Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 15:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe
-
Size
4.5MB
-
MD5
c55b9ba0f85c2af104dfcd7f33c0b05d
-
SHA1
21e76d8316427471f1f584af333e3fd85b84f316
-
SHA256
e296cbe87b3d67013470a265d7cc91ca844fef3f5b19227e5c37a429a0b272d7
-
SHA512
284e770f2401592cac2858822b68800e1774db43091d625840d89fb5113b02c08cf51a9d0087a53ce14350566522ba82fe15489656793253d2af010bde9ec572
-
SSDEEP
98304:1Wqq+Mb+XyWvjIy5YFWAvwzn7Nx99JEIjFMm2Va/5AZK6j0xnw:1WaCWvjIy5YPvwzn7N/rTAYAZK6jyw
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
Processes:
2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exesetup_ui.exestartup.exestartup.exesetup_ui.exe2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exepid process 2024 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe 1364 setup_ui.exe 1400 startup.exe 3964 startup.exe 4784 setup_ui.exe 1528 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe -
Loads dropped DLL 64 IoCs
Processes:
2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exesetup_ui.exestartup.exesetup_ui.exepid process 2024 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 1364 setup_ui.exe 3964 startup.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe 4784 setup_ui.exe -
Processes:
startup.exe2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA startup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exedescription ioc process File opened for modification \??\PhysicalDrive0 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
setup_ui.exestartup.exestartup.exesetup_ui.exe2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_ui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language startup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language startup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_ui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe -
Processes:
2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exestartup.exestartup.exedescription pid process target process PID 848 wrote to memory of 2024 848 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe PID 848 wrote to memory of 2024 848 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe PID 848 wrote to memory of 2024 848 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe PID 2024 wrote to memory of 1364 2024 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe setup_ui.exe PID 2024 wrote to memory of 1364 2024 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe setup_ui.exe PID 2024 wrote to memory of 1364 2024 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe setup_ui.exe PID 2024 wrote to memory of 1400 2024 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe startup.exe PID 2024 wrote to memory of 1400 2024 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe startup.exe PID 2024 wrote to memory of 1400 2024 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe startup.exe PID 1400 wrote to memory of 3964 1400 startup.exe startup.exe PID 1400 wrote to memory of 3964 1400 startup.exe startup.exe PID 1400 wrote to memory of 3964 1400 startup.exe startup.exe PID 3964 wrote to memory of 4784 3964 startup.exe setup_ui.exe PID 3964 wrote to memory of 4784 3964 startup.exe setup_ui.exe PID 3964 wrote to memory of 4784 3964 startup.exe setup_ui.exe PID 2024 wrote to memory of 1528 2024 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe PID 2024 wrote to memory of 1528 2024 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe PID 2024 wrote to memory of 1528 2024 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe 2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\temp\39625184A689FE113B916EBFC658BB38\2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe"C:\Windows\temp\39625184A689FE113B916EBFC658BB38\2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe" -initialNonSecureSetupPath="C:\Users\Admin\AppData\Local\Temp\2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\B2786384A689FE113B916EBFC658BB38\setup_ui.exe"C:\Users\Admin\AppData\Local\Temp\B2786384A689FE113B916EBFC658BB38\setup_ui.exe" -cp=objref:TUVPVwEAAAAAAAAAAAAAAMAAAAAAAABGgQIAAAAAAADxTGMjmw1+KvLtKFspXE/hAuQAAOgH//83U/e0j95e+y4AGAAHAFkAbABmAG8AZwBpAG8AZQAAAAcAMQAwAC4AMQAyADcALgAxAC4ANAA3AAAAAAAJAP//AAAeAP//AAAQAP//AAAKAP//AAAWAP//AAAfAP//AAAOAP//AAAAAA==:3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1364 -
C:\ProgramData\Kaspersky Lab Setup Files\KFA21.19.7.527.0.2.0\au_setup_4836872E-986A-11EF-B319-E6FB6C85BB83\startup.exe"C:\ProgramData\Kaspersky Lab Setup Files\KFA21.19.7.527.0.2.0\au_setup_4836872E-986A-11EF-B319-E6FB6C85BB83\startup.exe" -initialNonSecureSetupPath="C:\Users\Admin\AppData\Local\Temp\2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe" -auto_update_mode="C:\Users\Admin\AppData\Local\Temp\2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe" /-self_remove -l=ru-RU -xpos=270 -ypos=58 -prevsetupver=21.18.5.438.0.274.0 -prevsetuppatch=a3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\temp\EBA080C4A689FE113B916EBFC658BB38\startup.exe"C:\Windows\temp\EBA080C4A689FE113B916EBFC658BB38\startup.exe" -initialNonSecureSetupPath="C:\Users\Admin\AppData\Local\Temp\2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe" -auto_update_mode="C:\Users\Admin\AppData\Local\Temp\2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe" /-self_remove -l=ru-RU -xpos=270 -ypos=58 -prevsetupver=21.18.5.438.0.274.0 -prevsetuppatch=a4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\8D2903C4A689FE113B916EBFC658BB38\setup_ui.exe"C:\Users\Admin\AppData\Local\Temp\8D2903C4A689FE113B916EBFC658BB38\setup_ui.exe" -cp=objref:TUVPVwEAAAAAAAAAAAAAAMAAAAAAAABGgQIAAAAAAAAM8EYB11oxC3dn06jwoQRVAtQAAHwP///9K8ggn1O9DS4AGAAHAFkAbABmAG8AZwBpAG8AZQAAAAcAMQAwAC4AMQAyADcALgAxAC4ANAA3AAAAAAAJAP//AAAeAP//AAAQAP//AAAKAP//AAAWAP//AAAfAP//AAAOAP//AAAAAA==:5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4784 -
C:\Windows\temp\39625184A689FE113B916EBFC658BB38\2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe"C:\Windows\temp\39625184A689FE113B916EBFC658BB38\2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe" -cleanup="C:\Users\Admin\AppData\Local\Temp\B2786384A689FE113B916EBFC658BB38;2024"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD579a78149e4ef2e6e09cc061338c7b151
SHA199505d2461a18f16d4d185603887c60e226347ee
SHA256e6c0da20fc5d9eda24e4128faa5641f8b2d39951e0a0236c013e1f1efcbf83fd
SHA512a3baf55b373b943f8f1c8840cdc2f02a94aed436c54fdcb8cf6eeac9b5840a5e1a11be0c70460da0c17f6fda1b01b87f4e2a688abb5ddeb7819301a1354d688e
-
C:\ProgramData\Kaspersky Lab Setup Files\KFA21.19.7.527.0.2.0\au_setup_4836872E-986A-11EF-B319-E6FB6C85BB83\dynamic.ini
Filesize142B
MD51c34f07fde8ca3256685f18ae7e9fca6
SHA1e5fb225d061798062639587f1da770d1a78740ae
SHA256733ef6e83e0520cfd760b64f04a8a036148398efabfac794b1455745c3546324
SHA512a6aa3204776ac551fc9e444e24eed73a48c19857a1ca0af53a536a306c24a7579748ef7ae403be403d0276a91284c1ca676286981a048aed417d5fe4622d164b
-
C:\ProgramData\Kaspersky Lab Setup Files\KFA21.19.7.527.0.2.0\au_setup_4836872E-986A-11EF-B319-E6FB6C85BB83\startup.exe
Filesize4.6MB
MD5caecd14a29831ad861a7ad5f27aef854
SHA147b0b6ea8fee875352298a67629b8174d13ae50a
SHA2566d0a88c3245659c01d24ce359c84a25d07ac1683f4aa20f0b98519ccd2b87112
SHA512505d1d92a29d0c2f371f8408077ed778d01f90d5b402cc25b226eb3a5012937a870e15ef2759247dcf2ef4b79f893ae4520a12e9ce23b383c5ffb2870afbfccf
-
C:\ProgramData\Kaspersky Lab Setup Files\KFA21.19.7.527.0.2.0\au_setup_4836872E-986A-11EF-B319-E6FB6C85BB83\static.ini
Filesize582B
MD513a4da47a7085f970e4e4d4d547bb773
SHA113e14e2d90cc4601d6b58e3fadf8736f9988314b
SHA256f5605d80f311149437eea08444588a0a30e22eeb3fecb8d0e0a042d4e05dc81f
SHA512cfd48edb7d8fcac15d9e1e4c0ae0dc4690044c509adb2e4b0ce21ae155a214610a24f3e9c472a1e687f863dd2aa88a82249d00f4bb16507729dc2c7f5ab6fce1
-
Filesize
5KB
MD57b8c1f4b3e06d4f722aad3accf5c9d79
SHA12eba592016cd55f4cf621380d512d5db6783d351
SHA25654dc5cd1a9e583e9840bcb5b8a6bb8519711eefae6d811ac614e6ee67c187221
SHA512bed1cb3fcbbc978e712f66337f9e87fa179ceef55374afefecea6c6329030eedff683bf4e245cbdf1ce8df49ffb78d7269598b1382ae852f273d8332e322d077
-
Filesize
22KB
MD509c4e9f41c4b8bfdb6bf8916af730ecd
SHA1a215913aa718b459d8e3c13dfd22e5246dcff38c
SHA25657bf969d3c10d5be0a4b31b8e530c1e005622c8dc809ee4fbd4c214f3b3e9a37
SHA5127767639c5e068fd3e83a527dfce0345c902673e50102a6c5ba3998ffa2d16f0417a74bee15fce9b6825eabe94f6d36c4528cc70c4541294415b26b9f0f64937e
-
Filesize
3B
MD5ecaa88f7fa0bf610a5a26cf545dcd3aa
SHA157218c316b6921e2cd61027a2387edc31a2d9471
SHA256f1945cd6c19e56b3c1c78943ef5ec18116907a4ca1efc40a57d48ab1db7adfc5
SHA51237c783b80b1d458b89e712c2dfe2777050eff0aefc9f6d8beedee77807d9aeb2e27d14815cf4f0229b1d36c186bb5f2b5ef55e632b108cc41e9fb964c39b42a5
-
Filesize
58KB
MD5a4f71ac91c0ab594ee50fd3f3bc15e8a
SHA14f2388f6eaa44ccbe706155592dfd717b707d9a8
SHA2567c2a0014902b79648bacfb6a62aad8c3fcd8098262ddb3c08266ec4162920068
SHA5127c2a9587409d560bb4d5cecd74c7504c5178d33b504ba70043dfde01d1303c14979d9af4a12c69ece5c80346f140ec0425f88c95ad814646177f50a365f2184f
-
Filesize
96B
MD57028b8e9f1320aad444c761514fb415a
SHA1829d4b4673a7e35bb42c627a15ee1dbae1579289
SHA256146f91d96b7b2b73c06c52c47b0c030d8b64aebe1db3d9a5eba412c49a645fa1
SHA51237c55f1f8934c94afdc0161d92333259035ecab8fc873333f7b2bebf331b261d3a5c9692455b2754d1ffe5eb3ed018e61cff0e9a6964f7abef249a8df553eb8a
-
Filesize
18KB
MD5d520fefbdbc660a217609a8e970e3cf5
SHA17a70ce223b8e934b43aaf15c8df85cc0d91c8347
SHA256dcb02e3034b4f967b7865cb33e58ca9c0e6d230341a048b9a27ed1bd09ee88e9
SHA512d34ffd39c41dd13f099006f9f0df955aa2ae90c2b0a4ed9b02c88874ee1807a161fba564f0bc991e43ff70bcb9bc58edfdeb3590ed2a72fdbe1f2ad9a9b62176
-
Filesize
1KB
MD52e10b2d4181d2f07d2dd305bd4285bd5
SHA19c05f3e03bae36da24a62b08729074cd12b0077e
SHA256cbb72cdc1e461226c7d0e49e7ef955f77dfeef4f7fe12d0d8a8d0cf9658edc78
SHA512a1bae84b8a9c0833bbadf29d4532b64f0216d7c1c13be2b4ebb75dd4d2b18244eb67fee52743745ed0a5818e745cb9aae9a8bfdc415ff59ee8aa7de77f122819
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
228B
MD57779fd995969e9fa9eaf7a4726d1a11d
SHA11d9d8f9a9ca13affd712f09241c8a0ab6e5e5e0e
SHA256ab597eab4bd1bdcfc150e793b3e9c32bf9134e6ba5f6a0dac2bf8fe421c58356
SHA512919f10e01eb4f66fc4cd48b493d08843dfa8c451b1d7f651570755fa3d6734439cdc332fec6bf1b53a29242cf1ef8a64c432fb56233c04ca362c57c2a0106727
-
Filesize
10KB
MD5799d56127b9caf682da75955b17148cb
SHA13ce8f4ee0a252aa5ec3207596ede45a164e2d70f
SHA2561f9bbad0dacaab3b0ad5da494ce69cd4eb042aeecd5a33842f5f5523fc651b65
SHA512544582c7fbaebb295c447e32e56ababc33f3b05c344039cdad4d11c98f0db27d3e50caab3efd0d20c8c588789da88a7a75cf4ea1db90fdb68c1c15bc5cae7772
-
C:\Users\Admin\AppData\Local\Temp\4836872C-986A-11EF-B319-E6FB6C85BB83\mykasperskyfeatures_ru-ru.txt
Filesize8KB
MD5a38563bc8e31f082e2d8fe9124c83973
SHA101f77a024b4a128520ba62b0b13108c15a71bf45
SHA256f1ac5f177a4183463b655c7eb1afbac13c5955ceec1a512d16a89c9d77fc931e
SHA5124b5ebb658e5d1ee04310f926b37765f7b6e658f6a66687ece3b935cbe2e3ce2d60f33bc57881a70db9e669b8174881db14d28da004db4a3c06196355a07f9f3c
-
Filesize
57KB
MD5d5670bcca45460886cfb007e826f3395
SHA1d10130883a589ecc75d6a9f2ce319ad8fb08a4a7
SHA256f0955dc59e3182a135bbb9b9ee6418ba972f89a99356c288b0b83572531bdf69
SHA512c8b149f939a76411c2ce71048235a3faf7f31ad477897f303bb96ee2d2be934eda3279a5f2a6b7d102aa999e5c54bc3accbc566eaf40623bc130396172ba10a9
-
Filesize
6.0MB
MD5a2178fcac632f7360427261d5e83f826
SHA12916622209feaeb5f77672a97671a0a4f4461e54
SHA2566fc03d54f48989bbf8574b193b1fa93f41eeae50953e9cd413eb971efc27be22
SHA512ada7b5b354384d81ea81b552f5aa96514c5439deb6331943db6824b2c550d0c898b14d7004e3ac04494b6f997550aa832757171cd9b81c13aefe8236906d1764
-
Filesize
658KB
MD5f4c69d637fc45be16c80e457fb79be93
SHA1b817b8f7c34572f8ea7d99c8771a3af78cd6e878
SHA2566acaf43b9e9de12e644822e6c082d2aa4a8f0b2234573e709989c0fe0939f423
SHA512db7e30d0040aa8c6bd2d975ad5d5cfbf19085723946ad4804f9e6c4dd6608bfe1c36377ac53960397b68e199d41e82917b051494973d5e75d61d2dbda411430e
-
Filesize
73KB
MD53d791db3fb8df9cfb95cdc1c89f576cf
SHA1977725bdd90b7e20d86285c9d91c294a98f76ece
SHA2566ff013a27dab58effd6b1fcc885e49302ac99a371c640f01001e036c4f06c6e0
SHA51264cb627d2fefb9245462b5410cc7bbc111d84838f3be2fb8091cb5847faf115fe00397159db01ef6079cf6bbee0062ba71bf8a253b103f271562c61a79eb4a6e
-
Filesize
279KB
MD53c7d941e01763db131f05cd5e17909d0
SHA1a7f8afec2bae02d5e71de09691ed23a59afbb36b
SHA256a985540c3dedab11d80faa0537ffc3e91f3f778da28f7d60dff3ccbbec97de74
SHA51278ce5069df9da39b01ebea7ef7c6b582a2b266e51359d1d2561413df290f3eb2039341fc474317c116232542899d7cdd0d84e92837677770988d164f53e2b65f
-
Filesize
55KB
MD5b7e44cf662827b55d7f1aff8ad75bd01
SHA126447133da5fa2b79abb4004062d088501492a1f
SHA256a82b14a1f48329b1288e92cbe72c033c1446fb813f6a8551a86c5dc1ade7aa16
SHA512c46e8141a42dc5e0e491f1da09b5e2133fcc92f47e224309fdee1010229b262e94460ccfb63ebfe1ee7edadf10c3d1da3439e5d7e8a885f5f04f729657ba377d
-
Filesize
406KB
MD570f74920e8265226ea92aae61e555df1
SHA11ba3bec7011418d63d181c1ac452cec1f7beb3a3
SHA2566ac4ff8fd298f8f78c825eb714c801f026db14a1862eec9562952b59a2f862f8
SHA5124ca6d4f881a2dbc1f6c0194451429c389fa0b6a9bd18f5477227895fbb5a5d513c212c4adb48d956603a95216f70c52f07016be2ad92a5c5ccf4f5c44d592673
-
Filesize
213KB
MD5676bdc05672d36e2ef7de38aa83a2803
SHA11a87a7c0b8571631800c517fac92a06bd88657b9
SHA25679c7455735eb0b7e8b3cf46da78b06fb81229169d85039afab44ca74fe3f9a43
SHA512c136de38e9bf50b901ab79d51169356f6f8077c18d440ea39d6920f2335f7cd67537697b90479be4a6dc59529842121b84f2e7b9223c740e6453ae47ac3de78d
-
Filesize
285KB
MD52985b28c3485039cbee81b840b5437b4
SHA1c7020d197d094196137655da3b0196720d99d2de
SHA256586c371ecc1b17c7cac9f8d72961d9d6504b0bf855ca3501262bb0338c6654a4
SHA5129c2c82c1c1bee1a9e76868a7598998c0b927505395e700d6aac05e7c2a4f522f715534bcd8a512152b7879fc87ee11ceb07c4ef440de5519295d8ababdac6022
-
Filesize
659KB
MD58acd5d780ddd04ce22f90db393027cc6
SHA12466b7e57fb2997e50cfac797065cbe7c565e671
SHA256029317b7e585abd3561020ae0d9a941f64abf01302024270c7fa55648d0c5360
SHA512a57c323a7267a21d2f262d99edd4edc7ba8254e301c3f9c0f8b9d9fbf21914896c0e4517a3a1985976cc80dc2afca595c7369537fa11d10185be26b734179946
-
Filesize
2.9MB
MD505b722edf678407e6da411924d11bf74
SHA12df3ba610c858ea6156867f1ade8aebe3f278d28
SHA25641eb3558586ee2eacc0822b725fba7f755f54c7b0ac450dfeba5a59057192b44
SHA51216a16d35cbb0a71298ce3413d44fd790ee49d8649e0eb9587cd6f20621a3ede6987de6bdb2377180d4616c4fc2b677cff378e89aa9e8e37da3b5a7e6e5ab7484
-
Filesize
5.6MB
MD59b40fceed13f97500fee8ae3db63aea7
SHA16c7fd26bd6c630fffe88021d84d8b1f5a2497eab
SHA256b46ee0e76dc8377614e2bd59cb8cc77681611183a0483a1492dd9ed247082c5d
SHA512e208fd45a83576509854f7e91a7ab39d6a4a42f06fc39c6aa4f108451e3cfa3b0d62cdbcdc5ecfc81bc264f3f5f39266c81837392ae1c96b01876200a3e9ab25
-
Filesize
655KB
MD5a561816d0eb44f9b8d780398c5dc02e1
SHA120dcff0d9f91c214791a7041054b74ac22605db7
SHA256acdd31e3f937c1df4eb348742db6f54a98985c5642f6413fbbe3e74957d6cbb8
SHA512a9099d9e6f2177a2f3e23ef1cf7f326b2546c820de2b3abba36c05abb00fa489f9b517ee4ad6da79ac00cc6dab871e4d682c451de58c3234092c7d44ca846b78
-
Filesize
136KB
MD59ed0b05697672396a56f9d5c249b7c53
SHA1928e251256859ed146c8b566287ccbcece647878
SHA25693a87c48b86a10f6c0e59827ae90e7af45a0fc61f92df2a64ee47e4219b3873f
SHA512e0ab1c3a50d09ee5174cd1a3ff27566a0e23e5a75c7d16da6635df227e57d68e9cc3cb0f89a14148fe5a9d506e0431f2654bc678a26c928fdd093140051b974f
-
Filesize
201KB
MD59620b9b61a710c8a2178747a74d066ac
SHA11d48e8583dcff441d880b2e2d00fa2c9b6ac905f
SHA2563929ef5d1c09611bde783054cdaa6f19e07a9f22c7e9c85edf9510d13c7c423e
SHA512c88b2dccc17e04ecb9afe3133069778a88873a98133cc2989fde6ced1cbe00c434c9bc6019fdab02b0b65db65f81efc18e235dc2dc827a28cbd0f6397f3b7f68
-
Filesize
108KB
MD53249c9313d6902a72ef8f971c26f5082
SHA1726f2eb6b2a82e21eee0e5e497a028f461fc9f95
SHA256393d5ac9b4f30928496f39120ad300b7a81cd7533133adc8c935ce3d1ccacf60
SHA51222ab9eadfcfc24680f5c568024e062141d00a9f4d929ee452cafae3c5ea0d039513b8c17ea85ca2d104f1d4e60ab8b9e44a5ecb6818617d008549ae08215214a
-
Filesize
55KB
MD546f91941e61609973979d8e5bf321a31
SHA11b86653c3fdee62d587d3afdad0ffa5aad01235e
SHA25621675b87be651e4a2e7ce2af5a62d9e10a1a04dc2c58e1751b304089a7d5a070
SHA5121a251c8491061a9b01406ba4f89d356edf8417cd89e29a961007964b501ed5ce10baeeb7a388cfb661b21b4cdb09d2a8b2c1c207a85cc285a76614775e71c923
-
Filesize
996KB
MD5768fd4b2b69b57e5a3370dd19db5bd9f
SHA16fe8859921169d25cf67af7567f2a97df7da7941
SHA2564eb40c9c1019c0804c813cd0eff2c0da709724b022a4e510be5d6a89cc05bab4
SHA512e08ce0545235b1acc43798eff56570752ae2bf77adb38cb3fae8e2781f8c9cc1709d251709e2491fd8ef203676c9ab7fe91590792ae37226c6e605eb36c4a61c
-
Filesize
202KB
MD5e53fe31b6e8e76e82321b1a7333cece0
SHA1d70a43434b8c3022fe9c9b7f2f3be15c49bd8b72
SHA25697ec1da3c2bfa0d12f3f6d03ceb7316214a07e55f183c324746b1ce8f050503d
SHA512e1679116976918d520f01885498d46e0233a1750a47979cbd675ddc4b8f3047a616cfd94bb60ad15c5dd1a9f49357eefced5b012f7e2e90a5ae21515fa51e3fa
-
Filesize
69KB
MD5551b9e8050754178469ec56cd0a61c3a
SHA1e8d0ab21a7dad026f50a64d14d5226a7cc1c8574
SHA256560366743fb87ac7f1c3236f3b21856b8585b580d785b3e79349e603fd80fb14
SHA512c545860998595ff730271f94588841e99383138fd6b6ab5064708cf99ad4e88ba22e7573ed49f5533be1d588dff0cb4976de35d32237b99015019aebd4d3112c
-
Filesize
29KB
MD5c45db4accd32bd23f4c3b38a61b3a765
SHA1acb5e35c77562177b4216ed420d9627df30fee6d
SHA25683521c8ac98c03465cb3ef113d19010fcd2a4121171418f1b8b63e54b77b4ef2
SHA51262ebcec25eae790c758b696fe34bea44c09845940903f42ebb954d859cabfe82ceac02b483ca24cc1be203784880ca81749b4329768b1a49e1006192cc1d9754
-
C:\Windows\Temp\39625184A689FE113B916EBFC658BB38\2024-11-01_c55b9ba0f85c2af104dfcd7f33c0b05d_avoslocker.exe
Filesize4.5MB
MD5c55b9ba0f85c2af104dfcd7f33c0b05d
SHA121e76d8316427471f1f584af333e3fd85b84f316
SHA256e296cbe87b3d67013470a265d7cc91ca844fef3f5b19227e5c37a429a0b272d7
SHA512284e770f2401592cac2858822b68800e1774db43091d625840d89fb5113b02c08cf51a9d0087a53ce14350566522ba82fe15489656793253d2af010bde9ec572