Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2024 16:28

General

  • Target

    2024-09-16_5acb7cef68bd76c0cae3d8b06472e0b3_teslacrypt.exe

  • Size

    251KB

  • MD5

    5acb7cef68bd76c0cae3d8b06472e0b3

  • SHA1

    4e38bc3beaf8d90f11203dbd35ec6b77be1b7606

  • SHA256

    c12d55931b5e6cec59ec102c20171ffda7c2dba4c7d4242ba2bded64cef377e7

  • SHA512

    0a745230ca22c0f6eea6872610d442ca34f6999ba08f07d9308bca995c890f3e02814553fff509ed09ddc6520e5c144c65f971d49fbe5e774dda0373c1f4eb1b

  • SSDEEP

    3072:PLhtgSlZAeKoNhbKIVzq5JRpLXOOvDaUwkDYnp4U+0mQccFNfxvblzajFKTRprr:D8BRpdDaUPYnfzmQccFNfBxvXrr

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ilvnk.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/D9362BFCEDBCE6D6 2 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/D9362BFCEDBCE6D6 3 - http://yyre45dbvn2nhbefbmh.begumvelic.at/D9362BFCEDBCE6D6 If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/D9362BFCEDBCE6D6 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/D9362BFCEDBCE6D6 http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/D9362BFCEDBCE6D6 http://yyre45dbvn2nhbefbmh.begumvelic.at/D9362BFCEDBCE6D6 Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/D9362BFCEDBCE6D6
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/D9362BFCEDBCE6D6

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/D9362BFCEDBCE6D6

http://yyre45dbvn2nhbefbmh.begumvelic.at/D9362BFCEDBCE6D6

http://xlowfznrg4wf7dli.ONION/D9362BFCEDBCE6D6

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (417) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-16_5acb7cef68bd76c0cae3d8b06472e0b3_teslacrypt.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-16_5acb7cef68bd76c0cae3d8b06472e0b3_teslacrypt.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\ggcubqrcwojn.exe
      C:\Windows\ggcubqrcwojn.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:996
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2380
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:2836
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1632
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2616
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3052
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\GGCUBQ~1.EXE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1848
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2104
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2700
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ilvnk.html

    Filesize

    12KB

    MD5

    2850134d835dafafe5ce6efbbaba2b8d

    SHA1

    8e4fd147a12c24c8d902153f74cd609c359fad0b

    SHA256

    83a5475afb35e3c670c0ab26712f04f83c64a306a197b5b325d0ea4adfd71970

    SHA512

    aa52add3d691f81e964d5c71e2cb45cd830e0c4a10a98a6b2d8559540156ad8876b7252a0323cf826e69f6dfa36e717c0d0f63e9ec341377ce2d1c08a7d6b9d6

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ilvnk.png

    Filesize

    64KB

    MD5

    a86adb7c21fe4043632b03c7aa0396f7

    SHA1

    0e6085f1c043c623985dbd973197ec6c25ded075

    SHA256

    59e607d3625326c134c1b95516904f8af79f1ab7c89da9306f75918018ee5128

    SHA512

    026c6c8e7a61d3a8161715e4cc9c69ee3e80e629c3da8ab1643d086ec7e676a1ab3e15f662413c72a118470c65f548f53db0cef37f1f97590bd6c02be7fe1f08

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ilvnk.txt

    Filesize

    1KB

    MD5

    68d731d0611a87d50335c86e8de2c07b

    SHA1

    cef72754cc8ce56b29b94fc1a7accb42b369c7b2

    SHA256

    17927ad70fc9b8e02f050f85214305a2e3338d10796d4f11ab6373db98038a6f

    SHA512

    fca3ec0f373e9965d3c901e06cb901ff66b66375a967c6367d5274cf4fd946327c3a7bf66945fd12093ce326fc77837a86235d1929a4ebf66055849ee2765c73

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    d8ce488f4920f84486dee8abaf1c1f2f

    SHA1

    3ccc5ee1f45e04518b5088111c9b056b37494911

    SHA256

    d910fefca6c1a03130bf8615818ceba1990ab1a7ab6b56803e5b211ee1375cf6

    SHA512

    3590e719010384c0735cae0f6ad756f2437f02fa68e78046f3ef37df7c43f102826e1fe501129c28d93e54adb30fadef3a0719a1fc12c6d71be6ab8db09d4144

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    f0d9d0900af638af201f4e7808c226c9

    SHA1

    9a5dd34a3c667153d3b230bf38b22324c8e87e43

    SHA256

    e59e927d7ea559b82fd88e1bfb88f858f44f93a56c142e8f6a12a84e3570921b

    SHA512

    a9e19b5e1afaafd291cdef9d50145f2de8511897ba5b0f43db7a546da157f2ce39380cc99013f6c607824aaeec2e99f6c7ad01b271344bf96a1a82e7cffebf68

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    173KB

    MD5

    50273559bfa6ff0f6f9ad5ef58829667

    SHA1

    e15a3af5b7051f0d1bafbd9fc6a817aaf1a75017

    SHA256

    c81b13e9fa5e242f9cb94720e1e44a5782f15a5a56baed1b527392f6182400f9

    SHA512

    dbd71c47898b03fa86f801be3ed287b19ea0d7c97892cb5d5f001a77b8a49ed60d88c974b9041c87d26ec4ac5c32b628818301355684147b901f4b300a4c14fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4a3c779c8a1f5aad4792823e2e4b35b

    SHA1

    1258821fb0a465680d811797f6e9c5acd48ac5ff

    SHA256

    5619c7b0b7fcf4975305d7725f03894dfebeb5f987582a1d61abc732415649cc

    SHA512

    5de9b012738d65cc20e4aa95c83586083bf77ba2f75207f81c627ee0f79c7893fb06de9845945ab3d609ed2f698a172bff29e8e7fca6aae206dbfe19c81337d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    137f7729a76cb7ae6916f164a4e89010

    SHA1

    5646c6d5c076402c474279c9dd47535391801900

    SHA256

    84353fe157018bd9cd2e0f6ca652735810fa97819de425d31c08ba3b0014c02c

    SHA512

    16bd31690057ea1ee5da73fa002ddba34e80ba979ea7b1e7cad936a105a38602298a2f685b7383211fccd5bcefc4c393560c54ea91336c3bee4fc920b835d66a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a25e9b94bc6726c3dfeaf3a2ae105ca

    SHA1

    37cf24102c358537e995fc4340fa02a533d52096

    SHA256

    875f9e4c673ec4bfb769dfc5c92158b176d128407bfb8b500c5a9434b3cffc6e

    SHA512

    10ac64ff0d10ae8670ee8a2806f5102d017c638bee6b3fd038fcd7b5e6c34e573fe73451afa11872680f08a80b250b778f49c6143447fec13b6fcc8d93604a02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    55d4c0c89ff1ccfb0ae8c90827b146f0

    SHA1

    f47bf62424bf02f9dc1383d16f19c07a2bf47759

    SHA256

    bbe4cf51d08d1d53d773b7d8e30d6d8ebb200f40f0941a8ac608e3f963394414

    SHA512

    81d158be770d91fa906a514aca942d570dc958b8a5aa45f43804d040433a2ac54de9f3b4e4a4d4b04c317a856f5aad85a6239b737d6754a06049228bfe9ba371

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    067cfbbb3f4c9dc812f38fd71af540e5

    SHA1

    40c7dc24ecde9983992fa3bd14ab031a822788ba

    SHA256

    dea4877d19c4a77ddbf17ae68a1741d969264da2b56f0834fa65df65f806cda2

    SHA512

    9fcd4c644ffd9be868877240d1f319b0c93cf67017c7e2aa38e4896a564c9e9a9da8391677132df3c5c1eec5df907bca303431a69a432d7bfa16397cb097a074

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c1800dd8d07dd4fb8df7f527051786f

    SHA1

    30e7e373465198832ba236c6abc7162ca0ac7884

    SHA256

    8370bcc6350a4f83c5949451ffc485b5eb4457b7910a1bc9b0cd721e24810dac

    SHA512

    18f52bfad44aaf155bcbab7f8b67c40f682bcfd32022b8c093151f745f92d16df129b40634168b2d14ce2152e566400a7360e1a44087a4bd2cbcfaf8f3f2f19f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8a63b273a5f7733ba01640a83d124eb

    SHA1

    e7caf7ebf2be0aa5d7a108f1cf49f7a4c0ac9269

    SHA256

    7c000c266c7f3f31a90b3e6755bef0eb2e83b95741c1830d6ab6c0aecb2d292a

    SHA512

    de03556a94496f262e6ad41598c04dadfd35c4ebf507f9b5799727ffdabf8e348b74fdd9ffec9ab3ad9d164665dbe0e3a818010d49f26e5f4bd806a5db1f393b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a3df04448ab839a23f3aff81630dcfc

    SHA1

    ae0ee5049f03934e256fdb9cd7777df179c10b1a

    SHA256

    426beb5dc6dcb6c680d3ccf4e0a23cd669434bfb1f6e3cfe0d4ecbfc33828d93

    SHA512

    8089d929c93e6a74de5c4b2970d1c60dca578a753bc0a27de7145c9354dd66b0e60f66b2561b131c9c9cf867504f28c8be5541e8d72b189137f30ebff71e4036

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    337e4551a1b9468ed444c1afd5565c43

    SHA1

    3185f3d6c9a07d0cfd7225425581c012aff37c80

    SHA256

    1e5f809e11337e67699d84c2d5cb8df2635086285373c2b25f86e368b3905def

    SHA512

    113aa66b223ac0e3472d69b5bea8f1a9da30feaac6616d524545ffbafe137a723eee9c79203d8bc90c4baa2f9fc455383220d034deff30f8d31a89daeb3cd169

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69ad4616db215b9b34329f7d392978f2

    SHA1

    71e146bd1fa047d5c5b5101aab5c73fffc8f55fb

    SHA256

    e7b67f2896061f85bd596043c7a7d3ca95c96182ba6b1662762478c70c042777

    SHA512

    512f573d7f087b6ad16e5eb51818d0372087b31f2592d1df147067db04413a760e6ec524fc7b2c3c722841fdb61640841f365ff52acf3e6bfc8aa66f7585d1b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9bf4b07620aba2fc07084e39ac865227

    SHA1

    102c1ee31dfc8abb98808a8c03dd1447222307cd

    SHA256

    cf8ec5ca2cf282b3c12069414f863f5a016f861c798afdd81a69e6af37acd9ad

    SHA512

    6305ec6f4835a2372a0ca0c21e31d27a0ebf25f364e549831567a5bc5241df99eff3bde47fb73991519b3c9037193b062b9fdd4986d685e4de607f704201539b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a3c529b9e6fa6b7c34537d602a65850

    SHA1

    d5bf97bc3f7f46e4858bc1ab331f2f7472d35b89

    SHA256

    49bd27f0d21f7cdaceca141d0bcede5176f52247b64ee2567c74165823cff1e3

    SHA512

    8698e90177c3fa687844be5d955cf1ebd732428b094f9f1c69c8a25452c07b3682f7764aa893543f0efb26989cbf4d460d85c234322b28c41a88802a87e5adb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58d6016c3eefe569a9100d94f7caf757

    SHA1

    c02790f48bca0f4494b590b17c4d9da3c551708f

    SHA256

    9af196b5d5f0df68c40b48c33897c3c4f389f7146701907e5d23917c60a225ef

    SHA512

    651be19ddf0e003b37c929a2896667916201550465e5c219a0bb5e8db960b00dbaf8b27f1fbad4b1910eeb8ff53a6f8edb5c7312c4ad5d8d56defa988796df16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ef5df8c2266e9957d22a3ae6cb5b4f6

    SHA1

    5a95ad037950c28fbccb304a5f24960275c3fa8c

    SHA256

    2deca2b77c38f234187ec8522c4a188f350953459bab60f86c804cd3051e74f5

    SHA512

    7486d8049eac2a970df8e6387d808c7642716db9c16cbb06671df541c349a797e81c1e5275f021445734772ca8f50aa92a844d454b1f4914313efb5a63e7765d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1842437f2b7de6a33b30e878873dd5e6

    SHA1

    3a70af936351650b185c5585688d6420c4bad660

    SHA256

    ae2a90bb34bed6f092765e13caaa6020fde15ea6ed5e662a88f7097fc5ea452d

    SHA512

    0990f1b9da231933750cf58418ee1b23ac09233c390ee83b7e661724230b60f71fbc2527ac4d2e5cf622cb385e743728ca2c534a186f4d278074ef595d0e7f0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5713880fa7141469666205c53f8e04ef

    SHA1

    a20553c3be13f4eda7b551a02b76a05f59fec80e

    SHA256

    7815a58e4a2dba2826187d1a1505b8b0eba9a6f05210c165c1641f8e6aaf5f1f

    SHA512

    114c5e694efc565a5a7133aa5c7f6de8812f12080d4d330907f0f4b554269777c9a7aace3097b498c5812c2c86980d82840df29a32be90993d8912b26df5e5eb

  • C:\Users\Admin\AppData\Local\Temp\Cab44A1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4D2C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\ggcubqrcwojn.exe

    Filesize

    251KB

    MD5

    5acb7cef68bd76c0cae3d8b06472e0b3

    SHA1

    4e38bc3beaf8d90f11203dbd35ec6b77be1b7606

    SHA256

    c12d55931b5e6cec59ec102c20171ffda7c2dba4c7d4242ba2bded64cef377e7

    SHA512

    0a745230ca22c0f6eea6872610d442ca34f6999ba08f07d9308bca995c890f3e02814553fff509ed09ddc6520e5c144c65f971d49fbe5e774dda0373c1f4eb1b

  • memory/996-6042-0x0000000002240000-0x0000000002242000-memory.dmp

    Filesize

    8KB

  • memory/2760-6043-0x0000000000170000-0x0000000000172000-memory.dmp

    Filesize

    8KB