Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2024 16:18

General

  • Target

    be368cc04c3fa4ac323c9797f76b3489_JaffaCakes118.exe

  • Size

    276KB

  • MD5

    be368cc04c3fa4ac323c9797f76b3489

  • SHA1

    9fb1ffdecf529b387d679c2f9455cdafca5adafe

  • SHA256

    1cbe3999f4aca64a055eafdeda3fe8ca529a17b533d838198f3c6ebdcd7b1e40

  • SHA512

    81da1f7d65505193ede3374a11940bf2f2d656c5cd1a19e7a3e8184af6dc07d77b3dd465194e2f997822aca8e8315dcc0115c9d0f8ad8eb6f5ee2cdc8e5dee2c

  • SSDEEP

    6144:nAIIkQOK3yb+Po/BdjUSyEer6JNqhvyR73yavQIa3:OrOgIA8tUSyEaaNqNY7zvQ/

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+duaaa.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/AE74F5394C57CF9 2. http://tes543berda73i48fsdfsd.keratadze.at/AE74F5394C57CF9 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/AE74F5394C57CF9 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/AE74F5394C57CF9 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/AE74F5394C57CF9 http://tes543berda73i48fsdfsd.keratadze.at/AE74F5394C57CF9 http://tt54rfdjhb34rfbnknaerg.milerteddy.com/AE74F5394C57CF9 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/AE74F5394C57CF9
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/AE74F5394C57CF9

http://tes543berda73i48fsdfsd.keratadze.at/AE74F5394C57CF9

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/AE74F5394C57CF9

http://xlowfznrg4wf7dli.ONION/AE74F5394C57CF9

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (430) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be368cc04c3fa4ac323c9797f76b3489_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\be368cc04c3fa4ac323c9797f76b3489_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Windows\wxfdumpcnrjy.exe
      C:\Windows\wxfdumpcnrjy.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1940
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2956
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:2512
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2180
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2876
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2724
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\WXFDUM~1.EXE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2096
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\BE368C~1.EXE
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2536
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+duaaa.html

    Filesize

    11KB

    MD5

    c67a612bd4b95f806511bb67c861d299

    SHA1

    d41236982bfe232ea8ef1c36f3fa86a52f32e465

    SHA256

    4a03fee5e107ed940f9f8a87a32fe4d6ab7ba5d0a5b4b6eacb1874e636a87ae0

    SHA512

    862ffcd64ed7a54fc6e5f09d84e8662ff2c1ed7f35b63a0e60417564492f7b685daae718653efda0dd0b77e7f6cc0aeea6e80284491c141eaa6964d07654093f

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+duaaa.png

    Filesize

    63KB

    MD5

    5b1a9cf931954418d77efaffcce4de9e

    SHA1

    c2051ad96ec1a9e756c737c0d0bd20cd5c3ccc19

    SHA256

    929c3446b55d268946aac097d901c656c5c571c0b18c8ddabfc68292dac17d77

    SHA512

    cc72a80b16f0a4fe4593e1bf99aca9482e7b752e93c80a3cdcc5aab03b97d67e9f7e0304e4e9af9819f6326e6071c0bb189083766635e1aa07ee022fb95620c8

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+duaaa.txt

    Filesize

    1KB

    MD5

    55c5a7051610409089538b690c7a5fc1

    SHA1

    4270ac547f05ed93f6c646558cd6aa944dca9b5c

    SHA256

    e7cd81c82f8050bad4334f3a3d174e8d8f56088e3941a2ee0cf23eb6875569b8

    SHA512

    f39641b45d562cb567308a8e23bc1c35e61294e088c6ae4c81576c02cc24813214b23fce8515cb90cda392579b6b2a21ee5583cdaa20cba0e9ef70a92a31aff9

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    dad67c7a39dc1924d5acd549973d56a1

    SHA1

    6bfed3444bfd5fce68b4632fe98ddf6e56d4ccc8

    SHA256

    466c091b64c3e9be5f2225e67c682f1b5abd037ae4d85abd1a2783a824097c60

    SHA512

    a885cff7979ae359a82d4c398229df468f4408038e854d6d3f7cd86d8e9fac700d92ab945acf1008ffe82cf1ebb987eff5e1b5b7a8fd8b2698035d729d38a7e9

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    7e6803e4ff0de10288606198b4331e7c

    SHA1

    6177b9bc69cef08f0cb0e91722babc5053812761

    SHA256

    48c4a9ad6cdb6139d757b4aa6c85b5de22bc8e7b841ac18cef758f81084c93f6

    SHA512

    f3dcceec99917834611eb9731fe833db973ff156bbe15186f84ddc4df0bd5fbc4caeb724932b8ab45081e3db5ceb2b4bcf8004d0428c3a23156a253f70e61d86

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    173KB

    MD5

    f879f2193080e1898045a0a0c876e7f7

    SHA1

    69dd5db90424ee2320fab0df9191ad241495da79

    SHA256

    1ac6ab65208a73b1d98a4986247bb777801254478ae4f9a89429cd910ea1db86

    SHA512

    4e3ed0e855f1b1cd4f6da108db307d1592d13cbddc48bbd21a7091f04d6f6f6039b73009d14bc9aa05f4d8625d92795e09de7491d0a219c735977836732ae82f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    e0513b16138fb76fd20475bccb7cfa3c

    SHA1

    bce02b04cdfe82ba122601650ae6615e3f44f33a

    SHA256

    e1d1e597e57c87fdf9d53ea4f555dd14be10b9a607079f54c24a9b511d3e41e4

    SHA512

    e071f3c0664205ef853b2005212a348cc71c8bacd0839d2b7499fe73ef7a7efda343583ef1a6e6f6b42be52557919b0b271a83b4f95e492f93344127a0e22964

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d751715edc39736a2d8532dd6d60b317

    SHA1

    b3fe30e2beb284a15415ce6c4c5a03ae50bc4eac

    SHA256

    16b7e79a57ceedc2427d68b1b05f4fdf72c1193bae91dc19d9049aaab1d08326

    SHA512

    1adf372a9319e272df139dcb9bc0197e99754997d96d2d09d0ee8783893870739bfd21a274ddebf05ea82561c5259c6eb9a01d2625cffd23141a77b286d41d08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    516fc812ffb4bac5e107f6dbabb700a3

    SHA1

    7afa84d21a9eed1bebd336043508ff99689a32ef

    SHA256

    fa5ad4afef27adc914243f36ee5001763e8839fec204947cf8f0002f8b9b32e5

    SHA512

    b0e8570076cd7e0408913d0abe56abfd1a37a4eef39a60fe853399ae649e3e00c71ed8baaecb24cbcff3275e5b3bb547fb0664ff8065c30b58547b19c8fcd716

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    beb6b788fb908906e08cadedf4372ee3

    SHA1

    c01bc7fae64e05d7fe0c38356dc0133bb242755a

    SHA256

    0b69bc9d6dd6c78e81d6fdbe01fa33e14498bac4c4f22e7b8d5dfc33ed2d40be

    SHA512

    8a31fbf088cdbb71d7696b8f3a850d7ffe3c861cbc171a4cbb8f03c2a1ed53ae7256b686c35b55d042a223bc2b74ac3baaa3abb4e658ff714ee38adf37d74b42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6e373637a0b9d7a22d8a08209ad209b

    SHA1

    9bc106e668f9e35b7d08c6bbe87e7c24ff204e56

    SHA256

    da7bfe7d225a507b5d210991f1dbfec09a1bcf390cd1feefd36e393ef7979c4f

    SHA512

    92578dbcddc4673a8697feb24590941de40b55c304067e3f7e595a529594264faf63eadbcd85d40b0724c97c1bb9c776b7d7fc84cae0a97438804d94ed6294ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a36c09e6a8e8bd951e46c308ae6dafeb

    SHA1

    49518382b85d707d9fc9dae94b7b91865dc85b86

    SHA256

    bcde21c5cbe4041d1d54b95463dd56a31d30ca7665738ed5d8cadbc1119d6851

    SHA512

    79ee0aaa06aac652b3c86e0901f6540694f629a4bef91df30995a650afa3ce33566e54b73afa74a1c28a8c1cd758cb17608ed755e5884cf91a6c2de58b8ac77c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3cdf7f7c7f352bfa31e893b6caf05277

    SHA1

    a720d03eaf1f07d5525cf2328531a2e497f39878

    SHA256

    7fd5b4b63e4e1c3e05c6c160d2daf9a0638714b33c9b8ca89445215a82e5d2cd

    SHA512

    9355295dac3835bfed54aa162a4568e88c0dd3a25b6841dce18c2e8c738baf0e9873f809db8d4bdf90cb0092f6bcabdb6d7d10d91f8ab044e992f14b49d3f809

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a895d7a5c763d58677b387415f8e5c7a

    SHA1

    2788309c3c1a8353e3b29436ee43dd02c443f068

    SHA256

    51022f74312cd4256d50326cc5703e63c50668ecc451586b25cc8063e88c463b

    SHA512

    8d9bf9d92bdba4a5fc4982546edcd9bb8def6a54746d9da142adbb1f7fc4a7b28c765092ac791126f6a9de728f521b64631504ff7e45dca46410a42cd04be671

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35e2cb7750fc3531b6c859f14fd0b1b2

    SHA1

    6f354b0ab4beca2b7f21ccc9265bb14074a55c4e

    SHA256

    f40b64cf827ba28b638f778db90189aa2ab6902c520059fe2c2812c6bda890f5

    SHA512

    f7429b85e389c9ed2684a413c733e4e5b5d67ee6c7cf5079edaa3ae1e4e5d49f79507a921ba913662c3738b63fd4719c6eb6b12f8f7585e0a69279bb7e3c7c76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9af560563c70941f38d817e1835672a

    SHA1

    73e5f351807faf95eafef6878fe32f76a8752982

    SHA256

    dce1687eb89a7bc480fccd2b5606e445e88b0eeefa291ee72d6b0f5cd419596c

    SHA512

    07a18e09f83d22910e5c9cf18d304f431c2825bd9cf1f671c122683d8c3e499122d4f9ae4ef0cb2642b1b699a815971d43d0eb9849b8fb3fba3ee07c43042e3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e77effcdacd84d500834d53f7a73a790

    SHA1

    c73cc1289f1f2b327c04ac480990feacc47204dc

    SHA256

    7df8922fc5fa3f7cac6bd6e879ece8a9c79a8916722b4dab04c8339de91dad0f

    SHA512

    45d62fca6b0bcf42ce5ebfff63f47a1f5e3a44c116e3e0291a9bdac4046ed1aa5abf63666a8f13ba984b99ac9712a471e0fd4dc9b9183f3962e669bb6c18ec02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    792fe46a77c3c4f8462db9c8098f30fc

    SHA1

    c72946c0db29e2d97edc85dd07d4b8b7d1761a6d

    SHA256

    52479a84edf34ad594c21f2e372ac8a83110ca9bbb3d08ad187237dbf60dfbb8

    SHA512

    db84d648b44630e0685c431b5733e6ea0cd8131c66105216e88f3e6410538812f4c10a62328ab51e5354d32e3b0afd4bea0f85e267dc2a41ee7c98bd3be3e347

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e761961e5c43be7eb7df5072433034b

    SHA1

    33070ad04e1c69779f5b7bfd3441ea419025941c

    SHA256

    4f4759695e53d880c35abe6ef00a6abf38bd6580be606a963b551459f0ace5ba

    SHA512

    23dd3d457ec7e2347d6b6302ef349a5f201d228ac4357c44871ec3d723b8b5d03f4c68b4a5b2d6afdb93c2977114a1efb951d2b3c4c3b327b920393cf33548c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f19183f0318c578e759cab9159f658d

    SHA1

    7b5021f2b2b0ac753c78808f7b7d97f9b667f06d

    SHA256

    a1af463655db88dc9ad6f2642e3d03fdf03fbe8835903588e9ae482e29b3420d

    SHA512

    b0804e6efa94c1f1e07797b08e837924cfc7a63577fd7d98dcc60bbb4d0c1d6749cb4f6351e5048b475c99bcf6510c4a90e7e53dc28b761d2a4f5e6ecc7715ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31e2d5736d6512242ec3eb6a9d9eb041

    SHA1

    80b40c424ce99645989549affd2565b32130ac35

    SHA256

    61b9b71a8da8311cd2c6b9a5944eefa06f4099d2c5c0974e57be83f2b3a0e478

    SHA512

    8294a839ec7985ca02ad4a076883b63d149c708f20baec3257f4fdff7fa417acf61ff273d2b5600dadff521b7f58378fd7916fcb83b6400e0d926732a79c5ab2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5780d5c5b80a95780736b9ff24491a0c

    SHA1

    c120782dc2b24d29f4abe055adc33f17cc802ed6

    SHA256

    604744c54e7c57cfa778a54c90a1a81db28a802145e85899dec2b908fcb8fabf

    SHA512

    cf85b45528efe22628878de15d4b32caa1bbc541e6d436b32054616dbaeb869ab79d35ccc802b7b0b79f39c0d373f45399a80cb3b2191c41fa9c543c2cc24d61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72af936d9fca1eba72394ed9276bcaab

    SHA1

    46d413e3fdceea0354c540583073f3b13169f9d8

    SHA256

    093e48f7d07c5e29dd4273df331a9d7079560022d3b4c3473e18c693a0898295

    SHA512

    79b576271d78e4444a653107a6d8eb4268d2f805e8fc1174b2d772e32665ae1e98e5b9131c5a2e676c00d7d7aa57585121ec567ac9ac7671a18039c92919f805

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5b50462f7fa7adfd85920f9f9031d9c

    SHA1

    c06257a2a0b5b7e619aee52913b0ac54775d71e6

    SHA256

    c62b4326da779d2709971e40bb86ddca8af2d89c79fb31f333aa64c1a92609ff

    SHA512

    69ee6e85a67bcd3be108dd7a388135494f4d7e45d16b94ad2c33dcee9e981f096f63f6c9dcb99837a3e0a613cbcc80b0bc27aed08d11f33590ef60288b870271

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f660805d25917e3bc0ce73b1e465b1b8

    SHA1

    003444dd5b0133c80ff6e2b709adf9abeb4b00c6

    SHA256

    9f672d648828d07b8e4172cb134d2ec4e4d0a04c5b64ba1656a22dae44916ed8

    SHA512

    3c7538ff21f6bf383afcf2ae78f39765c74df36e1f5ce783768f5ebea1288f8c7de782c9305b60e09361289754d9692a5b3f142f72e959eda509d28b706ca3c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfc721a94ce1dbf3cc6b4af7df8a83a7

    SHA1

    55104003ca220b593bb73243030c08c68f21ae47

    SHA256

    01fe6874f246d9f149732158ebaa3b22a92e0e8726671b0956bb7bf05e0722f2

    SHA512

    224ce9300d93d65955969a6c02b66591dbe70946965c07a215f27d0e8007c6b14eb1333446f2ce63c208d5c682126cbc03bd432fedf4005809debd196f53248a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    6c370a4e152aee8c761fc72457a66e18

    SHA1

    72ddb73b3c6a7a77312a42db011960dfc5b05f9e

    SHA256

    7d21427b00f5c471868a8b4c6d498488e7b729e6e4ac1e3122dc135078dce590

    SHA512

    97beea3f693f66faf049763e30b577dfa74815b252147967c043e903475e5e63477b94a153cc62c6886d259add096bc013dde291da5b771636db6981cfefd993

  • C:\Users\Admin\AppData\Local\Temp\Cab2EEE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2F3F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\wxfdumpcnrjy.exe

    Filesize

    276KB

    MD5

    be368cc04c3fa4ac323c9797f76b3489

    SHA1

    9fb1ffdecf529b387d679c2f9455cdafca5adafe

    SHA256

    1cbe3999f4aca64a055eafdeda3fe8ca529a17b533d838198f3c6ebdcd7b1e40

    SHA512

    81da1f7d65505193ede3374a11940bf2f2d656c5cd1a19e7a3e8184af6dc07d77b3dd465194e2f997822aca8e8315dcc0115c9d0f8ad8eb6f5ee2cdc8e5dee2c

  • memory/1940-716-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1940-6127-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1940-6099-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1940-6095-0x0000000002CA0000-0x0000000002CA2000-memory.dmp

    Filesize

    8KB

  • memory/1940-11-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1940-4334-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1940-1413-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1940-1410-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1940-10-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1940-13-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/2440-8-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/2440-9-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2440-2-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2440-0-0x0000000000320000-0x000000000034F000-memory.dmp

    Filesize

    188KB

  • memory/2440-1-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2504-6096-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB