Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/10/2024, 03:46

241017-eb1k3sthpp 10

17/10/2024, 03:41

241017-d8zjls1alf 10

Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 03:46

General

  • Target

    5092d1d7abb882028147df297432ca49_JaffaCakes118.exe

  • Size

    381KB

  • MD5

    5092d1d7abb882028147df297432ca49

  • SHA1

    101d56d520a89ac973099959a317a790d7b75130

  • SHA256

    3fb80b937831aca246d838a129d4e094b8de7fc513fe14f311e1bbaf67cb8a99

  • SHA512

    aec9a4a561978251bc537675fad16818522c6cd6b8f6e5700f96ded4d0c2ba4bd50c5efc8ec5e2ab30fe56f5209e21f1af16f4fb7b599db8184266e474b7a898

  • SSDEEP

    6144:bU+DRYgAOEYI146+ziWRKrY7350PeR21AG+KpAy:l9YgaTl+ziTrY7pAxdpAy

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+fpbco.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/82621F60107BC0A9 2. http://tes543berda73i48fsdfsd.keratadze.at/82621F60107BC0A9 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/82621F60107BC0A9 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/82621F60107BC0A9 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/82621F60107BC0A9 http://tes543berda73i48fsdfsd.keratadze.at/82621F60107BC0A9 http://tt54rfdjhb34rfbnknaerg.milerteddy.com/82621F60107BC0A9 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/82621F60107BC0A9
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/82621F60107BC0A9

http://tes543berda73i48fsdfsd.keratadze.at/82621F60107BC0A9

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/82621F60107BC0A9

http://xlowfznrg4wf7dli.ONION/82621F60107BC0A9

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (429) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5092d1d7abb882028147df297432ca49_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5092d1d7abb882028147df297432ca49_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\ludospjsxklh.exe
      C:\Windows\ludospjsxklh.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2320
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2704
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        • Suspicious use of FindShellTrayWindow
        PID:1404
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1912 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2764
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:564
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\LUDOSP~1.EXE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1036
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\5092D1~1.EXE
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2880
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2564
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2792
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2348
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4f0
      1⤵
        PID:2176

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+fpbco.html

        Filesize

        11KB

        MD5

        a15dbd2590b8741a3be758174e026ecf

        SHA1

        c7b17cdba7b410a06d52335c1780fbe6ec4ca2a6

        SHA256

        7dd2f041a06bc0b63ba337e12a3e40e9836ff4dc2fd6959b8f30e5e4c2618ee9

        SHA512

        3d79a26d89662af098d421ddde82c11de426a026c0f41489e1bd48e28c1240593cb1645a25b9fe895fd0dfa7dd9bd837787d6ddccc51211fd756f018eff7de7d

      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+fpbco.png

        Filesize

        63KB

        MD5

        7581cdec9a44e7b90f7ae3221832e34c

        SHA1

        13a6098f9518bd2523e75b4cbe9c243e71abc122

        SHA256

        1acb4098f8c9a3af97dd873b3192fa6188d79b9dc65c257ea37d4b420037505b

        SHA512

        968bdb364590782c5885bd0506f608a19500e754d02ab0be49e2a50c9036dd7581331b90bc1ffbf47dec18e4b8c99ee962a9b75c0f6a78f5914eb080e28f2f37

      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+fpbco.txt

        Filesize

        1KB

        MD5

        e6793cc2eb519013e8a9e5e967d61466

        SHA1

        d3d2ab6a7d18c97f893bbd8e7ad35d4f8762620c

        SHA256

        b7438239a8ee0d39c4af51f04c04dc51449b7e32a50c3a5f5b96523c749a2ca7

        SHA512

        caab46c1052c25c6e3db9316fb8b6a920821d3baa1af949620b56b7dae3137dda7020a03b5048dee57570b20aad873b0c66e55b3f2bdfd4f5056963a26681417

      • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

        Filesize

        11KB

        MD5

        d641b5e1379ca337ca5f460fb8a9bccc

        SHA1

        beaca5b280b95efe8e4cca9c881bd36dbac1b5b2

        SHA256

        c5270d175c73b55d6456ce4dcef702576431e331f05709f527a4b4c5825654e0

        SHA512

        92aadfdc0b727675f8613911ac93a462943533889334b3e7ed34c1079e3105d77a7160bbc9c4c45e8a46477cc0a8a751a73d6aed8e809d1b3bcbf200610e84f5

      • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

        Filesize

        109KB

        MD5

        8c1b07975bc66edd3360094d7fd5b323

        SHA1

        3bd03ce6fbb291cbd114c2c37c123359f7e23a09

        SHA256

        7970231706981a81d6792dba3abd1d9761e8f5502a2929dc0849e4129a8c869b

        SHA512

        fd8561d311c238bcf87402ec4d1f98e6aacf6963072914852785a1d449b6567660a5db46e07dcfcedb12fc36e117be362471949c96e7d6c9dd41d117409303f3

      • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

        Filesize

        173KB

        MD5

        51a674b398aed33d944e5953a869a181

        SHA1

        8445be1b77a49b6f30dea60843750f84ca7c3bf9

        SHA256

        31d86df38b2b5066248e7135192a2af7d076cdd314224a180a7c7ee42c3825aa

        SHA512

        0734b3057fd6fcff21352207e3e048eb930fe46b29c4f25c71ace4f8394d6f0dfa1ebfb2aca28f7813e90f630591774dd2743ac3272d6bc34ab867b1959858fb

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f85de1fb505483cf3205eacfa1d2778c

        SHA1

        5e85967b263d1f7fa7f2a11075f7baf55286a02e

        SHA256

        01568b640e29834992f291b3203656547c8951e254d458cbddee8758b69db009

        SHA512

        cfc7385e7de90bb48fedc9f09c375e7af2ffc750f22d0f8249bdb669421c1aa04a36c57c4f3c816b47b96ef89e32b8b7c0f0753d3df6232abed49f4c70b60f3c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        1efa007bdeb4c608a79e2a0b8ad2b9dc

        SHA1

        528e034d28d41ca5764153d9e2694eb6bb7998ab

        SHA256

        7004e8ca1da7972b9530aef8f42e632b12ae36fa02136dea32d4c27981a829d1

        SHA512

        bb4de5826851f261819ae59ce667b7ad7716eb612e150e73a3b3f42090b90d4f3fac714ca02813fd4cc5c9a6223060d3dc00ea65e27bea7ae9e7be868f30c6b6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        a3a7229d6e764f0773689c9ec619dee0

        SHA1

        2032d421160ea86eb41e2acc28a9e3a057554c0d

        SHA256

        059f649b4bbeb063a556f05344f902afece98d0002af0f83b6eddcc78ae9b139

        SHA512

        0df38de6eb232ba4fccea5527ba27cd443846cf2a69b78f3cb64e24325d81b1f1dade0bbb037d056e3c24c02e71ed299370cee671d1136906c2bf8d14d277359

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e6047657acb398a7bd1e84620105a2c7

        SHA1

        354734e0141a230a85f10c7f83d89b8dcd6d88e0

        SHA256

        6232cf7505456222fc05349692187c8eef44a1574be50c5d5c64ea0477ff166a

        SHA512

        4ed01530b898bd6b8176fcd8dcc096ffcc2628bb0a10f982113a55b1fde40a63a3587a4e2a80932dffabd56c6bb23e68c905a8b94d8bdf57592bee96df0e92b9

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        651d4dc864a489ed88e9b6973642abec

        SHA1

        fe8e111a56ffbeddb790d6100a6d1dffc5956c7c

        SHA256

        4d19ffbd5b4a8d04fa5fec672d739081bb5d24231aabf87ff3bb683518bb7317

        SHA512

        0f8f5f2ce143b0b60ffd4b2f7b4988073cfb9d34abef460526ca9d96daa47b14ec764ca8fdaa43a8a68a1c5c1bda4324ed121e532f24f58cc02c433a6b61e647

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        7e3dfcd1c042289db774239c3604a8bf

        SHA1

        3e68be05ebe66bb7f00802cb3a736c171cb678cb

        SHA256

        6d3fa93f6072e18c862184c2089ff3f74edf77ffef9b70153bebe29d369b7f80

        SHA512

        58165a49b9338e055d19fbf877c8783f8860b802f51e1d927f92d1ce5f735a64b755832748db7cc8d6f8bfb059073f24a909f8999aa7645a89cd4ce9c3d64be4

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        4501440ad5f4617b78dac517401e04ad

        SHA1

        20ca72b0dbe37cf0eb5f60043db4117ec3480417

        SHA256

        5f06fbc9259ee82683ba3099f344c91f6a21bdd7bf93355c008d673a0cac3d17

        SHA512

        bbe4bdbaa703d9ac0e16325563823ef04cc54c717f3751ea89a288b1352f299947a85dbd3de60926bc8811f372b9713b99dda8c55cf177f26d430a2f43a1782c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        91598879451d0b43e60f04b32307a6a5

        SHA1

        278e8cfb68e76f9c3244bda32152c2236d5062ae

        SHA256

        ac83a9b46b291cd4fcb77c17a40e07b75abd43900c26658acaa9b3943a35e5d6

        SHA512

        7504258adb61203665a8dc990c5d7e12b5305342de1b94bfe1c727ca44709de71131ff9412b161fe79c26dfe3b69e6ae3a5dabe845ff0af22bc511e63631556f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        685c82d8e2093dad2994b8412deccf60

        SHA1

        1e03a7c803c53c7082aba714f207abab01fd8190

        SHA256

        5dac1d6f552870230a04a56963654721289a3c0040f83538d56053b4a725b7b6

        SHA512

        f67ff0a0947625379dd94832d2729260e3d2de3c5d89d126188457bee6b7f7cc83765e6a6cf1c694bfd4977084583ce5e7a6fd4bde81a0a19626be5d62f6d2cd

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f9ad621d99d11d5f4bcd8b5133953ad6

        SHA1

        573d9dd9bc44aabc26573004f5666d57c8079536

        SHA256

        cedffb0cb7443e4b29f7cc42e1f4f6e3867f0000f96ee9fc793570673a6f726b

        SHA512

        09e011a67a518951af1bbc433ee44019b255982b1c30ec620f61ea8036d8ed0881caba3e927fca1d02aa087ad49ccead851cc3bea1f0f1f1a89e1e761aaf038d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        28a747e7146f73df035a1498bfca8f4d

        SHA1

        cd1eb1f913fed8b02df54744a71b3d8eb6f02785

        SHA256

        3f2e8370f20c0b6847294b4af70dc8144d263f1c757aaf8bd3ae2d0e641ae22c

        SHA512

        f0a2a1b7a1f01ac9fcd80c061e518576111084caac4079f6d2deb3e4fbd9ed5821121e02e4ca7890cee27769ddb1f74a5d12a16d8917848883a2785ce3e0da4e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        cb6da80ccb89405702ff8494bded75a7

        SHA1

        cfea098d93ee4bab865460446c5cf4150c4c0990

        SHA256

        6b6823b3949dcbe89e3de8e366465c182e2fc8671e5a33c05652a8854e19c41d

        SHA512

        bb394bd666a9b78fc3ab6a17cddaceb75fcecd5e127e72023cb90b29d072fd8d3c3e0725c6e688c94f398fb201b84128c2d453014860eaa7240efec0de072e31

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        aa24377bbeb253f3110d76dfc0a5debc

        SHA1

        546b09f2ff83a97401e600434eaa2693bcd5d021

        SHA256

        e736b3d287ad342513e61c1ee09ccf23342f45f0a8d6023305435c8510cbc99b

        SHA512

        aaa902cc03df2ee74c00758e70db64582385ce1ca2577adc88dac6900bca37d955a2f7031c2728b31f38361a766a37ae526c93f26d397bc811c3503510b3d7ba

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        12acc94f40a7f8b454abf5d134a5282b

        SHA1

        200567041fd54934ecfee46d8320daf7e6ef2acf

        SHA256

        d5c8694f74a496600711075bd0d817f1cce559944a3a261de11a497666f99488

        SHA512

        36a57ed6af28d8c12b08e2654af2a54c066295fe09ecb687a4fe959b5336efe883d26c213ea611f53fd6cc7b7ce8a9c27267cdba0a8badc4d693cb986164e62b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        70fa0f93360808502281fe3d6aa4cd32

        SHA1

        96c565a2f21045c05579fc341a065bd072d8a37d

        SHA256

        008f249f801c6f7805e851e9334246b0bf15243cb7ae65e81382469669d07b49

        SHA512

        cbb122c811ec4c2761788437dfb4b431b8a3c98e7ed6e36ee35cfbee1f4d54d5242612eab6e81c8904bca759acb7552d9ef0074edb2da732bce888f0d388e1c9

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        0957e2c5875a44230889f1ffd77d79a2

        SHA1

        0f263927b3ef3ef3430765dedb67c858c674b0d2

        SHA256

        ad5710792f62ccb91d57e76f1dceeec038f4ca24ba9955438aaadf08384b3bcf

        SHA512

        4eb5465e349fde623c34bace6f9fb784ef9609fd029eb577539901fae83392f65c07a21001e96d4ae7d0b557f50f5561f46531637c66f9c3bb8d78b402b6e7a3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        08aa56e0704faf5649893cbc76a644b1

        SHA1

        7ee529abe57f9253da0fe08ec75f49ae60c37ce7

        SHA256

        70105183b97bc3716bb8a168e7ba63eda9deb1b338534292b61abab15ead4a1c

        SHA512

        76cc8ecfe3184cd0937f9f4833ba2ff68a9d9064b4ae7dadb07173d99bbd355d5dcb2d52b71725b7541863c577f8496141a73b2a2bde47eff2c739e206ad5d70

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        a30d704783748933ea0e971954d4d171

        SHA1

        20986a62ec6fcf562a972cba0ae40d77f6ef9f41

        SHA256

        9f6390bdf724603470bec1e88081a5afe14ccca365fef426ae440fabd94668d5

        SHA512

        ee3091a992010512efd93a79324515654b90583db4444e68681e5e1fc051234a0dd56d883e24b6147e08e78d853d2d38873542e58e33b11a30f6a3f6ccacc47f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        37477b8f175320d1a1b4bcd25722f5e7

        SHA1

        bfef920bc9026c5af4dd9b10fe1e5c0f8f82cf80

        SHA256

        a9e655f045cc752d3fe7b70ba30e0333bfa5b95c2eec4b78f2f9461821962f18

        SHA512

        73310b70a49fb650f80746c56208750a47df8f34f7a2a8ed42c445ba29bf27ea1f74d9ba3821661602700eb52f7a05043cfec6dffc501f4b193dbe612a6c0ac4

      • C:\Users\Admin\AppData\Local\Temp\Cab6645.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\Tar66F3.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Windows\ludospjsxklh.exe

        Filesize

        381KB

        MD5

        5092d1d7abb882028147df297432ca49

        SHA1

        101d56d520a89ac973099959a317a790d7b75130

        SHA256

        3fb80b937831aca246d838a129d4e094b8de7fc513fe14f311e1bbaf67cb8a99

        SHA512

        aec9a4a561978251bc537675fad16818522c6cd6b8f6e5700f96ded4d0c2ba4bd50c5efc8ec5e2ab30fe56f5209e21f1af16f4fb7b599db8184266e474b7a898

      • memory/2192-1-0x00000000002C0000-0x00000000002C1000-memory.dmp

        Filesize

        4KB

      • memory/2192-2-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/2192-9-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/2192-0-0x00000000023E0000-0x000000000240E000-memory.dmp

        Filesize

        184KB

      • memory/2192-8-0x0000000000400000-0x00000000004B5000-memory.dmp

        Filesize

        724KB

      • memory/2320-840-0x0000000000400000-0x00000000004B5000-memory.dmp

        Filesize

        724KB

      • memory/2320-6089-0x0000000000400000-0x00000000004B5000-memory.dmp

        Filesize

        724KB

      • memory/2320-6087-0x0000000000400000-0x00000000004B5000-memory.dmp

        Filesize

        724KB

      • memory/2320-6084-0x0000000002F80000-0x0000000002F82000-memory.dmp

        Filesize

        8KB

      • memory/2320-4318-0x0000000000400000-0x00000000004B5000-memory.dmp

        Filesize

        724KB

      • memory/2320-1311-0x0000000000400000-0x00000000004B5000-memory.dmp

        Filesize

        724KB

      • memory/2320-1310-0x0000000000400000-0x00000000004B5000-memory.dmp

        Filesize

        724KB

      • memory/2320-1051-0x0000000000400000-0x00000000004B5000-memory.dmp

        Filesize

        724KB

      • memory/2320-11-0x0000000000400000-0x00000000004B5000-memory.dmp

        Filesize

        724KB

      • memory/2320-10-0x0000000000400000-0x00000000004B5000-memory.dmp

        Filesize

        724KB

      • memory/2792-6085-0x00000000001A0000-0x00000000001A2000-memory.dmp

        Filesize

        8KB