{
	"id": "526a3d4d-cff5-46ae-ab44-d56e78e08936",
	"created_at": "2026-04-06T00:06:34.897428Z",
	"updated_at": "2026-04-10T13:12:12.26204Z",
	"deleted_at": null,
	"sha1_hash": "f61003fe53d37f0344653160ee8bd94fda2d3759",
	"title": "Stop Ransomware.pdf",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 30749,
	"plain_text": "Stop Ransomware.pdf\r\nArchived: 2026-04-05 19:20:25 UTC\r\nSida 2 av 40\r\ni\r\nContents\r\nCONTENTS.........................................................................................................................................................İ\r\nPREVİEW .......................................................................................................................................................... 1\r\nF66640F4.EXE ANALYSİS ................................................................................................................................... 2\r\nSTATİC ANALYSİS .....................................................................................................................................................\r\n2\r\nDYNAMİC\r\nANALYSİS.................................................................................................................................................. 3\r\nSTAGE2.EXE ANALYSİS...................................................................................................................................... 8\r\nSTATİC ANALYSİS .....................................................................................................................................................\r\n8\r\nDYNAMİC\r\nANALYSİS.................................................................................................................................................. 8\r\nBUİLD2.EXE ANALYSİS .................................................................................................................................... 18\r\nSTATİC ANALYSİS ...................................................................................................................................................\r\n18\r\nDYNAMİC ANALYSİS................................................................................................................................................\r\n19\r\nBUİLD3.EXE ANALYSİS .................................................................................................................................... 22\r\nSTATİC ANALYSİS ...................................................................................................................................................\r\n22\r\nDYNAMİC ANALYSİS................................................................................................................................................\r\n23\r\nNETWORK ANALYSİS ...................................................................................................................................... 26\r\nhttps://drive.google.com/file/d/1L8mkylrCJyd-817-45RA6gIFCCX4oaOv/view\r\nPage 1 of 2\n\nFİNALLY .......................................................................................................................................................... 31\r\nYARA RULE ..................................................................................................................................................... 32\r\nMITRE ATTACK TABLE..................................................................................................................................... 37\r\nSOLUTİON OFFERS.......................................................................................................................................... 37\r\nPREPARED BY ................................................................................................................................................. 38\r\nSource: https://drive.google.com/file/d/1L8mkylrCJyd-817-45RA6gIFCCX4oaOv/view\r\nhttps://drive.google.com/file/d/1L8mkylrCJyd-817-45RA6gIFCCX4oaOv/view\r\nPage 2 of 2",
	"extraction_quality": 0.8418272150151809,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://drive.google.com/file/d/1L8mkylrCJyd-817-45RA6gIFCCX4oaOv/view"
	],
	"report_names": [
		"view"
	],
	"threat_actors": [],
	"ts_created_at": 1775433994,
	"ts_updated_at": 1775826732,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f61003fe53d37f0344653160ee8bd94fda2d3759.pdf",
		"text": "https://archive.orkl.eu/f61003fe53d37f0344653160ee8bd94fda2d3759.txt",
		"img": "https://archive.orkl.eu/f61003fe53d37f0344653160ee8bd94fda2d3759.jpg"
	}
}