Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 19:27

General

  • Target

    3bb359fae8694fdd6a75614aabd1516d_JaffaCakes118.exe

  • Size

    203KB

  • MD5

    3bb359fae8694fdd6a75614aabd1516d

  • SHA1

    ada8813519de455b58f6bab4541073d65cc53eac

  • SHA256

    06c1363d352171272258a27cd7fbea8f1fb6841f8e74185230885311b35acb55

  • SHA512

    fe1a6f851e89487289d4284888070a8fd5b2477da2030f5bd8d3a8a66dfb7671785cb79913a4a60998717ed367a4d0487384256a0c1a27a709ea812b4406e75e

  • SSDEEP

    6144:wyAge9R9JXEZIXDcTSMQ8KQ1zP0CmATGWP:OJXEmXDcuMQ8KQ1zP1mAT7

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #Cerber_Ransomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Rans0mware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.dk59jg.win/2087-A265-8D01-006D-F5CA | | 2. http://cerberhhyed5frqa.kipfgs65s.com/2087-A265-8D01-006D-F5CA | | 3. http://cerberhhyed5frqa.wewiso.win/2087-A265-8D01-006D-F5CA | | 4. http://cerberhhyed5frqa.we34re.win/2087-A265-8D01-006D-F5CA | | 5. http://cerberhhyed5frqa.as13fd.win/2087-A265-8D01-006D-F5CA |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.dk59jg.win/2087-A265-8D01-006D-F5CA); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.dk59jg.win/2087-A265-8D01-006D-F5CA appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.dk59jg.win/2087-A265-8D01-006D-F5CA); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/2087-A265-8D01-006D-F5CA | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.dk59jg.win/2087-A265-8D01-006D-F5CA

http://cerberhhyed5frqa.kipfgs65s.com/2087-A265-8D01-006D-F5CA

http://cerberhhyed5frqa.wewiso.win/2087-A265-8D01-006D-F5CA

http://cerberhhyed5frqa.we34re.win/2087-A265-8D01-006D-F5CA

http://cerberhhyed5frqa.as13fd.win/2087-A265-8D01-006D-F5CA

http://cerberhhyed5frqa.onion/2087-A265-8D01-006D-F5CA

Extracted

Path

C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber &#082;ansomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #Cerber_Ransomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Rans0mware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.dk59jg.win/2087-A265-8D01-006D-F5CA" target="_blank">http://cerberhhyed5frqa.dk59jg.win/2087-A265-8D01-006D-F5CA</a></li> <li><a href="http://cerberhhyed5frqa.kipfgs65s.com/2087-A265-8D01-006D-F5CA" target="_blank">http://cerberhhyed5frqa.kipfgs65s.com/2087-A265-8D01-006D-F5CA</a></li> <li><a href="http://cerberhhyed5frqa.wewiso.win/2087-A265-8D01-006D-F5CA" target="_blank">http://cerberhhyed5frqa.wewiso.win/2087-A265-8D01-006D-F5CA</a></li> <li><a href="http://cerberhhyed5frqa.we34re.win/2087-A265-8D01-006D-F5CA" target="_blank">http://cerberhhyed5frqa.we34re.win/2087-A265-8D01-006D-F5CA</a></li> <li><a href="http://cerberhhyed5frqa.as13fd.win/2087-A265-8D01-006D-F5CA" target="_blank">http://cerberhhyed5frqa.as13fd.win/2087-A265-8D01-006D-F5CA</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.dk59jg.win/2087-A265-8D01-006D-F5CA" target="_blank">http://cerberhhyed5frqa.dk59jg.win/2087-A265-8D01-006D-F5CA</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.dk59jg.win/2087-A265-8D01-006D-F5CA" target="_blank">http://cerberhhyed5frqa.dk59jg.win/2087-A265-8D01-006D-F5CA</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.dk59jg.win/2087-A265-8D01-006D-F5CA" target="_blank">http://cerberhhyed5frqa.dk59jg.win/2087-A265-8D01-006D-F5CA</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/2087-A265-8D01-006D-F5CA</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Contacts a large (16393) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 63 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bb359fae8694fdd6a75614aabd1516d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3bb359fae8694fdd6a75614aabd1516d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Users\Admin\AppData\Local\Temp\3bb359fae8694fdd6a75614aabd1516d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3bb359fae8694fdd6a75614aabd1516d_JaffaCakes118.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Loads dropped DLL
      • Adds Run key to start application
      • Modifies Control Panel
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\RMActivate_ssp.exe
        "C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\RMActivate_ssp.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\RMActivate_ssp.exe
          "C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\RMActivate_ssp.exe"
          4⤵
          • Adds policy Run key to start application
          • Drops startup file
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Sets desktop wallpaper using registry
          • Modifies Control Panel
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:960
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1560
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2036
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:537601 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:668
          • C:\Windows\system32\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
            5⤵
              PID:548
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
              5⤵
                PID:2004
              • C:\Windows\system32\cmd.exe
                /d /c taskkill /t /f /im "RMActivate_ssp.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\RMActivate_ssp.exe" > NUL
                5⤵
                  PID:2720
                  • C:\Windows\system32\taskkill.exe
                    taskkill /t /f /im "RMActivate_ssp.exe"
                    6⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1712
                  • C:\Windows\system32\PING.EXE
                    ping -n 1 127.0.0.1
                    6⤵
                    • Runs ping.exe
                    PID:2648
            • C:\Windows\SysWOW64\cmd.exe
              /d /c taskkill /t /f /im "3bb359fae8694fdd6a75614aabd1516d_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\3bb359fae8694fdd6a75614aabd1516d_JaffaCakes118.exe" > NUL
              3⤵
              • Deletes itself
              • Suspicious use of WriteProcessMemory
              PID:2088
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /t /f /im "3bb359fae8694fdd6a75614aabd1516d_JaffaCakes118.exe"
                4⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2876
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 1 127.0.0.1
                4⤵
                • Runs ping.exe
                PID:2020
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {108ADD52-1A9D-4F64-A350-63A1093F28AB} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2972
          • C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\RMActivate_ssp.exe
            C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\RMActivate_ssp.exe
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Drops file in Windows directory
            • Suspicious use of WriteProcessMemory
            PID:2376
            • C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\RMActivate_ssp.exe
              C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\RMActivate_ssp.exe
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2052
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:336
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:336 CREDAT:275457 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2640
        • C:\Windows\SysWOW64\DllHost.exe
          C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
          1⤵
            PID:1872

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

            Filesize

            12KB

            MD5

            32d791faef9fbea08528a5c72d5e3d69

            SHA1

            41f8c292f6232a95b6547c6c9d45fadef8c84c94

            SHA256

            159879771114764e24fa67089c256522e963a8156e50adbb7ebc87d68fb5d791

            SHA512

            73706ca26e8b17258bad212612fd802430a6de3bbf66347b204dc25fb5c6262c7fc8be09c946ca1081cb9ec4c2984ea79d226fbaf548f0f9ccfc461ae8b44f32

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.txt

            Filesize

            10KB

            MD5

            c7ed5be1db09bc0ebd30da769b6202d8

            SHA1

            031f0582b2e3e9f456bf45f06f64caf9088d7252

            SHA256

            10871624c750d40560d14c3c7f4bc641520e5fcb7c3feca07fbef6071f122afd

            SHA512

            431049c1af0ef0121bf084745ad6cc135833d57725367739184f554372922ef1e92b8e7d2d91635cdea0c55043d0f7b4c586fa4fbb61488873205c9b2fcc8f53

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.url

            Filesize

            85B

            MD5

            f9340e57d9877e80c0246066ec0be724

            SHA1

            06d46fe7c43262831b39a635c9e86a2acf11fd6a

            SHA256

            adeec17fcfc4eb50b0793c20b3c369d5c3ccecb72c52c14f4c40570e338da4a1

            SHA512

            6c1e355e49d71d9d478f22d39cfa3fa6f1f4b2cb572c093898b51ad9ea550c82e0baa0791c510bf6963efcfa920ff0e20f258a0b2050d2a99c828f177fc6198c

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.vbs

            Filesize

            231B

            MD5

            9d8c4bfbd009c4d6001e2125abaa8b02

            SHA1

            cd040558172b5fca5b200447a281843956243741

            SHA256

            a652297987f14317100f8c5f7eb26d1bc67eb8a64f0b39b72b5fd5046a9f29b0

            SHA512

            c4c84f43642b805a105acce9ebc9f01aa0e6ef553ea32be3f8b890fc7440f0b7d3ddf99b9336bce20ce7a3d9b9f6434a704651a8af425ffc8407ba39d5de735f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

            Filesize

            914B

            MD5

            e4a68ac854ac5242460afd72481b2a44

            SHA1

            df3c24f9bfd666761b268073fe06d1cc8d4f82a4

            SHA256

            cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

            SHA512

            5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            1KB

            MD5

            a266bb7dcc38a562631361bbf61dd11b

            SHA1

            3b1efd3a66ea28b16697394703a72ca340a05bd5

            SHA256

            df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

            SHA512

            0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

            Filesize

            252B

            MD5

            d8e0f19261d65831900cde7635d4ce42

            SHA1

            3cdaeb8194e4e3d54ac1e59685278db5bab5ee1a

            SHA256

            01e8db18af16be5f673ba930f32cdb6f6b7c8ea74dde684e24497378b054d917

            SHA512

            0dcd6e960ba0222a9b9b43339e9b3f8bed565904181de27d7a383006e7de2d299a9433bd6d7e454eaf64f179ef82e233e4731ae107641d9d06cf7296b6a5a0d5

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            f04d4249dbe938a1c52d419bbc97901a

            SHA1

            5f900d9826a9d731a2a1f3acafb3d0d1d76b604d

            SHA256

            dc52e8a678e1cd68e7126e97f8f8b5ba8ddfa085b1a0a5b9dc069401ea5daace

            SHA512

            6ad2e27efcdc6144b2bcc23923c54321f7d0ee38d0b2324f4951ac13e52a6b107483f71ce35fcd0f8f23601511a0728ff2cfd5715768a4b7593a6ab038e59e70

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            03062e3e7e220ee80f8a3e2f3ba6c880

            SHA1

            703f4016d5ecf79c0ce97a704d6cc3fa832129f9

            SHA256

            06be677acaf99a48c34328620b834cd72f25007bfb2db0154f4da49d7460681a

            SHA512

            f8d5b0747628de6302846aeca068c9f45e80676563dc03413374941c92d27c9f698b98d9fc3c4a82f91d8a7e2d1fa98491073e5f751051b2976d8652f55d983f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            5acb243f1f6b34200e1efabed7fd4d13

            SHA1

            a62144ab967812eecae718fbfcc3b618f73d6491

            SHA256

            8f5d466fcd69ae92906406aa7122c2809bc4398325e062e34def3bfbeb5ac79b

            SHA512

            3136d94f934778d24d6858b9e3bb1372ddf9d154c90e9307de224c601bc475cfa827dabfa0211c4119aad5ed4b3f90f0f9bcb1dbe3bfa78ad5dbad56e7a06d77

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            4563d97a4aab653dabad19bf66ee3231

            SHA1

            800ab52a2692a159940f484fd40840db1115ddf0

            SHA256

            20e8c4a96b4314fbd9a6aeea50ba91633a9de4e0b90f3187b61506d03943aab9

            SHA512

            11a86db28ed15e3b15a12ad0803e227f098fdc8a2add0c721dd9b6ef18a830279ee27db3560a026b43ba69ec4064420a3378cea67f95ab8c863298d6122c2d22

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            97700a3e47c11c345dcadd76846e97a3

            SHA1

            1b627995f50335cd86845c16024f6e9e8c221294

            SHA256

            f90bd43e414862bb2ae45037e7f1209c86a5a18badedbe06356356d9f5ce67d7

            SHA512

            852205e38aaf39c7842ef962ba153ce2ac04cc976bd949c67e48df46309ababb2843bd5424b320203f2e7f2b9e2c1fba0d7cf27b7bb82c0d41199eff282acfe4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            f9b13e9e7b941e7d0d016e595a8da821

            SHA1

            17db2dec954dc932c251916eb63dca6bba4bc15d

            SHA256

            d7de86ad44e529b770e343617291aed8053d65cdeeb9981ff0fe19f29ac0ec74

            SHA512

            4d00c11479c23579750629e746d288c25656e9520d81a3a670de1734cb5715f69ed76ab6980dd1da00324d1cb342fbdb7517b719391814effc26998c937a13d9

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            2c049ce4ab63c6b254cef38ea998fa15

            SHA1

            74c1828531903800af5d0037342ffed999dfdec7

            SHA256

            5b48c0a1f8f66e8afb3c90291ad8036c87d855bbed5887bb937d80be98d8fccc

            SHA512

            b762992f583662455afc50a0d079cff9388f37fa3aea909a83cc00ce90c5f731621a2b4efbe2b99c4051733971d4091fff3c7ea654f8f6bdf392e2366da049d3

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            eea9a00ebc76fc8e81adea393bdefe64

            SHA1

            52da918ca07c02916e940bb745c6b7a1903238ef

            SHA256

            002f3efad5ebbf07bb9195f14ced29fa634d3f4b7d28dcaf7532cc48a2e3ad52

            SHA512

            caa804bbe0e4fb4c551596c1ff59b28f0228b7d29da719ca28472bb2e92ecc6a910cf0551a2be9b33fb58abbbba9f42a961c419a71479dab505c892697d83132

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            e9b662c08d5b73e7dd73860a3a5e6eb5

            SHA1

            e1c93e86ae14e4480912d6ddd9a30e198070d49a

            SHA256

            e0d3fb6dfa2109985ad6e3120e752b1470af6f14e791d588ab4b5d9cf13d4447

            SHA512

            2b5dc192144ee35cf578197af118d02e45606e1e75b6d168e28911bb3b2cc61a9a7231f2eeb8b5cb4be46eb18f9e379a1a445f93e8003c1041900468cd3ffdf0

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            242B

            MD5

            e740ce1cbb14902e3426bcb6e09f5eba

            SHA1

            40af16ed502754bdf6e41c1931a22d724c643519

            SHA256

            edc47bbd2d09c2a36eb0d1fa06a06bb0a5364c6725e59e7c543a1395f736a7f7

            SHA512

            3416cda55052662d0d91aa96b80a896b26bccbe01d7ed1f9e28fabc3ab52580f118a091c7176c425ef9cb8839c395726bc5c004aa785fb9bc77aff2120f0a01d

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SY252ZZ1\favicon[2].ico

            Filesize

            4KB

            MD5

            da597791be3b6e732f0bc8b20e38ee62

            SHA1

            1125c45d285c360542027d7554a5c442288974de

            SHA256

            5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

            SHA512

            d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

          • C:\Users\Admin\AppData\Local\Temp\Cab8058.tmp

            Filesize

            68KB

            MD5

            29f65ba8e88c063813cc50a4ea544e93

            SHA1

            05a7040d5c127e68c25d81cc51271ffb8bef3568

            SHA256

            1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

            SHA512

            e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

          • C:\Users\Admin\AppData\Local\Temp\Tar81A4.tmp

            Filesize

            177KB

            MD5

            435a9ac180383f9fa094131b173a2f7b

            SHA1

            76944ea657a9db94f9a4bef38f88c46ed4166983

            SHA256

            67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

            SHA512

            1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

          • C:\Users\Admin\AppData\Roaming\14.svg

            Filesize

            906B

            MD5

            821b4b1bfebd42f747465153006eef8f

            SHA1

            0283713c0f75aeb9ff524268cecbccea3c76a735

            SHA256

            d1fae5d438c33909d34190ce684e1f646420c7cafd402008a6b251e1b0910e76

            SHA512

            e18008e287b2f8ad6465836439d526710586a6bf0e1f77f5363d38f5fdf3115d41aa48bc49ed6de3ae279c256f8407414e6028ff6ea4b0532079dc411f4b834c

          • C:\Users\Admin\AppData\Roaming\15.gif

            Filesize

            210B

            MD5

            23af64900b778de945301e160052d5ee

            SHA1

            9fc8829c7b36d8d9fae1db17af27a91d4fc4cf0f

            SHA256

            929c07c9b3f3ec1d4aac25bbc8f7d38b3fe507b2433e7d76bd7cdae12e01f0d8

            SHA512

            179c24773e6e9de0cea15b30e9c19a2acbafa3a04b8b9f7d5dace99a63aed8dd53d5b4008ee2e2ec423e4c5effa4763a853bcf6f7f76a830d1b84aaf6f9cc449

          • C:\Users\Admin\AppData\Roaming\159 dk orange bl 1.ADO

            Filesize

            524B

            MD5

            c1499bab3b267f3cae9da5c2bb1d0852

            SHA1

            b3d22f0f91ab2f48797fa87729b1ea62739251c8

            SHA256

            5b0f22c90efa9627d7e16179e0ca713cf596aac5850d776a9c619ae6cc6baaa2

            SHA512

            10bef0c4bdfafc2bf98c6cacea3a3bdc652e028df268111caf42961ac1f89b78c958b6f781d8cd8063e4bf90a231d0efacb2f5ffc2859e71101991d1c23211d9

          • C:\Users\Admin\AppData\Roaming\30-urw-aliases.conf

            Filesize

            1KB

            MD5

            c6c33cfde9f637e1d2b8cad9353df6dc

            SHA1

            75cfd127ec1fe9a140c78bc84164bd35214ced1f

            SHA256

            c28770c5d1ec815ce63a33cfec8aabadd21aed84d60f000ebaa2d13e2bcbb0ac

            SHA512

            66bf5248914ce0e6371a8e0cb12f9a3cc573928488f67dc714d5a6605ad61d01aa5b308f13ab7f3ecaec0ae502a4c279e1bbf1280d4dd41874ad2614e132080c

          • C:\Users\Admin\AppData\Roaming\401-2.htm

            Filesize

            1KB

            MD5

            b15a2a53249dd89c355042688fca2f0a

            SHA1

            7fb9ee35b128ec49babc26929e5706318fb5b961

            SHA256

            c79b8c6820105329bb3d20695aa040cfcf413ac3e4ddc3186cc915f4c67fd6b9

            SHA512

            690e92d7a9ef378172fd092ae320642bbd51e76007ae20e364765527fbd69b27b7fc7e6c3783fa276f5f6343281559051a96766ca8001aab24208910d2a1268c

          • C:\Users\Admin\AppData\Roaming\403-17.htm

            Filesize

            1KB

            MD5

            2203e77327cb6c191bd29f71baa4da3b

            SHA1

            cde0311412aefaddf3af73dd3f3c5381c4aec486

            SHA256

            f8ce38607487942c77eed8afc691fa1ac7b2e408ee275f401830346d22ab1336

            SHA512

            6430b5ffc8b2ce3eab83f4513d5f41a7ea46cbe12724e6510a62d08cb281bfdf390e5c5a0d35fbe464791be835d8ca8d38ccf67e3a162f09ab7d000f43e17504

          • C:\Users\Admin\AppData\Roaming\403-3.htm

            Filesize

            1KB

            MD5

            c7df00e9e0609d4216bb7404dd9c12ee

            SHA1

            3aac5a61dc12fcf9fd23280d8fc6361ef734c524

            SHA256

            9fa88627e300794f3f5f657aed1a58a447d4cd5ce6989d49d62dca9507c3d9de

            SHA512

            87427aca49cf20aa8d36541f589940b23e42d60eda72965f75ebdbb8342a19198c8625b8d4f9c71b4444d14ca99816d314991ff1e870da3437cbc15453d8e47f

          • C:\Users\Admin\AppData\Roaming\Adobe-CNS1-H-CID

            Filesize

            3KB

            MD5

            03016d6b79313a63773d97792ee13889

            SHA1

            53817df4ead0586b47b12ec3bb8af2e130f3c360

            SHA256

            38896b1f0903a9a577d129e2dfd3d4c2cdc174031c79c7fca943870a1538280e

            SHA512

            7bc24ec4b4d28a3eb260d636652e72884ca9c2022ad0d04cef08e7907828396c71ccafc8d7c3605c6b7a67784db6837209e48e498ea491aad1b149a2d6c73e15

          • C:\Users\Admin\AppData\Roaming\Amman

            Filesize

            1KB

            MD5

            88dbc6c76db7bfcbe320624f0a10fd8f

            SHA1

            f2499cd551b11f788a07c5e96aadd49fd298aa88

            SHA256

            a2142a3b7003bf9292edb1285f75455425b7f118d7edef631b127c2fed8e50d8

            SHA512

            73662a02ec312e348e6dabe7705a2b68d53d5c55b48c4e3ad70ab8b0a7b5c4914024b23cb8a0679b1d846130615dcbb60fae683524d95106ce9994cbfe0e8160

          • C:\Users\Admin\AppData\Roaming\Bl for dark CG9 CG2.ADO

            Filesize

            524B

            MD5

            8219a136a0e9eacd2fa9691cc4bf19b3

            SHA1

            7fc56e6b38a06db751c70b94d595347a9e2b8f57

            SHA256

            9975e2a9c729b708744650d688b3c6222bf3c8c824bae9ab7f1337d8447b7bbe

            SHA512

            37f10b63d14d9870a02b290f735ff893adf03d775d8c9aaf2e5a5412ee611ea6255536ac5d58938699f07dd18bd52d50b302378b1522e2b9bd9b210fd5e59e69

          • C:\Users\Admin\AppData\Roaming\Bronze - Polished.3PP

            Filesize

            1KB

            MD5

            000f1aa3dde140d63ffb7c3a0bb9c3fa

            SHA1

            8897e631ed08248fbde270c7ce87cc2d2d078766

            SHA256

            27a661ab3534b748e9725a567628e8341c26f8fa1eb157eb9027c68a40c3146c

            SHA512

            a7bf610832e4412e65116eeebf279008834add76df92491c7aaed63669a465421e26d36febc3f3b846cd047b125550b3e70c5e6a9737a2eaa0e0347a1dd9ac62

          • C:\Users\Admin\AppData\Roaming\CNS2-V

            MD5

            d41d8cd98f00b204e9800998ecf8427e

            SHA1

            da39a3ee5e6b4b0d3255bfef95601890afd80709

            SHA256

            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

            SHA512

            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

          • C:\Users\Admin\AppData\Roaming\CNS2-V

            Filesize

            2KB

            MD5

            68ba9ca1e541c73104daf446938e5583

            SHA1

            9d863f17dfbe0e7ac172fddbcc5fde8e636d49ef

            SHA256

            d6a643978fd39cf31494da165c80d655de92565c834af7457cd2828fe7548a09

            SHA512

            023cad6108ad3d505f8d9ca340f004bee44f74817a43cc94a6c316fdbc1346b3af9a16c887af55cb6942370e84df4ebdeadd8fa8b4e335a2365f41cd4c1ed525

          • C:\Users\Admin\AppData\Roaming\CST6

            Filesize

            27B

            MD5

            37e9ac1310a963cd36e478a2b59160f8

            SHA1

            1406eaa01d4eea3b26054871f7d738e4630500e9

            SHA256

            04c9e4b0f69a155074b9ff26351265f78090c7ea2f23c5593b7130b4eb1e5e32

            SHA512

            0ccc4e958bd34c2a28dca7b9fc3e9ca018ffc6c54d0f24e3db40e86f0bfc5a232228288cce38350bf8140b98c74658d2616e2ef15b2a085a590711cf975982e1

          • C:\Users\Admin\AppData\Roaming\Chagos

            Filesize

            77B

            MD5

            a1593e9a0d43137ed13bc8019793ba78

            SHA1

            5f84bbc68a7eb289c2a8bb28ac3cb1d99368dec3

            SHA256

            a7be0b24e37b0c550a6ab178184064039d200f483f4272fed94c327bd54cd00c

            SHA512

            723f6ffc3972b8c5f349dd54d8368b157198faafbc9e04318488c277039dc4a9fb337839e39623f55900c4f8de342a07d9a346545658906e90c863302f1cdee3

          • C:\Users\Admin\AppData\Roaming\Chuuk

            Filesize

            65B

            MD5

            1a0cd67849ba6838a932d4262ff46d74

            SHA1

            99788865aa999c0323499962d046d75e03328add

            SHA256

            3412ba05ce0600fc8ef25d34835c39a067c1512c8895956e87d3c396360044f1

            SHA512

            b1f431c3e24b585c0c3e7487b4fb1505dadcc27a3c8e02987fc78146f5722977a7e6593422f9ee93f2b6befe9262378dbff47451e74198068ec4ff9e43dbf4c6

          • C:\Users\Admin\AppData\Roaming\Creston

            Filesize

            73B

            MD5

            5f63c2c6386a437d45f29cbefb77e5a8

            SHA1

            3d36822bf661b3bfbf4b109795240d656fdde839

            SHA256

            56397e82ad82822d7f90bcbaf470cf740ff525ee7a67058d61296c54ea130c40

            SHA512

            c5b71737bb7ab5fb9aad49bd9da91fa397a2f7ff7e3f8b977a27a34f1313f169fa9689bd2e2e9c7eacc4c69cda460a7f153f6cda91ada00d2bada20e9e86c8f6

          • C:\Users\Admin\AppData\Roaming\Dawson

            Filesize

            1KB

            MD5

            0b8717be9826ff70ed75c74131f1a776

            SHA1

            471eb762c3dafc031ac6a790c7e9201a4f644d60

            SHA256

            0759787339284a189592ad2a6b8aea00b7c3cf37354ffea6bd9979348d14387b

            SHA512

            710ebe69e5fef8e57903b588ec453daf6507072f2b539e14c7eb284de96092b573cd2d9e4701ed4cf9773ad6bea77de5fa26cd402d74f54f0ce6733924e4f4f7

          • C:\Users\Admin\AppData\Roaming\Dawson_Creek

            Filesize

            509B

            MD5

            e48f88be96ebc26dbb0ffcc604997483

            SHA1

            99f857985e9eeb3e78b1d07ecf93701349a1772a

            SHA256

            71b97cc87cc10a413bd1ad45e5c131d99acd5053d7a326bbbc8e041b0b1c4926

            SHA512

            86221e10d4626779cda787e3b83e4d5f042660b6e5ea31f43c448fc831b0c6a26ea749699bb9676362984c6e798df1e6bd4a45b6897599e5e17d0efda8949ced

          • C:\Users\Admin\AppData\Roaming\GIF 32 No Dither.irs

            Filesize

            1KB

            MD5

            b37db354d10a73ba88288164bb13182c

            SHA1

            3649f45a56cf71a0cb551315372546700cd96a0d

            SHA256

            9840c3e72436433614eab701e18e61f0ce0ab924a9491629463c949186dace4b

            SHA512

            8afe3071ba61ed20c2034c7501d8953a5a7d313bf4acc1a69f50f369296ad4e34df895c039eadf97afd543b4c4dc27e2d0532705121158ceb2a186725ba76bca

          • C:\Users\Admin\AppData\Roaming\GMT+3

            Filesize

            27B

            MD5

            834630bcae89f566789c6e3abb9cde0a

            SHA1

            1937e7784e79fd9a6adbc2b4a227a6bf9455dc86

            SHA256

            5d9e7b18a4cf92f1d47164f438ed6515657d4ff8f3d2c8bb5a1f7b605d79cd61

            SHA512

            835b29bd2acb63abd813ded66df8f9d895c83cce8e38cec1f21c266a6d6992965efb6fbec8e87bb74f24e3321588ac94d16be5fe0eacdf9dc80e6ca26dbf0061

          • C:\Users\Admin\AppData\Roaming\Hydrophyte.M

            Filesize

            4KB

            MD5

            d1d39acfafe6f1ddcc384a8ba0783cc1

            SHA1

            6f3c7e7ea8e5bee766a96eec9d01ae4befb7c397

            SHA256

            17dd35b38be655f27270cf4d7f435d1234f829d7b9cedb3b8bf6cd695462de1d

            SHA512

            db4fd5c9b31cdf01f4625240d017a0a365645ec24b014e42160dee14bbe4b1c65d9cc99b424ea41e5d44aa60c825beaec51dfa70b5408515b0baaa4a5bb92973

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\RMActivate_ssp.lnk

            Filesize

            1KB

            MD5

            2988ddc1c502680d5ad875c6a8b4ee2e

            SHA1

            f7a81548aa967fa1dadf206743957f69824cdd3a

            SHA256

            b5cb87938d5bc4b8c1a5c180b564935aadd37ee3527b702f1bc1a6cf207a1e9c

            SHA512

            12a110e5aa64c3abaf469c9db1edf3f2772f522d1728e760438507a75a4b8f4b731ff0b308d4c5c5b3a7251e1125de7e353508d2a991470245cb70a86d3d06b9

          • C:\Users\Admin\AppData\Roaming\ade.extensions.xml

            Filesize

            1KB

            MD5

            38727b1f8ac211fe5ecea748c5945e2b

            SHA1

            7f3a0bb1997c8f6409270bf6ac6240c2b341327a

            SHA256

            caaf6e3e0b865203fe5391f9892f60530f5ea675b57c1d78db94aff9c0fa6b0d

            SHA512

            395458ffcd004f4bdb91d8260a05a3b33df029b1df8cc0db91deb30b87fcd2055cc6b2c70f38ef337f1faf5fea3d8392dd5a01970ab9341ac58d00be6843d586

          • C:\Users\Admin\AppData\Roaming\administration.config

            Filesize

            4KB

            MD5

            ea8786a9e8c53d4136b57da721d3a530

            SHA1

            ee83b68c4c9f40b3d3eb4a04f61d9952d7513a0e

            SHA256

            85835a7c2f33dd24fd15d48f288ef0a8e07745611a08bfe6dcb9b8f547321f2c

            SHA512

            b7e4095ed87a7dd922a6a5afbb02acd7e4761c03645819a6c8690b56296f8839db2e355a1bb83d243a42fad4e5400a6f873f8d6caf9a1eee9c6fd86951511016

          • C:\Users\Admin\AppData\Roaming\alien.jpg

            Filesize

            1KB

            MD5

            4190e588c160ac5b36f115af7444523f

            SHA1

            f688118564de21f505c00d6aa7a4d33d8f6c748c

            SHA256

            08ee68e1658706664de60264f8d5ed5e589a47fa98c6f672ec221be7a22edb58

            SHA512

            a99cdf25224abb8002f1fb9b649d608d54003fe2570fda5c3139291839fe0f9f4f57043e81face78f66d26bdc84534604c9255d4c8de1f23e3f8c8b51ccf008d

          • C:\Users\Admin\AppData\Roaming\align2.fo.pdf

            Filesize

            4KB

            MD5

            6c72db1b45988d2ab3ec789f26965c0f

            SHA1

            2aa66e42673f62528ceca11b87b33f442b2efe51

            SHA256

            559e9975be454facd6b59812348eb410d46243f844316b8d4b28b1ede450fdbd

            SHA512

            e6913cb2b991e92617b142b78191b2447e326bf3c29372e38b6bde650f273af3cf3626e431831729a7d51ee7582bb6f9b7ef1dc0460b543293ed91c54a9cc7f6

          • C:\Users\Admin\AppData\Roaming\archive_inactive_unhovered.png

            Filesize

            2KB

            MD5

            2706a9691f646f678220600f5a3da66d

            SHA1

            18aca6b122fb4eeb132ff80378a3ebc5c7e76acb

            SHA256

            5709aef07360ffe1cc827e1f77d0c23d5eb97d5f328ac8293911aa888dcf4ba0

            SHA512

            8263f29d2dc33e2060c8c4b5ca34abff26a3c79c08e019f9b3eb3d8cc6504f26786a65ea20ae968ae5f42dda9c6a446a4394ca0886003c50bfc068b9009609b6

          • C:\Users\Admin\AppData\Roaming\arrow_down.png

            Filesize

            2KB

            MD5

            2f52e36cf52975276c291c58097de746

            SHA1

            cb53160cb419c7b8b2c5476c239d7c225dc70d13

            SHA256

            fbea1df97ded8b7e80be42913632daf93c053ac27b2ead40e3fb2b05fb68c270

            SHA512

            43bf11ebef9418d53b8b8d5e91a92bb0bb4fde7e873eb17b0377ebad4680ebdde39493caceafb4a1b0405241ca2243de01347b006038ab05c321edb91a565bf1

          • C:\Users\Admin\AppData\Roaming\atstamp.xsl

            Filesize

            2KB

            MD5

            ee1ea399056a74f3e90996b198b23533

            SHA1

            1bf06bc18cd19e769a23fb1c7dde3ac82d1dc05e

            SHA256

            0d5620c426c14276135373978f381b53dc5d0fd0b9c3ec0d07e597eb53f8c3ae

            SHA512

            497222110bb4698ef6034b166577c53c9c06b48c26bcbe2dfcb97299fee0aed7268e3733c171a019ddafe92cbea10795cf3ae2995bfed94e2127a9e83c09a0e4

          • C:\Users\Admin\AppData\Roaming\buildMenu.jsx

            Filesize

            1KB

            MD5

            ec19d87bf31be0f9022d069803f67073

            SHA1

            fd8fbc60713955a4a895904da7970f13f815acd7

            SHA256

            e7b4fea1f0f74e66664301e1a34e4a6017fcb04aa6d249a38b901f8dd8fb3732

            SHA512

            df5bc4aefaa26ef5d47d2902c494242d1167cdbbb34e661894af0ca0b76192e00c27bdeb7d2d5dab01b3452e109c11824ae8715a0c5113dbef124829e9574b3d

          • C:\Users\Admin\AppData\Roaming\dut1995phon.env

            Filesize

            2KB

            MD5

            d3fd7121b844308f5e0d98218b25f7a1

            SHA1

            57eda098a5ac50befbbaed81c9358542508d2025

            SHA256

            3f19660f2ffcb1b75ce092e05a9d02128025f89a378cfa302a3fe406c065139b

            SHA512

            0512e3887235754102c623ba704421c745f43d5300a8dd31cc79d1d70a537158dd5a2a25e8e0eab69dfd8cfa234a437ebfa89abafb5c31dcaf28f745a17feca5

          • C:\Users\Admin\AppData\Roaming\dynamic.toc.xml

            Filesize

            972B

            MD5

            ac8e0414bc16801e3e58d6029e47534b

            SHA1

            77001314a185248b7402a84cc6aa0b87073e9698

            SHA256

            8b4167909f78b9239adb70a5791808fb8ef85a94eb5f3594c423274297fa5b73

            SHA512

            286540b92a050f4c56f8e06115dd70a1aef480291584a82c8a868e5eaafdaece5808ead382a24e9817a25a1ac339cbee39f9cdf22efce3f2c997790456e00eef

          • C:\Users\Admin\AppData\Roaming\file_history.png

            Filesize

            4KB

            MD5

            57bfb2528a26d008681d0ccea8b393f1

            SHA1

            fae2882346b4e11f50ada12d3d4ce8cef9213a2c

            SHA256

            9837b4662b61ecb91ffa3556394f2df67a87a7afe03fdde237fd1bfc42de1ede

            SHA512

            c46949dd9272d0ae92d402ad9dbc9919f662c54123fb61718b92c3564b7188d61e69c9a11f71fe0d3033e809665944cc008b0a72fd853dcdf42045d1be422139

          • C:\Users\Admin\AppData\Roaming\frnphon.env

            Filesize

            3KB

            MD5

            b802b4cf189092a532bbbd9967a9e5d4

            SHA1

            89a6028b6f8e411a15c7485069a4e140581bf3f1

            SHA256

            6e84653150f3ce4f0ea92706dd21449fb8bda9ac23f6e57baada92b640c44c48

            SHA512

            5ee2e8da5aa21d13a4ae8b06925fbd433ba00ffe71e806d1f99d0decd78ba6950934dea82d9b446283cfdc53c19123858548fe7750a7dc976c6fb03e6c0b744f

          • C:\Users\Admin\AppData\Roaming\g1_1136 x 640 px 144 ppi.IMZ

            Filesize

            46B

            MD5

            af3bc9f93007146857ec5a55e32702c6

            SHA1

            42cc41386c2709a53b8ffa4552790e164e4db59f

            SHA256

            c552f73678b4e4d8a9c28600a4a3a3a611e2badc2c9f91ce23ba734e6f7a4858

            SHA512

            19f2908f53b74778ae8fbf2b25efb9a05871e114382601cc6092335eb9b0fa90da10cff4384bca946297f4334c26e421b176dbda7ba0c6fd0ff3e81851701fe7

          • C:\Users\Admin\AppData\Roaming\generate.id.attributes.xml

            Filesize

            2KB

            MD5

            9c9a95e738765fc608d7c4e76b2f35cb

            SHA1

            9dc240f7154d9aaf682906a987f141b3dd4be7e0

            SHA256

            3c33893b88336ee1a3b8371c05ce32b51010b5ec73f67af002d53ca66174534c

            SHA512

            aab54fde37e68017852729846f7fd77db36bd38ba20ad2991ae95c534fa85c518e1d837c308db87c88412877eb5742555f512053b537b16d032d291cc3cc01d1

          • C:\Users\Admin\AppData\Roaming\getDocumentInfo.jsx

            Filesize

            1KB

            MD5

            b9c8db5dd26818a63fb9e031739f8fab

            SHA1

            0237909e0b39d6826bada9b63a811925719ddf51

            SHA256

            98cf791cd08a24c5ca85b59be971caf7776af6d31ac812e3bb949a20f7332ef8

            SHA512

            c02cb2275c8e0dba6e997fd04405d84aaeb65a3ea3be89d2632cf0a979fe888fee8d85f0068b807b017b1a52eeadd2dba6dc8fec36f95ee3078d5a2c1a8a3fe6

          • C:\Users\Admin\AppData\Roaming\gray 423 bl very soft.ADO

            Filesize

            524B

            MD5

            8bcac734d9e8c2752796785aa44f5cc3

            SHA1

            b30a40b93536b9d89bb5eed3ff141af48dd1cc98

            SHA256

            b354357c228c1a5fe6689a59286d56665c1a85c4dd23df860539e868f0311b78

            SHA512

            a89d288e5e9ea1c9381f1bcf074c67611ddd8fe798cb54c6291110259e5d37a9fec993bf3c7acdf549ed8eb4b233f84493b0ddbb4e59e5f4c482923fc5495101

          • \Users\Admin\AppData\Local\Temp\nsd485.tmp\System.dll

            Filesize

            11KB

            MD5

            6f5257c0b8c0ef4d440f4f4fce85fb1b

            SHA1

            b6ac111dfb0d1fc75ad09c56bde7830232395785

            SHA256

            b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1

            SHA512

            a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8

          • \Users\Admin\AppData\Roaming\IP.dll

            Filesize

            28KB

            MD5

            2253b404214169a1825ee9d9a7bf6887

            SHA1

            cd3368fc8ae4a4e31e74a20d8af65da6f0afeeed

            SHA256

            a8acb6997a668157ec4a4ca08c4a95f6be32e84a5ab14484ea2d1e078ceadbab

            SHA512

            0ee2b98fc8973bf02d7f1e59743bc095bd5201c4eb2d22b87ff7ef550bb9189f191912ed8899bd6f552b35eb4e89c373462c7f5b52e4c129ecaaac7fef7fc091

          • \Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\RMActivate_ssp.exe

            Filesize

            203KB

            MD5

            3bb359fae8694fdd6a75614aabd1516d

            SHA1

            ada8813519de455b58f6bab4541073d65cc53eac

            SHA256

            06c1363d352171272258a27cd7fbea8f1fb6841f8e74185230885311b35acb55

            SHA512

            fe1a6f851e89487289d4284888070a8fd5b2477da2030f5bd8d3a8a66dfb7671785cb79913a4a60998717ed367a4d0487384256a0c1a27a709ea812b4406e75e

          • memory/960-288-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/960-287-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/960-280-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/960-204-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/960-202-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/960-200-0x0000000000510000-0x0000000000511000-memory.dmp

            Filesize

            4KB

          • memory/960-197-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/960-198-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2052-283-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2052-282-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2492-70-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2492-71-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2492-69-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2492-68-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2492-57-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2492-58-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2492-60-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2492-62-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2492-64-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2492-66-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2492-54-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2492-83-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB