Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 04:00

General

  • Target

    69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe

  • Size

    215KB

  • MD5

    69aa03bcd10948392b001bb9ae368a92

  • SHA1

    12741edebdd6accd7e309da808083a60113d8dad

  • SHA256

    021cdf3bf0bbd3e078cf45cbae784ac1056bfe8e7fc5ff8c5d446b9a45c0bb63

  • SHA512

    abf0752de3827af70f75ba5c74fa77b077659e55e4a3478cc2e8b8aedc945a61097b813649655ad2f76c40e982acba37832bc4820ad8d3e5a498e59dd3eeba9c

  • SSDEEP

    3072:myAaQqe90u5DdXJP45JXWpZ1iFTsQJwvfLrZAPSGg2HTnZKyOr25PqU4DMKgLhfo:myAge9RNOXAZ1iFTsF91A064D205kuL1

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #Cerber_Ransomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Ransomware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.xmfir0.win/709A-7000-33AB-006D-F31B | | 2. http://cerberhhyed5frqa.gkfit9.win/709A-7000-33AB-006D-F31B | | 3. http://cerberhhyed5frqa.305iot.win/709A-7000-33AB-006D-F31B | | 4. http://cerberhhyed5frqa.dkrti5.win/709A-7000-33AB-006D-F31B | | 5. http://cerberhhyed5frqa.cneo59.win/709A-7000-33AB-006D-F31B |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.xmfir0.win/709A-7000-33AB-006D-F31B); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.xmfir0.win/709A-7000-33AB-006D-F31B appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.xmfir0.win/709A-7000-33AB-006D-F31B); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/709A-7000-33AB-006D-F31B | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.xmfir0.win/709A-7000-33AB-006D-F31B

http://cerberhhyed5frqa.gkfit9.win/709A-7000-33AB-006D-F31B

http://cerberhhyed5frqa.305iot.win/709A-7000-33AB-006D-F31B

http://cerberhhyed5frqa.dkrti5.win/709A-7000-33AB-006D-F31B

http://cerberhhyed5frqa.cneo59.win/709A-7000-33AB-006D-F31B

http://cerberhhyed5frqa.onion/709A-7000-33AB-006D-F31B

Extracted

Path

C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber Ransomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #Cerber_Ransomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Ransomware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.xmfir0.win/709A-7000-33AB-006D-F31B" target="_blank">http://cerberhhyed5frqa.xmfir0.win/709A-7000-33AB-006D-F31B</a></li> <li><a href="http://cerberhhyed5frqa.gkfit9.win/709A-7000-33AB-006D-F31B" target="_blank">http://cerberhhyed5frqa.gkfit9.win/709A-7000-33AB-006D-F31B</a></li> <li><a href="http://cerberhhyed5frqa.305iot.win/709A-7000-33AB-006D-F31B" target="_blank">http://cerberhhyed5frqa.305iot.win/709A-7000-33AB-006D-F31B</a></li> <li><a href="http://cerberhhyed5frqa.dkrti5.win/709A-7000-33AB-006D-F31B" target="_blank">http://cerberhhyed5frqa.dkrti5.win/709A-7000-33AB-006D-F31B</a></li> <li><a href="http://cerberhhyed5frqa.cneo59.win/709A-7000-33AB-006D-F31B" target="_blank">http://cerberhhyed5frqa.cneo59.win/709A-7000-33AB-006D-F31B</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.xmfir0.win/709A-7000-33AB-006D-F31B" target="_blank">http://cerberhhyed5frqa.xmfir0.win/709A-7000-33AB-006D-F31B</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.xmfir0.win/709A-7000-33AB-006D-F31B" target="_blank">http://cerberhhyed5frqa.xmfir0.win/709A-7000-33AB-006D-F31B</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.xmfir0.win/709A-7000-33AB-006D-F31B" target="_blank">http://cerberhhyed5frqa.xmfir0.win/709A-7000-33AB-006D-F31B</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/709A-7000-33AB-006D-F31B</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Contacts a large (16388) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 59 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Loads dropped DLL
      • Adds Run key to start application
      • Modifies Control Panel
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\dnscacheugc.exe
        "C:\Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\dnscacheugc.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2968
        • C:\Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\dnscacheugc.exe
          "C:\Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\dnscacheugc.exe"
          4⤵
          • Adds policy Run key to start application
          • Drops startup file
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Sets desktop wallpaper using registry
          • Modifies Control Panel
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2216
          • C:\Windows\system32\vssadmin.exe
            "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
            5⤵
            • Interacts with shadow copies
            PID:764
          • C:\Windows\system32\wbem\wmic.exe
            "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:984
          • C:\Windows\System32\bcdedit.exe
            "C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:1504
          • C:\Windows\System32\bcdedit.exe
            "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:2396
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:876
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1816
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:537601 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1036
          • C:\Windows\system32\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
            5⤵
              PID:2748
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
              5⤵
                PID:324
              • C:\Windows\system32\cmd.exe
                /d /c taskkill /t /f /im "dnscacheugc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\dnscacheugc.exe" > NUL
                5⤵
                  PID:2844
                  • C:\Windows\system32\taskkill.exe
                    taskkill /t /f /im "dnscacheugc.exe"
                    6⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1652
                  • C:\Windows\system32\PING.EXE
                    ping -n 1 127.0.0.1
                    6⤵
                    • Runs ping.exe
                    PID:2728
            • C:\Windows\SysWOW64\cmd.exe
              /d /c taskkill /t /f /im "69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe" > NUL
              3⤵
              • Deletes itself
              • Suspicious use of WriteProcessMemory
              PID:2444
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /t /f /im "69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe"
                4⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3004
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 1 127.0.0.1
                4⤵
                • Runs ping.exe
                PID:2704
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2464
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:2512
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1628
        • C:\Windows\SysWOW64\DllHost.exe
          C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
          1⤵
            PID:212

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

            Filesize

            12KB

            MD5

            f7a727a0b937a23695b164fc55cdd755

            SHA1

            399542554fde6614d28c2ffa099ca08ab12e6eb8

            SHA256

            f7fa9a1e1ad15976c0a7f44d90d4c8c99d094fe2d737a187084c08900736b43f

            SHA512

            602739f08930367f256ab31aa7d632bb5bd3c86e6a62b472a82814d0bd9723d02a66895032ab7898b4780fc028e7db2296208b6e8abe94c7f8950beabc46dd21

          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

            Filesize

            10KB

            MD5

            ec672aa9bc14447c4c2d014157c132d7

            SHA1

            0b8395a921ae5ae6a2c371a6d0a30519b84b5f58

            SHA256

            ad54e434944a3210c7a899ccae8f514aacad4d7ee529901f3dc2385c57ae8483

            SHA512

            763abcdcc9da7a2671d36d22c94b06e05eefd1c4673279f7683e9b43f7ae818f2a593d10fb3fe8f0a178a4bfc9d0a6744a427b044b3e27c22a32a6c803306532

          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.url

            Filesize

            85B

            MD5

            4d3fe293ee697032f980f6ee9824719c

            SHA1

            a66511eb6908b95bba4daa25ab9fae4b6f95ed3e

            SHA256

            7db89159cbfce125c435b35575f106a7088e47ccd9ac2ff8e74b52a5a8a906e6

            SHA512

            71f998307752ec93caba490360b09decd876ab25b1c08d8ef74fba91455ef634d6635575bb446f2306165cc6c6f8f9b51a1b27e5bae1180adac3004adc634acc

          • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.vbs

            Filesize

            225B

            MD5

            f6d629f2a4c0815f005230185bd892fe

            SHA1

            1572070cf8773883a6fd5f5d1eb51ec724bbf708

            SHA256

            ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f

            SHA512

            b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            68KB

            MD5

            29f65ba8e88c063813cc50a4ea544e93

            SHA1

            05a7040d5c127e68c25d81cc51271ffb8bef3568

            SHA256

            1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

            SHA512

            e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{394A4DD1-18B9-11EF-93CC-729E5AF85804}.dat

            Filesize

            5KB

            MD5

            ab8444bc13ff593367bb410aea39e0c8

            SHA1

            59103eeacc928db53a97c4c5060a40e018cfce2a

            SHA256

            c49a848e67b1a9081b716b86bf2acf18cee82cd51e81825e0033ba02a176ab43

            SHA512

            a738c8c5dcce16a7f17fd40ecae2cc24bfd22bdd900be37355c1588c74afc0144d99f6d8ff5765adc232ce4d38ecf44c7795129ef257c5e6e4832f77296a4755

          • C:\Users\Admin\AppData\Local\Temp\TarB746.tmp

            Filesize

            177KB

            MD5

            435a9ac180383f9fa094131b173a2f7b

            SHA1

            76944ea657a9db94f9a4bef38f88c46ed4166983

            SHA256

            67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

            SHA512

            1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

          • C:\Users\Admin\AppData\Roaming\404-8.htm

            Filesize

            1KB

            MD5

            dc10893b02f9b0bd2be338d82a98ef21

            SHA1

            f5b071ffa7894a1b2a9a3a35e1bcdc784c5ad921

            SHA256

            de9f9eda5d26dece0b8de402cda59982710b58a7856286fd90562b101a2e84d9

            SHA512

            c7e935d9092e8a893790870790ec464f90e6c5ae134c58d9f7244e5b520af03d785a70a6fcb351e366d0eea89871ecf88adc4667a7ab79c90050cf4e9ac106c4

          • C:\Users\Admin\AppData\Roaming\Adobe-CNS1-3

            Filesize

            4KB

            MD5

            02fc9c141c7fe565396ee5479e0206e4

            SHA1

            94f8be8f0a8f5245155686c37a78b83ba51d6984

            SHA256

            dd0a8f1fe12bdab4387ac528e12244ee68bb6d098548e31e84343e8660b9ba2d

            SHA512

            0ca311a23f55ba2c4eefedf7a2280257113ed77c3dd7a7d6c4d04c4e1a51de6c3596c4cc8bce413f3799e3f279ae31b402ca26de24584fa97060e0a6fa24a307

          • C:\Users\Admin\AppData\Roaming\Banjul

            Filesize

            77B

            MD5

            d8bf90c6c458e81d3fb17371cc1ab80e

            SHA1

            39843cd866b512e8dd4764c299068f025d2b96ff

            SHA256

            18eba9d5e645204556fd02348e43728a82ab429ee4580fea323475d4ed021b19

            SHA512

            1d688c68157b370ebdc3dfbdec6a11e38084b2df2f27fd706053a35ce466d841d7091ba7fe3d6cdedcf6222105ebfda225ac216d056e35086af173a1531f848d

          • C:\Users\Admin\AppData\Roaming\Cambridge_Bay

            Filesize

            1KB

            MD5

            89de3d027493b9dbe3298a06fef9a89d

            SHA1

            3d8ac130c5dab1becabb0a17cae55c9aa42e50cd

            SHA256

            4d1380365eaceb6082c783f733af0ec9fd99e947c1c08c84fa6ff1d370b551ea

            SHA512

            d7699a070cc465d5d960bd3d712fe72f68b24bd6e6bca6e67b5a17fa9581bb0cb02d10bfca2c32949ef86c3156c08e8bacdb33f1bcf4b5b188f149fc52870829

          • C:\Users\Admin\AppData\Roaming\Chagos

            Filesize

            77B

            MD5

            a1593e9a0d43137ed13bc8019793ba78

            SHA1

            5f84bbc68a7eb289c2a8bb28ac3cb1d99368dec3

            SHA256

            a7be0b24e37b0c550a6ab178184064039d200f483f4272fed94c327bd54cd00c

            SHA512

            723f6ffc3972b8c5f349dd54d8368b157198faafbc9e04318488c277039dc4a9fb337839e39623f55900c4f8de342a07d9a346545658906e90c863302f1cdee3

          • C:\Users\Admin\AppData\Roaming\Cuiaba

            Filesize

            1KB

            MD5

            b4b79c9010a449efd53a82bdb8437628

            SHA1

            29aade81c299a3d802a39082fbc14d9bfe2ce0bb

            SHA256

            a9cb5ed1461c5fcc8f9330d6d14a93f72e3265fa39f61e3e1e160881b17b2331

            SHA512

            2937f907a2bf30a62c9451ec5524de88540a928e6bd87176eb7d815cbf87e830d49437c3356cfb54b6feae22a62a2874962b81b39f5b014cdf0dbdcb49e1f33b

          • C:\Users\Admin\AppData\Roaming\Ext-RKSJ-V

            Filesize

            3KB

            MD5

            5f801547f79019d60fc68319b1f049b4

            SHA1

            4d525d254adbe2187b4543c5c92d5c01a61885cc

            SHA256

            90e9fc4efe897e08e4a6182c4a077e3303ca0c132ac2199ce1a5473ba91b3205

            SHA512

            f49a801bb62c22f95d4e52ee74fdd1dab2020839c5c10c21afbd0a9b9f1a7b6e34ba026ea5b9f504f60af3feb1e2a6c5cdfa2d926addd4b65ffdd01708f3b6d2

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\dnscacheugc.lnk

            Filesize

            1KB

            MD5

            d9dbc7c4f101060a91f946ac67e90016

            SHA1

            973cdf0f1e453352e0b92ea36eef6b11ebf0a873

            SHA256

            56bd3fa9f17fabbc0f50cc745a56a56bf5c8228267b012f9cdbe60f5202175f9

            SHA512

            bb5b57a4199a3e62900737d1f2ed83ea750bd0a953c293f46a44648aa479aec43a441163aba7eb52b1c92a3c4b7b49f1d9802756739673e368c30fe76fb6a9ca

          • C:\Users\Admin\AppData\Roaming\Oxidase.guE

            Filesize

            123KB

            MD5

            c337e3929a8857455ab4c910ced96e11

            SHA1

            f308027fe3786f197908e9df3f947b351ee8d147

            SHA256

            4a0d1df4e5bb396c09e59ad6d8ae83c5d39bf8cb2468a3125725812d22395290

            SHA512

            5b8eeb64016ad880a7a21d6392b393cf795d56d0bcd241d3bc95074c2c677c4845d73c96e3ac8dc01d27d66dee76cc47fc58c916d24838cb4017fd19dd6c21e7

          • C:\Users\Admin\AppData\Roaming\StripSelfworth.j

            Filesize

            1KB

            MD5

            63177602d55dc84d6cd0a2a57bd23188

            SHA1

            d51c49344136ac7fbc511bb47b686dcde30de989

            SHA256

            9d542f61355d3acda4e6c77d252b8a5285a6abbd00bf85ee1390cad66c9275e5

            SHA512

            1ab99e824c1e5b7a53eb216cba9734e633386ad9327769286067f637678d8269ab47c1a16acefab0cedcaaa644a0cfe4dc8e6e8c5223f43a55a6cbf41f09d572

          • C:\Users\Admin\AppData\Roaming\body.end.indent.xml

            Filesize

            1KB

            MD5

            330ffc5404bdbe94937baa28f35821fa

            SHA1

            a4eefb61e6f46f9ec2d4a25ce46e597b819f53b0

            SHA256

            2a0841616f61e28ffc46b38e515c24747553f0470d13a64c28e8aea0c32083dd

            SHA512

            c2760924c66779bc23ae9503058263ce7b4f7f8d56c6ba19d047637e291e985aef4eea9acbe3d66f8ee71e4aecf24bd4aa290c166893c0359f3aa73143a6a080

          • C:\Users\Admin\AppData\Roaming\body.end.indent.xml

            Filesize

            1KB

            MD5

            96fbf408fb9c1a281ae2c5179c66be7d

            SHA1

            a7b0afef1255652d44c1245172a672b2ed38f3e6

            SHA256

            2fd2206f1e7db86d4bc0e25982b12ac3a769c261b2791802c544201a9dc73666

            SHA512

            c34ef857b057181bf8cf5184d22716140eafaf18d74d61018e42171a0572d0a0c2b7cf5d7085c5eeede42336fc481772008567a7a36ad56044ea135228d855fa

          • C:\Users\Admin\AppData\Roaming\btn-next-static.png

            Filesize

            3KB

            MD5

            45686f506c292836a118fc4a7a2e96bd

            SHA1

            2a9b4b94e850e4e5334ea79d3892447ad3d63790

            SHA256

            0f47ae5fa16979035ab375db5952026b29505bada59ddbf311660fb6ddb36f5b

            SHA512

            3b02dd1159fd50e88e98e2b50cbdfb932af75e287c8bc9e1511b32c46134df7c678c09fe3086ca02aa962ea75189fb52546ac74cc5cd9880900a74a6338fa07a

          • C:\Users\Admin\AppData\Roaming\btn-next-static.png

            Filesize

            3KB

            MD5

            20418349e7f8244ea53bc174b2ff9576

            SHA1

            edb9087b6d85247ea0cad0060f540b0f890a80e1

            SHA256

            35d36d6619e249e8bf4838098fd1770c78617e3019162aaca092f8fa37c82dcb

            SHA512

            b12946ca17bb23403e106d561ae42d15695efde73eb4efb4099b57824c7ba0d2e331850022405f1d5da9502b568a217c06f259600cbbacc0d1c2b7210b31081f

          • C:\Users\Admin\AppData\Roaming\communications.png

            Filesize

            5KB

            MD5

            fc9a7e0e7cfdb849ba8b5f557b0ff943

            SHA1

            a3fdebbbb337f7e030ff7b52b28c0318fc7554d4

            SHA256

            11095b8817f916b16620f3047f549106a266e90d2478cbfad43f4c78b9c6c728

            SHA512

            e4835065505a2e8688ae02ce1c29655e09c47b50042f7e7c688c2223c3038f3a77d67e2e7540219ba47af7aaf8639b2921a7b71c633e9c4cb830d001568d6ac8

          • C:\Users\Admin\AppData\Roaming\communications.png

            Filesize

            4KB

            MD5

            db4452b6491adb8f5dd4a318bec9f901

            SHA1

            d0854e442a158da86b7a4113c3e765d435e02066

            SHA256

            f4b792c5a07fc27ca2e675971d7bc2e6aaa9a28951995725e19cc0214c469a52

            SHA512

            6442f88490703393598e50db5ee0697e69e5c623b48b87a052c603ca60fb0ae201b5e3cc2aeb32dc1ad6211fb4cffe7d069120325974f673d5783dc126593b2f

          • C:\Users\Admin\AppData\Roaming\computer_diagnostics_2.png

            Filesize

            1KB

            MD5

            a7658e0175b113a4035f73895280290f

            SHA1

            fba3b0c6343246d47cdd1208a26f7b919726e73c

            SHA256

            6188b744520f680b71995c26c805c8f0a4890ba4fee0cf9dfd5fe9c548f73b67

            SHA512

            acf0683711d80ee42ed7ec59b129fe33f87db4a22dd6e25f6cae1a7521736e2dec12f6cb6cb28fda154393fd15a953be39523987915d7f7d4fde74799b3cd567

          • C:\Users\Admin\AppData\Roaming\computer_diagnostics_2.png

            Filesize

            1KB

            MD5

            671026e8f81a523575b346275f619ea7

            SHA1

            974512f4dbd74248120922478d01ffba73ce44ea

            SHA256

            ff9bd1b23341b5ef229ce7b706842db6b2f6691fc5f7df31ba49b13e0c26d3d7

            SHA512

            bc8a89eff659242a8af09003c99bf1f469123e35612cf48215dae1f53680bad4f438764d230c6f2c9f3da21831706fa82f1b6843edb52b2cbc0fc25801b93eef

          • C:\Users\Admin\AppData\Roaming\draft.mode.xml

            Filesize

            1KB

            MD5

            407e10907de3026ffa0e7115d0d2af1c

            SHA1

            3ec677a09e7944ee1a178c4b3b916b6ceaa5bf1e

            SHA256

            10c010a50565ff237ff94c416bd350467e55a42869fd0309c1dcfb988d0dfb7f

            SHA512

            dcada8896812c78346d3e521ae7d76716a1670b6b3293f925feec76475256c9a5145acef926179a93621610fb6659ddd607b3ce3e90611d24e237fbb37614c23

          • C:\Users\Admin\AppData\Roaming\draft.mode.xml

            Filesize

            1KB

            MD5

            94fda49e032aaee5149670d9595419fa

            SHA1

            62c2f1d3f71ba95fd9f5c4297ddf66d5e995a5f5

            SHA256

            3c13443ae7fdf9322db48c3ca147d61301ce574b0c706f5369332f09d4f8dcb5

            SHA512

            1ff03cf386edffa4dc01ab8c9554b08a4ee89ddf06ee32f6b6529a1ed3f4d32b0ed29185a7d07147777ab6070df66a7a77057f875e49390289c9b01d5e3e352d

          • C:\Users\Admin\AppData\Roaming\error_1.png

            Filesize

            4KB

            MD5

            a5f29347cd57197f9125353ebe79205e

            SHA1

            b59c918c18750d03074bb3db458fc666ad1d2ac8

            SHA256

            c5456a32ca91ef217bcb5d8952d8f4dbbf90c50d60c4c577da08d84fb32a1b4e

            SHA512

            0e50f21c81b4a0317b4cb87c2d8b3570da1b1c69dea78098ad86cb70c3187c908ceaa822b30fca948ac7cf7c9c52ef9c4717542763fefe69640b0db46436cf3e

          • C:\Users\Admin\AppData\Roaming\error_1.png

            Filesize

            3KB

            MD5

            6f42ca6b4105204fcd946cc2ae17d9a1

            SHA1

            7d4a234e40ef4564943ece66d46d9e1417586887

            SHA256

            7d4b3a73836005095e230d6d34297baa68f816b71cc6b78ced7a6f60b46c829c

            SHA512

            724726aa1b898646522140872210fb4766d5c9998eed3192f112313081377e68077536f6589d98f3300909592584bf3b65820da253feea8eeb558153900cf97a

          • C:\Users\Admin\AppData\Roaming\eulaver.xml

            Filesize

            2KB

            MD5

            b8403bed485ab2bf409901580574bae2

            SHA1

            f1b17751d3f08b77ed8f0b1528ebefdc72081626

            SHA256

            bc2165aecccaa1d0ec5cb14f147a19d265d944f10ca7c69b9c61709a63c5b866

            SHA512

            2a0d9054f9ed885884122042ba065c84b833b12bdf0997ea5e8f1c1b16d422de36bde24d15910eb0a54513c31995bdeb1a8ab5ebbe479efb27e1070e72168aa8

          • C:\Users\Admin\AppData\Roaming\f32.png

            Filesize

            1KB

            MD5

            bfa80b81d42af62446bff4ffdd52b09f

            SHA1

            03abf1f02aa1560b4d3823403651ed9d1645e4f4

            SHA256

            788174400b1406f5fc1f4a0fa458efec8e8ac8c37a7b03067cb21c14a381e92a

            SHA512

            910b09c96c2cdc15c78db94d8cf3a5a0df63c78275dbddd26e4a0df0bfdec0acc8f4506824275ed75a6450c617dea3c197f49b5ce8b0836acb113790fc90d249

          • C:\Users\Admin\AppData\Roaming\f32.png

            Filesize

            1KB

            MD5

            193e264b1fe2fdfc15045e201ddf04a0

            SHA1

            999ccc70d4c4c45c808271b751cd1dfacce9be03

            SHA256

            ac2c14478f5cc431f4f9e57b8b8469db26cd7b94bbcbb886c6965bcec587bebf

            SHA512

            00f2b20621ca0cf73434b7693891f77167aa658818572f046b0929e2f3cfc00ad653d3edb435a498e42ad71aa26d5fc634d61f4e9f0a1a31c8386a43d06f52a5

          • C:\Users\Admin\AppData\Roaming\feed-icon-14x14.png

            Filesize

            1KB

            MD5

            a5631e68e150cdae1d84a8deb169e553

            SHA1

            c3b5ee1957cb364ab9388048520363c65bf12c4a

            SHA256

            5e4b50b84279dc09ef2775df9373bf061492f302c7ce981b2987980cf87ddb11

            SHA512

            af78a68399824f5abc1499d465c96e780f287719c159a81820a6df004de383db13518a0b95b6416ca445cbf082a45dc6eab92de8c1e8f95c7c6754ca53a97c6a

          • C:\Users\Admin\AppData\Roaming\feed-icon-14x14.png

            Filesize

            689B

            MD5

            2168a573d0d45bd2f9a89b8236453d61

            SHA1

            30733f525b9d191ac4720041a49fc2d17f4c99a1

            SHA256

            8ee173565b2e771fecf3b471a79bdf072aaa1bd9dc27582cfda2b2a322beeba8

            SHA512

            1263589e12f587143ec1dd8ac87293a041f7d77439fcf91503e62be02e36d13e28560342deed86cf800c7bc01cd31837004d1ebe7ae53c670340040c68eb0e22

          • C:\Users\Admin\AppData\Roaming\getBlank.js

            Filesize

            1KB

            MD5

            7fa0203427f8c830ee89e253aba6a774

            SHA1

            6d29176a6adb5a1984c5a0306b9eba1521e6ae2d

            SHA256

            3be925ddc71466effd0796939f0963f3e6ad0ceb110a39c2ac6e7ec0a9e6e298

            SHA512

            2d1d13de10408a05986862e5975f0563554facc6e2c2cec4f0b97b965236b6f8b38b6d1c30c77d972d5b058f7fe8b49c8d6f60a6dc317035dd134901c41bd509

          • \Users\Admin\AppData\Local\Temp\nso1A66.tmp\System.dll

            Filesize

            11KB

            MD5

            6f5257c0b8c0ef4d440f4f4fce85fb1b

            SHA1

            b6ac111dfb0d1fc75ad09c56bde7830232395785

            SHA256

            b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1

            SHA512

            a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8

          • \Users\Admin\AppData\Roaming\Arrays.dll

            Filesize

            59KB

            MD5

            4553e7c51216f3bc007ab83680479041

            SHA1

            2832749a0c8d40c1eaae54d132c8bc4fa52d567f

            SHA256

            664c3ca4053df5a50f464fb196d8e68d2d9244c6687a26210b9db2addaa065c3

            SHA512

            235fee1f317915c22d836a593da2f5ccc1d0ece70023c45526439d6c221faae8618545909b480f17d5923ae82b0fd44962f319ac2fac794df7df6773ef4e5bde

          • \Users\Admin\AppData\Roaming\{04E11A53-556B-582E-C494-323BC9541A7E}\dnscacheugc.exe

            Filesize

            215KB

            MD5

            69aa03bcd10948392b001bb9ae368a92

            SHA1

            12741edebdd6accd7e309da808083a60113d8dad

            SHA256

            021cdf3bf0bbd3e078cf45cbae784ac1056bfe8e7fc5ff8c5d446b9a45c0bb63

            SHA512

            abf0752de3827af70f75ba5c74fa77b077659e55e4a3478cc2e8b8aedc945a61097b813649655ad2f76c40e982acba37832bc4820ad8d3e5a498e59dd3eeba9c

          • memory/1632-26-0x00000000003B0000-0x00000000003C6000-memory.dmp

            Filesize

            88KB

          • memory/1632-41-0x00000000003B0000-0x00000000003C6000-memory.dmp

            Filesize

            88KB

          • memory/1632-42-0x00000000003B0000-0x00000000003C6000-memory.dmp

            Filesize

            88KB

          • memory/2216-123-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2216-125-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2216-128-0x0000000003180000-0x0000000003181000-memory.dmp

            Filesize

            4KB

          • memory/2216-130-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2216-132-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2216-134-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2216-137-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2216-138-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2620-46-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2620-64-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2620-44-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2620-38-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2620-30-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2620-32-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2620-35-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2620-36-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2620-40-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2620-28-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2968-106-0x0000000001E50000-0x0000000001E66000-memory.dmp

            Filesize

            88KB

          • memory/2968-120-0x0000000001E50000-0x0000000001E66000-memory.dmp

            Filesize

            88KB

          • memory/2968-122-0x0000000001E50000-0x0000000001E66000-memory.dmp

            Filesize

            88KB