Analysis

  • max time kernel
    118s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 23:53

General

  • Target

    9ea29e24749452c4b1441c6d78c06e97_JaffaCakes118.exe

  • Size

    355KB

  • MD5

    9ea29e24749452c4b1441c6d78c06e97

  • SHA1

    29a7b7e56a1f0631d074d0c42d865080264dfe39

  • SHA256

    71d73684c8b2f3ee1e5796b141b917d98db8cb4b6d2e39eaeb74361a01605016

  • SHA512

    ec459cabcd49d8d31931cbbc56c0bd59244579d862100833cfb1a7c39a42bc5cc82f3ad895e03357f2fb688d970dab23c00f54563437e2a52fcb2e6c1e1257fe

  • SSDEEP

    6144:Owfkl5RcNIoyF1Y8OjIIrT9lI73GUL9miFigaH+3skE+I/sjWNDiya0ZcHVF3sII:Owfkl8WoyU8dIjML6X+8kE6W9a0ZQVJ+

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+vhy.txt

Ransom Note
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of your files is only possible with the help of the private key and decrypt program, which is on our secret server. What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BTC NOW, and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://k5fxm4dl35qk323d.justmakeapayment.com/9FA6FF49921F92CD 2. http://phfnchd6d3frwe84.brsoftpayment.com/9FA6FF49921F92CD 3. http://tsbfdsv.extr6mchf.com/9FA6FF49921F92CD 4. https://o7zeip6us33igmgw.onion.to/9FA6FF49921F92CD 5. https://o7zeip6us33igmgw.tor2web.org/9FA6FF49921F92CD 6. https://o7zeip6us33igmgw.onion.cab/9FA6FF49921F92CD If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization. 3. Type in the address bar: o7zeip6us33igmgw.onion/9FA6FF49921F92CD 4. Follow the instructions on the site. IMPORTANT INFORMATION: Your personal pages: http://k5fxm4dl35qk323d.justmakeapayment.com/9FA6FF49921F92CD http://phfnchd6d3frwe84.brsoftpayment.com/9FA6FF49921F92CD http://tsbfdsv.extr6mchf.com/9FA6FF49921F92CD https://o7zeip6us33igmgw.onion.to/9FA6FF49921F92CD Your personal page (using TOR-Browser): o7zeip6us33igmgw.onion/9FA6FF49921F92CD Your personal identification number (if you open the site (or TOR-Browser's) directly): 9FA6FF49921F92CD !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
URLs

http://k5fxm4dl35qk323d.justmakeapayment.com/9FA6FF49921F92CD

http://phfnchd6d3frwe84.brsoftpayment.com/9FA6FF49921F92CD

http://tsbfdsv.extr6mchf.com/9FA6FF49921F92CD

https://o7zeip6us33igmgw.onion.to/9FA6FF49921F92CD

https://o7zeip6us33igmgw.tor2web.org/9FA6FF49921F92CD

https://o7zeip6us33igmgw.onion.cab/9FA6FF49921F92CD

http://o7zeip6us33igmgw.onion/9FA6FF49921F92CD

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 5 IoCs
  • Renames multiple (414) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ea29e24749452c4b1441c6d78c06e97_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9ea29e24749452c4b1441c6d78c06e97_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Users\Admin\AppData\Roaming\dqrsjacroic.exe
      C:\Users\Admin\AppData\Roaming\dqrsjacroic.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:804
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe /set {current} bootems off
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:2760
      • C:\Windows\System32\vssadmin.exe
        "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2912
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe /set {current} advancedoptions off
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:2768
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe /set {current} optionsedit off
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:2684
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe /set {current} bootstatuspolicy IgnoreAllFailures
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:2376
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe /set {current} recoveryenabled off
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1880
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Howto_Restore_FILES.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:2352
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\Howto_Restore_FILES.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2936
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1844
      • C:\Windows\System32\vssadmin.exe
        "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
        3⤵
        • Interacts with shadow copies
        PID:208
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Roaming\DQRSJA~1.EXE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2672
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\9EA29E~1.EXE
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2308
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2736
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+vhy.html

    Filesize

    10KB

    MD5

    00505d44a18a584fbd8751f32ba6cbd4

    SHA1

    b803c7e88aba05a23ffa7159fdce9d65660ea5e2

    SHA256

    14830a7d61a1d29ba26af890df88332e74411d538f7500caababd05a85744b4f

    SHA512

    0dcc097e38b995f28c404b611cd13abbcad9f99a0e666303d79e7f35fbff55e2fefaa68998cbc507c2b523625fe1bb5c93a61cf4507db324951a6a157e3314ea

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+vhy.txt

    Filesize

    2KB

    MD5

    a6f9368fee0279fd196b757515e759ee

    SHA1

    c7be82897d7b76bf58856808adb197c611b2a826

    SHA256

    ac8f7f50244b6729815ffc19d937f6e7e6eeed7a9115b939b8da52f8ab61d120

    SHA512

    c60ffc389790188fc4e4bf31fcb2b6540a3de4d56e911b5712fb469db695a10afe3e0ce4c692e2ede9f2da23ccf868b4ea5ef162a34e7d90d7f9b3e92d0e3784

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    094840b56c357cf8279fe6e20844c0e0

    SHA1

    b49f8e7131a5f30b32236b7df81db6ebc966a85f

    SHA256

    7e231ded1bcd1529056d3e6b91c9d8f557174b4ce5f98b876d71000477a23e47

    SHA512

    e787a6c822ec112097a6a6c84bac58b9d55c7c742ac65589a7fabb4bce2563adcd4ff26c1141a0dc9def2a52d4c349c45e02eea246f5f3b59b62cb9de95d3d9f

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    5106332751193fd432807b2a0fcce9c0

    SHA1

    71e6ed30c913c6712b108d87edc493bcc3bf07fb

    SHA256

    036f66c3b8db490a0dca10c71b308bb63d177704a03818d756d37bef88232bfb

    SHA512

    121f223a28bcc707144e36e049cd41b827460f3fa30640558535f7823b0e49bfff4a6dbd205a326ceffce1b00b843cf68dbbcfe4267957fa2c824cdae9ac5983

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    173KB

    MD5

    21e630949619ac666a73dab20b16f6f7

    SHA1

    532a2a705b675b41e034ecc0b231cd186e9c851e

    SHA256

    5cc1a26892153f84ce2e91063c66e755ee1514080f828e6d5a554c50a5c21a76

    SHA512

    a61ae7c9f7f1fbb4a07ca8f63e22fc036d1ff9d56072d9d688c452c367d11510eb32b45112caf4f06b24718b98958758e53c1f0f247ee8856270c0d878cb8c50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d781ad69f45e1924aa4cdbea01b9dbb0

    SHA1

    f2c21b4048d6bb019e4158aa2ca0d1af731e3717

    SHA256

    b074ab777ef00642e0615802563e91d30cea8f9366c5a30e472088b932e36b3b

    SHA512

    7baa5e42f1bf76575e862e6892a94b13c6cd06b7711fa6beb16812a49c707d56105f2b47bf7a6a34810cab7faed441756fa7d5c1000b7344a73079caf5d461ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a2d1addcec0b515d6f9b3832d17407a

    SHA1

    c61928b47ec6118ebdb957b927504f2e3c9380d5

    SHA256

    b164f0c4a67b6d5fa221da7e73fad5b66bdad5ea1b55af68621bfd01709167c5

    SHA512

    3857190a48274599d8a06c9441a51092e29d4e53723b666eb7aac7e163b688b9015bf97625da4776b2c4b0b9a04e6d29cad33d48d95e79df02ad672a6a95bc93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a3e31da6e4430debc0d0207e8554036

    SHA1

    72d242950ba1cc27af54f28585eee2741040bc8f

    SHA256

    7ea518fe69886e559d8f84ad6684a7365f93f3ac874ef65640c7eda4db92d1fb

    SHA512

    4c60ac2b4f0c4b04f52ffe86045e03764e75af1ae629560323e2635357359bb3624af59eb8d25e2e544409744113e9c94d213cd2054280cc5879d6766f6b72f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84b4f82362e74d096cce8b7501e285e5

    SHA1

    667ca150dd86105292b5818fe40173c408edb2e1

    SHA256

    61cc0f385fbb5f4b3292686e12e91d22202c1ba314f3c3e068582d577b43c5bc

    SHA512

    4c9612972ce5e863f2b393f53299c6a2f93c34b997747b3b62d816feed427d7c2cc6fa37fff0501ae58a6db0bf8ae03c79eef5d353148f0bb8c39df6de3e71c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d725dfbb3a7cc9498e14ef974c4065c6

    SHA1

    bd033491d8a4dd8619c32ecee8950b800931e5d8

    SHA256

    6e8706e6a01803ba03ac7ee41e71cc2416eca38072bc9efa24caab5da5a770f7

    SHA512

    7b15c963c5356136a0c67d0c748b619c8bc5cc72aaba99959743b3491064703f320552c59a9f70a63854512592e3f1bae48435c1ae051ddfc97537a8bcc95524

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    863ae3072b8eb656a5740d22fa124723

    SHA1

    a382ca2d2bc3c8876a9e98a3040cdf42720f2c97

    SHA256

    6a86da6827824592b91300f7b47c08960839bd78264681d09b2ababa944e5106

    SHA512

    6b4fd6adc249859d23194c8b5dc8a268bbdb222593a51f07baad7ea0d4766b1e0d444afa4fec239437e40906b91b26667cd123905628c61c009337a0658e039c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aaceca1a49a1626c818b9b1d0548c68c

    SHA1

    074b2751c697d1a583316a5ad550b4d0cb8abc89

    SHA256

    36a75eea70cc9aba84d66974139b398aa3e989a0f773f882735845fea54c0e66

    SHA512

    d50a39bd2e20e74adc2f56b22ef00f8d0b531a470a054590d35b880adbf29e51713b3bd9a5b50e6da96c5b78da3f9b728abc133794f6da9b4d8d7def631adebb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3983c26f17d2831681aa34513361bc64

    SHA1

    a36efe0f08d483879e51edd102db85f9fc1583e3

    SHA256

    4f7a5f761c01127e8e5878a3ef22836f58e1fe3de8ae43c429df839a5fb802d2

    SHA512

    f39462761d659611958f1aa80a77626f77910638a767011c534ea6ed3125624d94f36ce2a3bf8551208f9230ec1b53c6b8bef454370a9551ed3cd15d0831ebf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20fa4b94050c2e1b77397b334f9917e5

    SHA1

    1cb189351332896945f48986f93dc1785c4f4c33

    SHA256

    2e6ef3bc4b48ca26e47a14707eaa46331efa388c3640025bf55b395e3531c5d4

    SHA512

    a6640ad97d604a68457134c8e1385808c5bfa83783e4c799c48473a8d0e04e28e637e4406ea0dd142c0042f448d784081013e0430ea0d0d1ce8085e9f6d9ce07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce9a45c4d847da60de82384a94ef9e9b

    SHA1

    27e6bb5527a07989f9e3123961ea7d779e40a2c5

    SHA256

    a1e8fc6e46277f2ece8ae0d82f0837173288d1a36c5275b6eb4e07f7d8a3b9b1

    SHA512

    7896df5f14284a2aada0f8981de3578564c1378fdac2556f584483e29f921fc480d940f9b94bf13aa2ad3570d4a8cf4e81d376b28ed7617cdda942cbbcebac46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31c728e3811113b93d486fb64d4a880e

    SHA1

    1a0258abe382777cb308ef5edb3c07f8b7226f02

    SHA256

    a606a0ac0d50335a1b54b5bd786ebfe812c1319a0c5181809c4b6add55d1acb1

    SHA512

    6ab0b7e6dd14ab88f7c8191dbacc0983cee2a01a44305cfabb6c4f76adaeb6157dbaaabeae225e027db597d10997a72dd2f96d5f903b1c8a3ae0a6b0852dfb86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ed47271e460536fad3c070a044e557b

    SHA1

    7c475cff93bd949b0f1c01dfc78d6be815a2a65e

    SHA256

    c568c5001a97d539d94dbb5d1209528d6cf2888fd81814df6c40484db5eeee3e

    SHA512

    c4bb312361a1ad722eb0ca5e1e61e020b7a75dcef78b5e705aace12fd64685460c1af1d451e0ec13102f1e8e3a3a5fa6607de7f9b6026ff40f5da53318363242

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2bcc745eb506b890442f8e10b19c362f

    SHA1

    8bf1ac4f95404bea88a71d3e046b450bf59ace81

    SHA256

    c868404924062484dc8105f7d38a6d7e732fefe5e739593b7e9acc2f5044548c

    SHA512

    1f30d0ca39c5ebe4ba78bb19942e5ce27fbf25ecbddb8c62eba4451c6c7f7845b804435bed8a81943cd0db9734b5c0004b0e2917e0428931ad92bac28f9e02d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    afd391d364f71abadd6d2c7659e29c20

    SHA1

    71cd9ac42868d292aae02a76073ea384e1cdea93

    SHA256

    9834ef7a619209d03e8b5df1a5bd5ba1f876f895bf0f0f5ae8bcdbcecfbacf7e

    SHA512

    dceebb4d1d0cd0249e277f492ab0777ce7c3b42b154ee573c2e87be38b223a89bf85fd5eece16fbc34a1666fa267874e9abfd5cf9af57435d6c4c978a00aa6f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a657b8aa7fc5cd3a385f496990dc847c

    SHA1

    31f16f333a1c225faeee20c149cc67b3e3e2778c

    SHA256

    d1c712588bf7106cce6f2379130ea6c8b10bd719178c7608059542f8f3784880

    SHA512

    db218bb7ee55bb6a1efc810fdec244beef7385449d2de20045de26052695431aff333423666e3e86815520604ff8091fb25df094bdb8af45ed42d2490456db38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51dab7202a19beefd0190c5e574ad311

    SHA1

    16637e7c59fa3b716b277b079d5330363418afff

    SHA256

    32ba70faa22b49a8946127192b9dc1740dfd92b783443942fc09ea55bffcab59

    SHA512

    126d65c963a26a8bf47c833e6fce879108eafb6f2599f7209bf5b9072fc1b42238ba193c245e2e58ebe5b426c8b2781ec2559fff09b095b7b529f7a6b4af857b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a9ca09063cb7ecba463f8837a2b0572

    SHA1

    b6bddb9ab13456dd47b5c5c315385b3615799525

    SHA256

    90280dbfec7bd085790e6076f7f7a4a2c6101769c357c4bf8da4d283d6bcc3f0

    SHA512

    98b6efa37cf77ea9fd3044970dbedb4be6b4776b103097de68897f30c1b1e6d2c21d55d6f82e241edc3231f49a3dc4b26edb1ea362b93b82a47bea4e360713a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68959c8c771a84227993417fd07a92a0

    SHA1

    1a164f067320b3bedb2326a3dc902945c9fdc50a

    SHA256

    f32837f7cc0588102ee83787e350f2139dc1ee0c5c804ec513a6e1b4f90a895c

    SHA512

    b6b698a71c74a147f2a66c3811a7797b2d39a3e172802d1b8904d37d57a0d9bbecba595a7ec4fa0bd7f174e131603f39cc0f7b877b6698c51089595805079833

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82a0292e7bc3788572f582f97ab4ee96

    SHA1

    7c9ca90f0a219ecf1c694676752590a8f52eda3c

    SHA256

    b92f5765c0b61fd2e295dad3dc9bd8a2c73e00e0ab5c19629d532c61fd42485c

    SHA512

    b4a03b421ca44dfb603ab63736129280fafbb2ad71d5f22f17d5a495667da0ec75b0e37840966255070d81cdbdaa6975a4bc3d4825518f39ef3ad77cee9f0fb5

  • C:\Users\Admin\AppData\Local\Temp\Cab15B5.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1626.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\Desktop\Howto_Restore_FILES.BMP

    Filesize

    3.3MB

    MD5

    a4939b7f9292e268830f6e8027c57b8d

    SHA1

    d84b2839d2ca55ec591706565bcbed3c4161fb1f

    SHA256

    79b2b7c6622f44afafd9c48356d820251e9b3b197c2f345a2bacf0fd8b4c7d13

    SHA512

    6e666ba2716000a536509bf3585142a3de4fb2eff05c547580677bdbe9e55d452d46aaec8eea8ee50137473094aedd9c482f85bffbc9af241c28bc6bd5de1809

  • \Users\Admin\AppData\Roaming\dqrsjacroic.exe

    Filesize

    355KB

    MD5

    9ea29e24749452c4b1441c6d78c06e97

    SHA1

    29a7b7e56a1f0631d074d0c42d865080264dfe39

    SHA256

    71d73684c8b2f3ee1e5796b141b917d98db8cb4b6d2e39eaeb74361a01605016

    SHA512

    ec459cabcd49d8d31931cbbc56c0bd59244579d862100833cfb1a7c39a42bc5cc82f3ad895e03357f2fb688d970dab23c00f54563437e2a52fcb2e6c1e1257fe

  • memory/804-9-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/804-4327-0x00000000030C0000-0x00000000030C2000-memory.dmp

    Filesize

    8KB

  • memory/804-4324-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/804-635-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/804-549-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/804-10-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/804-4332-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/864-4328-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB

  • memory/1884-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1884-7-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/1884-8-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1884-1-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB