General Info

File name

004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.zip

Full analysis
https://app.any.run/tasks/fec04739-14b7-4f42-bfdf-9195c46fb351
Verdict
Malicious activity
Analysis date
7/18/2019, 16:05:37
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:

ransomware

Indicators:

MIME:
application/zip
File info:
Zip archive data, at least v2.0 to extract
MD5

01dfe448e21a4cde7f6bff143288c87b

SHA1

67c477f57c72014e5037b973ab50f7a58486681a

SHA256

2bc58ebb1d6e72f248722ff7482275d81f23cca4e1e82faf5b0b2cfdd41b5e01

SSDEEP

12288:E1MVKH8te8NQbNoXS8xGRtJ3zUhSsKkc6g2m7bko1OrKzka61fBESTZBHEbqVEEQ:E1NF8QGXDYb3zUwj69yT21lkEdoAWWS3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
60 seconds
Additional time used
none
Fakenet option
off
Heavy Evaision option
off
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
on

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (75.0.3770.100)
  • Google Update Helper (1.3.34.7)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.7.2 (4.7.03062)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2015-2019 Redistributable (x86) - 14.21.27702 (14.21.27702.2)
  • Microsoft Visual C++ 2019 X86 Additional Runtime - 14.21.27702 (14.21.27702)
  • Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.21.27702 (14.21.27702)
  • Mozilla Firefox 67.0.4 (x86 en-US) (67.0.4)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • Update for Microsoft .NET Framework 4.7.2 (KB4087364) (1)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB4019990
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO
Dropped file may contain instructions of ransomware
  • 004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe (PID: 668)
Application was dropped or rewritten from another process
  • 004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe (PID: 668)

No suspicious indicators.

Manual execution by user
  • 004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe (PID: 668)
Dropped object may contain Bitcoin addresses
  • 004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe (PID: 668)

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Static information

TRiD
.zip
|   ZIP compressed archive (100%)
EXIF
ZIP
ZipRequiredVersion:
788
ZipBitFlag:
0x0001
ZipCompression:
Deflated
ZipModifyDate:
2019:07:15 17:32:15
ZipCRC:
0x7c20200c
ZipCompressedSize:
667296
ZipUncompressedSize:
725504
ZipFileName:
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin

Screenshots

Processes

Total processes
41
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

+
start winrar.exe no specs 004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
3856
CMD
"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.zip"
Path
C:\Program Files\WinRAR\WinRAR.exe
Indicators
No indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Alexander Roshal
Description
WinRAR archiver
Version
5.60.0
Modules
Image
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\shlwapi.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\shell32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\uxtheme.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\riched20.dll
c:\program files\common files\microsoft shared\ink\tiptsf.dll
c:\windows\system32\windowscodecs.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ehstorshell.dll
c:\windows\system32\cscui.dll
c:\windows\system32\cscdll.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\slc.dll
c:\windows\system32\imageres.dll
c:\windows\system32\mpr.dll
c:\windows\system32\drprov.dll
c:\windows\system32\winsta.dll
c:\windows\system32\ntlanman.dll
c:\windows\system32\davclnt.dll
c:\windows\system32\davhlpr.dll
c:\windows\system32\wkscli.dll
c:\windows\system32\netutils.dll
c:\windows\system32\wpdshext.dll
c:\windows\system32\winmm.dll
c:\windows\system32\portabledeviceapi.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\audiodev.dll
c:\windows\system32\wmvcore.dll
c:\windows\system32\wmasf.dll
c:\windows\system32\ehstorapi.dll
c:\windows\system32\shdocvw.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\samcli.dll
c:\windows\system32\samlib.dll
c:\windows\system32\profapi.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\explorerframe.dll
c:\windows\system32\duser.dll
c:\windows\system32\dui70.dll

PID
668
CMD
"C:\Users\admin\Desktop\004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe"
Path
C:\Users\admin\Desktop\004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
Indicators
Parent process
––
User
admin
Integrity Level
HIGH
Version:
Company
ZeroFucksGiven
Description
Zero-Fucks Ransomware
Version
1.0.0.0
Modules
Image
c:\users\admin\desktop\004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\version.dll
c:\windows\microsoft.net\framework\v4.0.30319\clr.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\psapi.dll
c:\windows\assembly\nativeimages_v4.0.30319_32\mscorlib\97e047cf68e9a7d90e196d072cd49cac\mscorlib.ni.dll
c:\windows\system32\ole32.dll
c:\windows\system32\cryptbase.dll
c:\windows\microsoft.net\framework\v4.0.30319\clrjit.dll
c:\windows\system32\oleaut32.dll
c:\windows\assembly\nativeimages_v4.0.30319_32\system\e071297bb06faa961bef045ae5f25fdc\system.ni.dll
c:\windows\assembly\nativeimages_v4.0.30319_32\system.core\21a1606b6c00f9abe7db55c02e0f87c9\system.core.ni.dll
c:\windows\assembly\nativeimages_v4.0.30319_32\microsoft.v9921e851#\f971acbc25b64dfe4d70e5b25837c780\microsoft.visualbasic.ni.dll
c:\windows\assembly\nativeimages_v4.0.30319_32\system.drawing\61dfb69c9ad6ed96809170d54d80b8a6\system.drawing.ni.dll
c:\windows\assembly\nativeimages_v4.0.30319_32\system.windows.forms\2dc6cfd856864312d563098f9486361c\system.windows.forms.ni.dll
c:\windows\microsoft.net\framework\v4.0.30319\nlssorting.dll
c:\windows\system32\shell32.dll
c:\windows\assembly\nativeimages_v4.0.30319_32\system.configuration\cd03f9386e02f56502e01a25ddd7e0a7\system.configuration.ni.dll
c:\windows\assembly\nativeimages_v4.0.30319_32\system.xml\7c8f75f367134a030cba4a127dc62a2f\system.xml.ni.dll
c:\windows\system32\profapi.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\assembly\nativeimages_v4.0.30319_32\system.runt73a1fc9d#\b90f40ba78ef47ed0a9a563e242f6322\system.runtime.remoting.ni.dll
c:\windows\system32\uxtheme.dll
c:\windows\microsoft.net\assembly\gac_msil\system.windows.forms\v4.0_4.0.0.0__b77a5c561934e089\system.windows.forms.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\windowscodecs.dll
c:\windows\system32\clbcatq.dll
c:\windows\microsoft.net\framework\v4.0.30319\diasymreader.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscorlib.dll
c:\windows\microsoft.net\assembly\gac_msil\microsoft.visualbasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\microsoft.visualbasic.dll
c:\windows\microsoft.net\assembly\gac_msil\system\v4.0_4.0.0.0__b77a5c561934e089\system.dll
c:\windows\microsoft.net\assembly\gac_msil\system.core\v4.0_4.0.0.0__b77a5c561934e089\system.core.dll
c:\windows\microsoft.net\assembly\gac_msil\system.drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\system.drawing.dll
c:\windows\microsoft.net\assembly\gac_msil\system.configuration\v4.0_4.0.0.0__b03f5f7f11d50a3a\system.configuration.dll
c:\windows\microsoft.net\assembly\gac_msil\system.xml\v4.0_4.0.0.0__b77a5c561934e089\system.xml.dll
c:\windows\microsoft.net\assembly\gac_msil\system.runtime.remoting\v4.0_4.0.0.0__b77a5c561934e089\system.runtime.remoting.dll

Registry activity

Total events
516
Read events
496
Write events
20
Delete events
0

Modification events

PID
Process
Operation
Key
Name
Value
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
ShellExtBMP
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
ShellExtIcon
3856
WinRAR.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E
LanguageList
en-US
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
0
C:\Users\admin\AppData\Local\Temp\004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.zip
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
name
120
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
size
80
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
type
120
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
mtime
100
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\Interface
ShowPassword
0
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Placement
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\General
LastFolder
C:\Users\admin\AppData\Local\Temp
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\FileList\ArcColumnWidths
name
120
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\FileList\ArcColumnWidths
size
80
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\FileList\ArcColumnWidths
psize
80
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\FileList\ArcColumnWidths
type
120
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\FileList\ArcColumnWidths
mtime
100
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\FileList\ArcColumnWidths
crc
70
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\General\Toolbar\Layout
Band56_0
38000000730100000402000000000000D4D0C800000000000000000000000000960111000000000039000000B40200000000000001000000
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\General\Toolbar\Layout
Band56_1
38000000730100000500000000000000D4D0C8000000000000000000000000004E010F0000000000160000002A0000000000000002000000
3856
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\General\Toolbar\Layout
Band56_2
38000000730100000400000000000000D4D0C800000000000000000000000000CC0107000000000016000000640000000000000003000000

Files activity

Executable files
0
Suspicious files
0
Text files
15
Unknown types
0

Dropped files

PID
Process
Filename
Type
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Searches\Microsoft Outlook.zerofucks
text
MD5: e40d1003a528d3bd6a2edcc0dd9a3774
SHA256: 272aa11f1a471989d554418eb644883678ae44c99351fdf08d7464f151d27077
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Downloads\mastertable.zerofucks
text
MD5: 6933da8c8fd557048ceecd18ae3872d7
SHA256: d7829895e1ab64419ba9a66740bb2aaab9e6886af2d55af96e3f85996d620805
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Searches\Microsoft OneNote.zerofucks
text
MD5: 2fa3fe961b2afcdeb6269f02d4649028
SHA256: 2816eabc7b82887b979e763cbf7072ce60c61cd1d28aa325ee8b90e2c5d64c1a
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Searches\Microsoft Outlook.searchconnector-ms
––
MD5:  ––
SHA256:  ––
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Searches\Microsoft OneNote.searchconnector-ms
––
MD5:  ––
SHA256:  ––
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Pictures\jandesigned.zerofucks
text
MD5: a49c5529d86821bd7f94da9e8193cbe2
SHA256: 595be1f1d0124dd94ecf0c20952ea114809a5c1df7bf50d81fe2ec215e99840b
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Pictures\landreferences.zerofucks
text
MD5: 232ecf273fbf52e9ba64caea1d305982
SHA256: 8701201d892245cb6e536fef48de27a24b44f343834c5fb5bba35a7368eb4257
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Pictures\landreferences.png
––
MD5:  ––
SHA256:  ––
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Pictures\jandesigned.png
––
MD5:  ––
SHA256:  ––
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Pictures\acceptservice.zerofucks
text
MD5: 3b52c3e539f0027432d33efca0a6e039
SHA256: f029dfd8ee07458161860519163c672c4d3713c666e60ae5078c510cd0651a8c
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Pictures\expressunits.zerofucks
text
MD5: d5078939310f8563178456f226c88a5a
SHA256: b80d0b89129fcdca98e3a402d46a1265015000abb7a897d6a0e235c9d5d99e06
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Pictures\comeofficial.zerofucks
text
MD5: fc16ea784f416feafa127daebd8d2522
SHA256: 0e9ef8fff48d48021dac7bf79ed028297a449a3b39e3ccc8f3c77af1cccf763a
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Pictures\expressunits.png
––
MD5:  ––
SHA256:  ––
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Pictures\comeofficial.png
––
MD5:  ––
SHA256:  ––
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Pictures\acceptservice.png
––
MD5:  ––
SHA256:  ––
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Desktop\Bitcoin_Address.txt
text
MD5: b61b504ba778e59d1c8ed24f13af98a4
SHA256: fdd2a58798c5ccee581c63bca08742cc4adaec99b0bdc251099bcf8b5bc57e95
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Links\RecentPlaces.zerofucks
text
MD5: 3bcfaf1e80d6d13d2576ad1f77c41cb8
SHA256: b0886380f4e561e3bb6b38cba5e1cf597f6a2330bd2622a1bab0ccaac0d74234
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Links\Desktop.zerofucks
text
MD5: 370cfdbbe7bc8cb86ade8d7a1e3204a2
SHA256: 697d32b109609e4415d3a057e757adf5a2985f319477e64f95574f8241100700
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Links\Downloads.zerofucks
text
MD5: c4ac20668958952a4971662d10721ff8
SHA256: a2eeb40c17e9f70860c611970a906b926380de025dc06d8b79b17dc9b5cd214c
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Links\RecentPlaces.lnk
––
MD5:  ––
SHA256:  ––
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Links\Downloads.lnk
––
MD5:  ––
SHA256:  ––
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Links\Desktop.lnk
––
MD5:  ––
SHA256:  ––
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Downloads\doublehours.zerofucks
text
MD5: 1ced866ee3ab657c3589a65c021daefe
SHA256: 05b75bd54697dd52e158f4f801938fdc26d0c38f5eaf2cc40fbf900a3d7167a3
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Downloads\accessorieswomen.zerofucks
text
MD5: 2dd3c611204ac69dfab2da491cdf8f44
SHA256: e9ebaed231d8206e5502335e4fcc21957992920b0486033524153a1329518f7d
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Downloads\mastertable.png
––
MD5:  ––
SHA256:  ––
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Downloads\doublehours.jpg
––
MD5:  ––
SHA256:  ––
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Downloads\accessorieswomen.png
––
MD5:  ––
SHA256:  ––
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Contacts\admin.zerofucks
text
MD5: 6fa7bde85f99fedfc517b77f57d12bcf
SHA256: 0c081382f4a542d28410a0785d4d8186705f7daf2e9741f9e44bb59ec85e6a88
668
004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin.exe
C:\Users\admin\Contacts\admin.contact
––
MD5:  ––
SHA256:  ––
3856
WinRAR.exe
C:\Users\admin\AppData\Local\Temp\Rar$DRb3856.26906\004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f.bin
––
MD5:  ––
SHA256:  ––

Find more information of the staic content and download it at the full report

Network activity

HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

No network activity.

Debug output strings

No debug info.