Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16/09/2024, 16:28

General

  • Target

    2024-09-16_5acb7cef68bd76c0cae3d8b06472e0b3_teslacrypt.exe

  • Size

    251KB

  • MD5

    5acb7cef68bd76c0cae3d8b06472e0b3

  • SHA1

    4e38bc3beaf8d90f11203dbd35ec6b77be1b7606

  • SHA256

    c12d55931b5e6cec59ec102c20171ffda7c2dba4c7d4242ba2bded64cef377e7

  • SHA512

    0a745230ca22c0f6eea6872610d442ca34f6999ba08f07d9308bca995c890f3e02814553fff509ed09ddc6520e5c144c65f971d49fbe5e774dda0373c1f4eb1b

  • SSDEEP

    3072:PLhtgSlZAeKoNhbKIVzq5JRpLXOOvDaUwkDYnp4U+0mQccFNfxvblzajFKTRprr:D8BRpdDaUPYnfzmQccFNfBxvXrr

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ilvnk.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/D9362BFCEDBCE6D6 2 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/D9362BFCEDBCE6D6 3 - http://yyre45dbvn2nhbefbmh.begumvelic.at/D9362BFCEDBCE6D6 If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/D9362BFCEDBCE6D6 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/D9362BFCEDBCE6D6 http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/D9362BFCEDBCE6D6 http://yyre45dbvn2nhbefbmh.begumvelic.at/D9362BFCEDBCE6D6 Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/D9362BFCEDBCE6D6
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/D9362BFCEDBCE6D6

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/D9362BFCEDBCE6D6

http://yyre45dbvn2nhbefbmh.begumvelic.at/D9362BFCEDBCE6D6

http://xlowfznrg4wf7dli.ONION/D9362BFCEDBCE6D6

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (417) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-16_5acb7cef68bd76c0cae3d8b06472e0b3_teslacrypt.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-16_5acb7cef68bd76c0cae3d8b06472e0b3_teslacrypt.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\ggcubqrcwojn.exe
      C:\Windows\ggcubqrcwojn.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:996
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2380
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:2836
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1632
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2616
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3052
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\GGCUBQ~1.EXE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1848
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2104
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2700
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    PID:2760

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ilvnk.html

          Filesize

          12KB

          MD5

          2850134d835dafafe5ce6efbbaba2b8d

          SHA1

          8e4fd147a12c24c8d902153f74cd609c359fad0b

          SHA256

          83a5475afb35e3c670c0ab26712f04f83c64a306a197b5b325d0ea4adfd71970

          SHA512

          aa52add3d691f81e964d5c71e2cb45cd830e0c4a10a98a6b2d8559540156ad8876b7252a0323cf826e69f6dfa36e717c0d0f63e9ec341377ce2d1c08a7d6b9d6

        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ilvnk.png

          Filesize

          64KB

          MD5

          a86adb7c21fe4043632b03c7aa0396f7

          SHA1

          0e6085f1c043c623985dbd973197ec6c25ded075

          SHA256

          59e607d3625326c134c1b95516904f8af79f1ab7c89da9306f75918018ee5128

          SHA512

          026c6c8e7a61d3a8161715e4cc9c69ee3e80e629c3da8ab1643d086ec7e676a1ab3e15f662413c72a118470c65f548f53db0cef37f1f97590bd6c02be7fe1f08

        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ilvnk.txt

          Filesize

          1KB

          MD5

          68d731d0611a87d50335c86e8de2c07b

          SHA1

          cef72754cc8ce56b29b94fc1a7accb42b369c7b2

          SHA256

          17927ad70fc9b8e02f050f85214305a2e3338d10796d4f11ab6373db98038a6f

          SHA512

          fca3ec0f373e9965d3c901e06cb901ff66b66375a967c6367d5274cf4fd946327c3a7bf66945fd12093ce326fc77837a86235d1929a4ebf66055849ee2765c73

        • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

          Filesize

          11KB

          MD5

          d8ce488f4920f84486dee8abaf1c1f2f

          SHA1

          3ccc5ee1f45e04518b5088111c9b056b37494911

          SHA256

          d910fefca6c1a03130bf8615818ceba1990ab1a7ab6b56803e5b211ee1375cf6

          SHA512

          3590e719010384c0735cae0f6ad756f2437f02fa68e78046f3ef37df7c43f102826e1fe501129c28d93e54adb30fadef3a0719a1fc12c6d71be6ab8db09d4144

        • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

          Filesize

          109KB

          MD5

          f0d9d0900af638af201f4e7808c226c9

          SHA1

          9a5dd34a3c667153d3b230bf38b22324c8e87e43

          SHA256

          e59e927d7ea559b82fd88e1bfb88f858f44f93a56c142e8f6a12a84e3570921b

          SHA512

          a9e19b5e1afaafd291cdef9d50145f2de8511897ba5b0f43db7a546da157f2ce39380cc99013f6c607824aaeec2e99f6c7ad01b271344bf96a1a82e7cffebf68

        • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

          Filesize

          173KB

          MD5

          50273559bfa6ff0f6f9ad5ef58829667

          SHA1

          e15a3af5b7051f0d1bafbd9fc6a817aaf1a75017

          SHA256

          c81b13e9fa5e242f9cb94720e1e44a5782f15a5a56baed1b527392f6182400f9

          SHA512

          dbd71c47898b03fa86f801be3ed287b19ea0d7c97892cb5d5f001a77b8a49ed60d88c974b9041c87d26ec4ac5c32b628818301355684147b901f4b300a4c14fb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e4a3c779c8a1f5aad4792823e2e4b35b

          SHA1

          1258821fb0a465680d811797f6e9c5acd48ac5ff

          SHA256

          5619c7b0b7fcf4975305d7725f03894dfebeb5f987582a1d61abc732415649cc

          SHA512

          5de9b012738d65cc20e4aa95c83586083bf77ba2f75207f81c627ee0f79c7893fb06de9845945ab3d609ed2f698a172bff29e8e7fca6aae206dbfe19c81337d7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          137f7729a76cb7ae6916f164a4e89010

          SHA1

          5646c6d5c076402c474279c9dd47535391801900

          SHA256

          84353fe157018bd9cd2e0f6ca652735810fa97819de425d31c08ba3b0014c02c

          SHA512

          16bd31690057ea1ee5da73fa002ddba34e80ba979ea7b1e7cad936a105a38602298a2f685b7383211fccd5bcefc4c393560c54ea91336c3bee4fc920b835d66a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7a25e9b94bc6726c3dfeaf3a2ae105ca

          SHA1

          37cf24102c358537e995fc4340fa02a533d52096

          SHA256

          875f9e4c673ec4bfb769dfc5c92158b176d128407bfb8b500c5a9434b3cffc6e

          SHA512

          10ac64ff0d10ae8670ee8a2806f5102d017c638bee6b3fd038fcd7b5e6c34e573fe73451afa11872680f08a80b250b778f49c6143447fec13b6fcc8d93604a02

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          55d4c0c89ff1ccfb0ae8c90827b146f0

          SHA1

          f47bf62424bf02f9dc1383d16f19c07a2bf47759

          SHA256

          bbe4cf51d08d1d53d773b7d8e30d6d8ebb200f40f0941a8ac608e3f963394414

          SHA512

          81d158be770d91fa906a514aca942d570dc958b8a5aa45f43804d040433a2ac54de9f3b4e4a4d4b04c317a856f5aad85a6239b737d6754a06049228bfe9ba371

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          067cfbbb3f4c9dc812f38fd71af540e5

          SHA1

          40c7dc24ecde9983992fa3bd14ab031a822788ba

          SHA256

          dea4877d19c4a77ddbf17ae68a1741d969264da2b56f0834fa65df65f806cda2

          SHA512

          9fcd4c644ffd9be868877240d1f319b0c93cf67017c7e2aa38e4896a564c9e9a9da8391677132df3c5c1eec5df907bca303431a69a432d7bfa16397cb097a074

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1c1800dd8d07dd4fb8df7f527051786f

          SHA1

          30e7e373465198832ba236c6abc7162ca0ac7884

          SHA256

          8370bcc6350a4f83c5949451ffc485b5eb4457b7910a1bc9b0cd721e24810dac

          SHA512

          18f52bfad44aaf155bcbab7f8b67c40f682bcfd32022b8c093151f745f92d16df129b40634168b2d14ce2152e566400a7360e1a44087a4bd2cbcfaf8f3f2f19f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d8a63b273a5f7733ba01640a83d124eb

          SHA1

          e7caf7ebf2be0aa5d7a108f1cf49f7a4c0ac9269

          SHA256

          7c000c266c7f3f31a90b3e6755bef0eb2e83b95741c1830d6ab6c0aecb2d292a

          SHA512

          de03556a94496f262e6ad41598c04dadfd35c4ebf507f9b5799727ffdabf8e348b74fdd9ffec9ab3ad9d164665dbe0e3a818010d49f26e5f4bd806a5db1f393b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3a3df04448ab839a23f3aff81630dcfc

          SHA1

          ae0ee5049f03934e256fdb9cd7777df179c10b1a

          SHA256

          426beb5dc6dcb6c680d3ccf4e0a23cd669434bfb1f6e3cfe0d4ecbfc33828d93

          SHA512

          8089d929c93e6a74de5c4b2970d1c60dca578a753bc0a27de7145c9354dd66b0e60f66b2561b131c9c9cf867504f28c8be5541e8d72b189137f30ebff71e4036

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          337e4551a1b9468ed444c1afd5565c43

          SHA1

          3185f3d6c9a07d0cfd7225425581c012aff37c80

          SHA256

          1e5f809e11337e67699d84c2d5cb8df2635086285373c2b25f86e368b3905def

          SHA512

          113aa66b223ac0e3472d69b5bea8f1a9da30feaac6616d524545ffbafe137a723eee9c79203d8bc90c4baa2f9fc455383220d034deff30f8d31a89daeb3cd169

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          69ad4616db215b9b34329f7d392978f2

          SHA1

          71e146bd1fa047d5c5b5101aab5c73fffc8f55fb

          SHA256

          e7b67f2896061f85bd596043c7a7d3ca95c96182ba6b1662762478c70c042777

          SHA512

          512f573d7f087b6ad16e5eb51818d0372087b31f2592d1df147067db04413a760e6ec524fc7b2c3c722841fdb61640841f365ff52acf3e6bfc8aa66f7585d1b5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9bf4b07620aba2fc07084e39ac865227

          SHA1

          102c1ee31dfc8abb98808a8c03dd1447222307cd

          SHA256

          cf8ec5ca2cf282b3c12069414f863f5a016f861c798afdd81a69e6af37acd9ad

          SHA512

          6305ec6f4835a2372a0ca0c21e31d27a0ebf25f364e549831567a5bc5241df99eff3bde47fb73991519b3c9037193b062b9fdd4986d685e4de607f704201539b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2a3c529b9e6fa6b7c34537d602a65850

          SHA1

          d5bf97bc3f7f46e4858bc1ab331f2f7472d35b89

          SHA256

          49bd27f0d21f7cdaceca141d0bcede5176f52247b64ee2567c74165823cff1e3

          SHA512

          8698e90177c3fa687844be5d955cf1ebd732428b094f9f1c69c8a25452c07b3682f7764aa893543f0efb26989cbf4d460d85c234322b28c41a88802a87e5adb7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          58d6016c3eefe569a9100d94f7caf757

          SHA1

          c02790f48bca0f4494b590b17c4d9da3c551708f

          SHA256

          9af196b5d5f0df68c40b48c33897c3c4f389f7146701907e5d23917c60a225ef

          SHA512

          651be19ddf0e003b37c929a2896667916201550465e5c219a0bb5e8db960b00dbaf8b27f1fbad4b1910eeb8ff53a6f8edb5c7312c4ad5d8d56defa988796df16

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4ef5df8c2266e9957d22a3ae6cb5b4f6

          SHA1

          5a95ad037950c28fbccb304a5f24960275c3fa8c

          SHA256

          2deca2b77c38f234187ec8522c4a188f350953459bab60f86c804cd3051e74f5

          SHA512

          7486d8049eac2a970df8e6387d808c7642716db9c16cbb06671df541c349a797e81c1e5275f021445734772ca8f50aa92a844d454b1f4914313efb5a63e7765d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1842437f2b7de6a33b30e878873dd5e6

          SHA1

          3a70af936351650b185c5585688d6420c4bad660

          SHA256

          ae2a90bb34bed6f092765e13caaa6020fde15ea6ed5e662a88f7097fc5ea452d

          SHA512

          0990f1b9da231933750cf58418ee1b23ac09233c390ee83b7e661724230b60f71fbc2527ac4d2e5cf622cb385e743728ca2c534a186f4d278074ef595d0e7f0b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5713880fa7141469666205c53f8e04ef

          SHA1

          a20553c3be13f4eda7b551a02b76a05f59fec80e

          SHA256

          7815a58e4a2dba2826187d1a1505b8b0eba9a6f05210c165c1641f8e6aaf5f1f

          SHA512

          114c5e694efc565a5a7133aa5c7f6de8812f12080d4d330907f0f4b554269777c9a7aace3097b498c5812c2c86980d82840df29a32be90993d8912b26df5e5eb

        • C:\Users\Admin\AppData\Local\Temp\Cab44A1.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar4D2C.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Windows\ggcubqrcwojn.exe

          Filesize

          251KB

          MD5

          5acb7cef68bd76c0cae3d8b06472e0b3

          SHA1

          4e38bc3beaf8d90f11203dbd35ec6b77be1b7606

          SHA256

          c12d55931b5e6cec59ec102c20171ffda7c2dba4c7d4242ba2bded64cef377e7

          SHA512

          0a745230ca22c0f6eea6872610d442ca34f6999ba08f07d9308bca995c890f3e02814553fff509ed09ddc6520e5c144c65f971d49fbe5e774dda0373c1f4eb1b

        • memory/996-6042-0x0000000002240000-0x0000000002242000-memory.dmp

          Filesize

          8KB

        • memory/2760-6043-0x0000000000170000-0x0000000000172000-memory.dmp

          Filesize

          8KB