abdc4e781d990fe7addeae545ee9b598ea5620a8b2f8de4a2d1e3dc

              SHA512

              6832766a41f8bbde588d9d55c250c3090646b11d5cad45fcb5c22e37a29d424e8680657064b4ebbfa250f4fef50118496451c6ce819db0ecda7f21f723df4bc8

            • \ProgramData\mozglue.dll

              Filesize

              593KB

              MD5

              c8fd9be83bc728cc04beffafc2907fe9

              SHA1

              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

              SHA256

              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

              SHA512

              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

            • \ProgramData\nss3.dll

              Filesize

              2.0MB

              MD5

              1cc453cdf74f31e4d913ff9c10acdde2

              SHA1

              6e85eae544d6e965f15fa5c39700fa7202f3aafe

              SHA256

              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

              SHA512

              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

            • \Users\Admin\AppData\Local\Temp\is-AGBF7.tmp\_isetup\_iscrypt.dll

              Filesize

              2KB

              MD5

              a69559718ab506675e907fe49deb71e9

              SHA1

              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

              SHA256

              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

              SHA512

              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

            • \Users\Admin\AppData\Local\Temp\is-AGBF7.tmp\_isetup\_isdecmp.dll

              Filesize

              13KB

              MD5

              a813d18268affd4763dde940246dc7e5

              SHA1

              c7366e1fd925c17cc6068001bd38eaef5b42852f

              SHA256

              e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

              SHA512

              b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

            • \Users\Admin\AppData\Local\Temp\is-AGBF7.tmp\_isetup\_shfoldr.dll

              Filesize

              22KB

              MD5

              92dc6ef532fbb4a5c3201469a5b5eb63

              SHA1

              3e89ff837147c16b4e41c30d6c796374e0b8e62c

              SHA256

              9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

              SHA512

              9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

            • memory/960-185-0x00000000010B0000-0x0000000001138000-memory.dmp

              Filesize

              544KB

            • memory/976-168-0x0000000000510000-0x0000000000610000-memory.dmp

              Filesize

              1024KB

            • memory/1560-222-0x0000000000400000-0x0000000000452000-memory.dmp

              Filesize

              328KB

            • memory/1560-230-0x0000000000400000-0x0000000000452000-memory.dmp

              Filesize

              328KB

            • memory/1560-231-0x0000000000400000-0x0000000000452000-memory.dmp

              Filesize

              328KB

            • memory/1560-229-0x0000000000400000-0x0000000000452000-memory.dmp

              Filesize

              328KB

            • memory/1560-220-0x0000000000400000-0x0000000000452000-memory.dmp

              Filesize

              328KB

            • memory/1560-226-0x0000000000400000-0x0000000000452000-memory.dmp

              Filesize

              328KB

            • memory/1560-224-0x0000000000400000-0x0000000000452000-memory.dmp

              Filesize

              328KB

            • memory/1744-161-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/2024-169-0x0000000000290000-0x0000000000390000-memory.dmp

              Filesize

              1024KB

            • memory/2084-181-0x0000000001160000-0x00000000011B4000-memory.dmp

              Filesize

              336KB

            • memory/2196-179-0x0000000000310000-0x000000000035A000-memory.dmp

              Filesize

              296KB

            • memory/2340-276-0x0000000000450000-0x0000000000472000-memory.dmp

              Filesize

              136KB

            • memory/2340-176-0x0000000001150000-0x0000000001442000-memory.dmp

              Filesize

              2.9MB

            • memory/2340-274-0x0000000005470000-0x000000000560E000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-246-0x0000000004F00000-0x00000000050A0000-memory.dmp

              Filesize

              1.6MB

            • memory/2488-192-0x00000000002F0000-0x0000000000381000-memory.dmp

              Filesize

              580KB

            • memory/2504-183-0x0000000001330000-0x0000000001368000-memory.dmp

              Filesize

              224KB

            • memory/2628-579-0x0000000000D10000-0x0000000000D5A000-memory.dmp

              Filesize

              296KB

            • memory/2656-209-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/2656-206-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/2656-207-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/2664-8-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-13-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-107-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-111-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-145-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-128-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-152-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-2-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-3-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-137-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-121-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-103-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-22-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-4-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-21-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-133-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-7-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-9-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-12-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-5-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-6-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-160-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-17-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-16-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-10-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-141-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-11-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-14-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2664-15-0x0000000000670000-0x000000000084F000-memory.dmp

              Filesize

              1.9MB

            • memory/2776-0-0x0000000076FA0000-0x0000000077076000-memory.dmp

              Filesize

              856KB

            • memory/2776-1-0x0000000000A50000-0x0000000000A51000-memory.dmp

              Filesize

              4KB

            • memory/2780-236-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/2780-234-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/2780-232-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/2812-216-0x0000000000400000-0x0000000000486000-memory.dmp

              Filesize

              536KB

            • memory/2812-275-0x0000000000400000-0x0000000000486000-memory.dmp

              Filesize

              536KB

            • memory/2812-219-0x0000000000400000-0x0000000000486000-memory.dmp

              Filesize

              536KB

            • memory/2812-218-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/2812-210-0x0000000000400000-0x0000000000486000-memory.dmp

              Filesize

              536KB

            • memory/2812-214-0x0000000000400000-0x0000000000486000-memory.dmp

              Filesize

              536KB

            • memory/2812-212-0x0000000000400000-0x0000000000486000-memory.dmp

              Filesize

              536KB

            • memory/2884-619-0x0000000001290000-0x00000000012E8000-memory.dmp

              Filesize

              352KB