Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 04:00

General

  • Target

    69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe

  • Size

    215KB

  • MD5

    69aa03bcd10948392b001bb9ae368a92

  • SHA1

    12741edebdd6accd7e309da808083a60113d8dad

  • SHA256

    021cdf3bf0bbd3e078cf45cbae784ac1056bfe8e7fc5ff8c5d446b9a45c0bb63

  • SHA512

    abf0752de3827af70f75ba5c74fa77b077659e55e4a3478cc2e8b8aedc945a61097b813649655ad2f76c40e982acba37832bc4820ad8d3e5a498e59dd3eeba9c

  • SSDEEP

    3072:myAaQqe90u5DdXJP45JXWpZ1iFTsQJwvfLrZAPSGg2HTnZKyOr25PqU4DMKgLhfo:myAge9RNOXAZ1iFTsF91A064D205kuL1

Malware Config

Extracted

Path

C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #Cerber_Ransomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Ransomware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.xmfir0.win/98A8-F5A9-6AEF-006D-FE85 | | 2. http://cerberhhyed5frqa.gkfit9.win/98A8-F5A9-6AEF-006D-FE85 | | 3. http://cerberhhyed5frqa.305iot.win/98A8-F5A9-6AEF-006D-FE85 | | 4. http://cerberhhyed5frqa.dkrti5.win/98A8-F5A9-6AEF-006D-FE85 | | 5. http://cerberhhyed5frqa.cneo59.win/98A8-F5A9-6AEF-006D-FE85 |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.xmfir0.win/98A8-F5A9-6AEF-006D-FE85); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.xmfir0.win/98A8-F5A9-6AEF-006D-FE85 appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.xmfir0.win/98A8-F5A9-6AEF-006D-FE85); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/98A8-F5A9-6AEF-006D-FE85 | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.xmfir0.win/98A8-F5A9-6AEF-006D-FE85

http://cerberhhyed5frqa.gkfit9.win/98A8-F5A9-6AEF-006D-FE85

http://cerberhhyed5frqa.305iot.win/98A8-F5A9-6AEF-006D-FE85

http://cerberhhyed5frqa.dkrti5.win/98A8-F5A9-6AEF-006D-FE85

http://cerberhhyed5frqa.cneo59.win/98A8-F5A9-6AEF-006D-FE85

http://cerberhhyed5frqa.onion/98A8-F5A9-6AEF-006D-FE85

Extracted

Path

C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber Ransomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #Cerber_Ransomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Ransomware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.xmfir0.win/98A8-F5A9-6AEF-006D-FE85" target="_blank">http://cerberhhyed5frqa.xmfir0.win/98A8-F5A9-6AEF-006D-FE85</a></li> <li><a href="http://cerberhhyed5frqa.gkfit9.win/98A8-F5A9-6AEF-006D-FE85" target="_blank">http://cerberhhyed5frqa.gkfit9.win/98A8-F5A9-6AEF-006D-FE85</a></li> <li><a href="http://cerberhhyed5frqa.305iot.win/98A8-F5A9-6AEF-006D-FE85" target="_blank">http://cerberhhyed5frqa.305iot.win/98A8-F5A9-6AEF-006D-FE85</a></li> <li><a href="http://cerberhhyed5frqa.dkrti5.win/98A8-F5A9-6AEF-006D-FE85" target="_blank">http://cerberhhyed5frqa.dkrti5.win/98A8-F5A9-6AEF-006D-FE85</a></li> <li><a href="http://cerberhhyed5frqa.cneo59.win/98A8-F5A9-6AEF-006D-FE85" target="_blank">http://cerberhhyed5frqa.cneo59.win/98A8-F5A9-6AEF-006D-FE85</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.xmfir0.win/98A8-F5A9-6AEF-006D-FE85" target="_blank">http://cerberhhyed5frqa.xmfir0.win/98A8-F5A9-6AEF-006D-FE85</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.xmfir0.win/98A8-F5A9-6AEF-006D-FE85" target="_blank">http://cerberhhyed5frqa.xmfir0.win/98A8-F5A9-6AEF-006D-FE85</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.xmfir0.win/98A8-F5A9-6AEF-006D-FE85" target="_blank">http://cerberhhyed5frqa.xmfir0.win/98A8-F5A9-6AEF-006D-FE85</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/98A8-F5A9-6AEF-006D-FE85</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Contacts a large (16402) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Users\Admin\AppData\Local\Temp\69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Adds Run key to start application
      • Modifies Control Panel
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Users\Admin\AppData\Roaming\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\ktmutil.exe
        "C:\Users\Admin\AppData\Roaming\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\ktmutil.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:772
        • C:\Users\Admin\AppData\Roaming\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\ktmutil.exe
          "C:\Users\Admin\AppData\Roaming\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\ktmutil.exe"
          4⤵
          • Adds policy Run key to start application
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Sets desktop wallpaper using registry
          • Modifies Control Panel
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4328
          • C:\Windows\system32\vssadmin.exe
            "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
            5⤵
            • Interacts with shadow copies
            PID:4004
          • C:\Windows\system32\wbem\wmic.exe
            "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:380
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3000
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc83be46f8,0x7ffc83be4708,0x7ffc83be4718
              6⤵
                PID:1848
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10415611561663581483,15961387548011869704,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:2
                6⤵
                  PID:5004
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,10415611561663581483,15961387548011869704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:3
                  6⤵
                    PID:468
                • C:\Windows\system32\NOTEPAD.EXE
                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
                  5⤵
                    PID:3088
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.xmfir0.win/98A8-F5A9-6AEF-006D-FE85
                    5⤵
                    • Enumerates system info in registry
                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of WriteProcessMemory
                    PID:2812
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x78,0x108,0x7ffc83be46f8,0x7ffc83be4708,0x7ffc83be4718
                      6⤵
                        PID:4152
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13740378231931088335,16713280639294752971,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:2
                        6⤵
                          PID:2852
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,13740378231931088335,16713280639294752971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1812 /prefetch:3
                          6⤵
                            PID:1388
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,13740378231931088335,16713280639294752971,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2516 /prefetch:8
                            6⤵
                              PID:2484
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13740378231931088335,16713280639294752971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1
                              6⤵
                                PID:1964
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13740378231931088335,16713280639294752971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1
                                6⤵
                                  PID:2988
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13740378231931088335,16713280639294752971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:1
                                  6⤵
                                    PID:2172
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13740378231931088335,16713280639294752971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:1
                                    6⤵
                                      PID:2476
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,13740378231931088335,16713280639294752971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:8
                                      6⤵
                                        PID:3952
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,13740378231931088335,16713280639294752971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:8
                                        6⤵
                                          PID:3092
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13740378231931088335,16713280639294752971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:1
                                          6⤵
                                            PID:4324
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13740378231931088335,16713280639294752971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:1
                                            6⤵
                                              PID:3144
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13740378231931088335,16713280639294752971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3060 /prefetch:1
                                              6⤵
                                                PID:5252
                                            • C:\Windows\System32\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
                                              5⤵
                                                PID:1148
                                              • C:\Windows\system32\cmd.exe
                                                /d /c taskkill /t /f /im "ktmutil.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\ktmutil.exe" > NUL
                                                5⤵
                                                  PID:5608
                                                  • C:\Windows\system32\taskkill.exe
                                                    taskkill /t /f /im "ktmutil.exe"
                                                    6⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5660
                                                  • C:\Windows\system32\PING.EXE
                                                    ping -n 1 127.0.0.1
                                                    6⤵
                                                    • Runs ping.exe
                                                    PID:5760
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /d /c taskkill /t /f /im "69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe" > NUL
                                              3⤵
                                              • Suspicious use of WriteProcessMemory
                                              PID:732
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /t /f /im "69aa03bcd10948392b001bb9ae368a92_JaffaCakes118.exe"
                                                4⤵
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2968
                                              • C:\Windows\SysWOW64\PING.EXE
                                                ping -n 1 127.0.0.1
                                                4⤵
                                                • Runs ping.exe
                                                PID:1812
                                        • C:\Windows\system32\vssvc.exe
                                          C:\Windows\system32\vssvc.exe
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2556
                                        • C:\Windows\system32\AUDIODG.EXE
                                          C:\Windows\system32\AUDIODG.EXE 0x404 0x4fc
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1740
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:3552
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:1568

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html

                                              Filesize

                                              12KB

                                              MD5

                                              97abb4b7cc08b7f539a40a1f28130073

                                              SHA1

                                              13a1e82b0c65cd64f5020db1184b7b310d35c211

                                              SHA256

                                              59ed79118e81237045da6afc2fba6610710c7972b49601b36b3784f4b719d481

                                              SHA512

                                              7b143becbe1cd23e8da0769fe5af670c629068b1dee5506a04278b2f5970b098d8eeafeff6968ddc3570b639f5936cadad6324cacee02f616738cb3f8c7c34e2

                                            • C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt

                                              Filesize

                                              10KB

                                              MD5

                                              91329ba6b97d8f9354935737d4258b8b

                                              SHA1

                                              3f99116c9c9c68b8ac04d5037a6f547c82c9b6d1

                                              SHA256

                                              ee29e6a38fd7b5e487015f8c217f1f9c2c14ade416c72bd431054f7a5285aabc

                                              SHA512

                                              558d7b68b2c65f7d7932d58199e1e52bf88ed9203d0398dc763517b62c4a7ec11db1354032cc5ae7f50365a18c62d04993202f8db8d6c4460be2cfbdbded711c

                                            • C:\Recovery\WindowsRE\# DECRYPT MY FILES #.url

                                              Filesize

                                              85B

                                              MD5

                                              b60c922f3561203b8385a7bd88c876d8

                                              SHA1

                                              a7d9223b7204972598d143c244149eb97999e272

                                              SHA256

                                              84fd21e35788990211bc105f49b0ff4b9f3e41b80719bd2bcc8b5778d3ba4046

                                              SHA512

                                              741639eaa70d17108f5dc8aa72a0090147247d099759ac77577ad5920786f8510b111cc6be46dcc5efd995e1eb6382ea8cbe32ed63b87e950f80f4e726d8802c

                                            • C:\Recovery\WindowsRE\# DECRYPT MY FILES #.vbs

                                              Filesize

                                              225B

                                              MD5

                                              f6d629f2a4c0815f005230185bd892fe

                                              SHA1

                                              1572070cf8773883a6fd5f5d1eb51ec724bbf708

                                              SHA256

                                              ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f

                                              SHA512

                                              b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              ecdc2754d7d2ae862272153aa9b9ca6e

                                              SHA1

                                              c19bed1c6e1c998b9fa93298639ad7961339147d

                                              SHA256

                                              a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7

                                              SHA512

                                              cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              2daa93382bba07cbc40af372d30ec576

                                              SHA1

                                              c5e709dc3e2e4df2ff841fbde3e30170e7428a94

                                              SHA256

                                              1826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30

                                              SHA512

                                              65635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9cdba1f1-1a66-4a1f-98fb-8f98df2262d3.tmp

                                              Filesize

                                              6KB

                                              MD5

                                              299ab3d38cfbfaa62bd28770c220b4b2

                                              SHA1

                                              49ded6954fbf2276c395fb6e476771a386d41fb3

                                              SHA256

                                              c33459982e968c018e7871773cb67de3521262bc37b859084d798287e6099485

                                              SHA512

                                              5990dacefffc9eca78c8b054755e9b9c4604027d44283f79e5affecba3eb213bb4b73bc38f56cf60b4499131a390a146ed253643d3ca4665df1f3a6fb3bda3d1

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              31490d573bb8990a4d98ca5439c0319e

                                              SHA1

                                              e8ab0be9cf7bf7ead4b57ad42bbaeb8a3326fe06

                                              SHA256

                                              fb6caa5ff1c82a2d0abb6379b939c062bac625f5920f9805e1dcea58e12520e1

                                              SHA512

                                              cdffa5513753ee389adef8d53fdef81ddfd0a2707a1aa97db54ccec769b5b547781e07623b29596c565f125dbed52ec95feefea5e228be15ea3caeadd9529022

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              6752a1d65b201c13b62ea44016eb221f

                                              SHA1

                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                              SHA256

                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                              SHA512

                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              8KB

                                              MD5

                                              5082e4d262fc5b298a529aab586a8d03

                                              SHA1

                                              61615b68b5d0080ad3685b60f4df8a42c185183d

                                              SHA256

                                              0a108d2089403c74235865cdd3ae27eea457f71261e42abbb6bd2963fb9d4bd5

                                              SHA512

                                              53aba605ff179e81288ea1cf4b9020be941c9415ccea5a7908549921b55952952fbc5846c1d4a0d76b5a18a1f3a6ce0991ac5890a957a756f57b70284ebe0e3c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              8c687eccd76ecbe063ef570687456485

                                              SHA1

                                              94295179fd8bb0afc4067a0e119b13954c1b4d7a

                                              SHA256

                                              0d72fc61f24d40dbc2ec9935bba93510ca311a5723f54907c9c4e25f54adf387

                                              SHA512

                                              d9664d4552d291f0f6a8ed1317ee492d830ded43b13736d8294f80f64cfe09344659d05fca263d929964547de8139511101e498af62b8390cae951dae9261e4f

                                            • C:\Users\Admin\AppData\Local\Temp\nsh254D.tmp\System.dll

                                              Filesize

                                              11KB

                                              MD5

                                              6f5257c0b8c0ef4d440f4f4fce85fb1b

                                              SHA1

                                              b6ac111dfb0d1fc75ad09c56bde7830232395785

                                              SHA256

                                              b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1

                                              SHA512

                                              a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8

                                            • C:\Users\Admin\AppData\Roaming\404-8.htm

                                              Filesize

                                              1KB

                                              MD5

                                              dc10893b02f9b0bd2be338d82a98ef21

                                              SHA1

                                              f5b071ffa7894a1b2a9a3a35e1bcdc784c5ad921

                                              SHA256

                                              de9f9eda5d26dece0b8de402cda59982710b58a7856286fd90562b101a2e84d9

                                              SHA512

                                              c7e935d9092e8a893790870790ec464f90e6c5ae134c58d9f7244e5b520af03d785a70a6fcb351e366d0eea89871ecf88adc4667a7ab79c90050cf4e9ac106c4

                                            • C:\Users\Admin\AppData\Roaming\Adobe-CNS1-3

                                              Filesize

                                              4KB

                                              MD5

                                              02fc9c141c7fe565396ee5479e0206e4

                                              SHA1

                                              94f8be8f0a8f5245155686c37a78b83ba51d6984

                                              SHA256

                                              dd0a8f1fe12bdab4387ac528e12244ee68bb6d098548e31e84343e8660b9ba2d

                                              SHA512

                                              0ca311a23f55ba2c4eefedf7a2280257113ed77c3dd7a7d6c4d04c4e1a51de6c3596c4cc8bce413f3799e3f279ae31b402ca26de24584fa97060e0a6fa24a307

                                            • C:\Users\Admin\AppData\Roaming\Arrays.dll

                                              Filesize

                                              59KB

                                              MD5

                                              4553e7c51216f3bc007ab83680479041

                                              SHA1

                                              2832749a0c8d40c1eaae54d132c8bc4fa52d567f

                                              SHA256

                                              664c3ca4053df5a50f464fb196d8e68d2d9244c6687a26210b9db2addaa065c3

                                              SHA512

                                              235fee1f317915c22d836a593da2f5ccc1d0ece70023c45526439d6c221faae8618545909b480f17d5923ae82b0fd44962f319ac2fac794df7df6773ef4e5bde

                                            • C:\Users\Admin\AppData\Roaming\Banjul

                                              Filesize

                                              77B

                                              MD5

                                              d8bf90c6c458e81d3fb17371cc1ab80e

                                              SHA1

                                              39843cd866b512e8dd4764c299068f025d2b96ff

                                              SHA256

                                              18eba9d5e645204556fd02348e43728a82ab429ee4580fea323475d4ed021b19

                                              SHA512

                                              1d688c68157b370ebdc3dfbdec6a11e38084b2df2f27fd706053a35ce466d841d7091ba7fe3d6cdedcf6222105ebfda225ac216d056e35086af173a1531f848d

                                            • C:\Users\Admin\AppData\Roaming\Cambridge_Bay

                                              Filesize

                                              1KB

                                              MD5

                                              89de3d027493b9dbe3298a06fef9a89d

                                              SHA1

                                              3d8ac130c5dab1becabb0a17cae55c9aa42e50cd

                                              SHA256

                                              4d1380365eaceb6082c783f733af0ec9fd99e947c1c08c84fa6ff1d370b551ea

                                              SHA512

                                              d7699a070cc465d5d960bd3d712fe72f68b24bd6e6bca6e67b5a17fa9581bb0cb02d10bfca2c32949ef86c3156c08e8bacdb33f1bcf4b5b188f149fc52870829

                                            • C:\Users\Admin\AppData\Roaming\Chagos

                                              Filesize

                                              77B

                                              MD5

                                              a1593e9a0d43137ed13bc8019793ba78

                                              SHA1

                                              5f84bbc68a7eb289c2a8bb28ac3cb1d99368dec3

                                              SHA256

                                              a7be0b24e37b0c550a6ab178184064039d200f483f4272fed94c327bd54cd00c

                                              SHA512

                                              723f6ffc3972b8c5f349dd54d8368b157198faafbc9e04318488c277039dc4a9fb337839e39623f55900c4f8de342a07d9a346545658906e90c863302f1cdee3

                                            • C:\Users\Admin\AppData\Roaming\Cuiaba

                                              Filesize

                                              1KB

                                              MD5

                                              b4b79c9010a449efd53a82bdb8437628

                                              SHA1

                                              29aade81c299a3d802a39082fbc14d9bfe2ce0bb

                                              SHA256

                                              a9cb5ed1461c5fcc8f9330d6d14a93f72e3265fa39f61e3e1e160881b17b2331

                                              SHA512

                                              2937f907a2bf30a62c9451ec5524de88540a928e6bd87176eb7d815cbf87e830d49437c3356cfb54b6feae22a62a2874962b81b39f5b014cdf0dbdcb49e1f33b

                                            • C:\Users\Admin\AppData\Roaming\Ext-RKSJ-V

                                              Filesize

                                              3KB

                                              MD5

                                              5f801547f79019d60fc68319b1f049b4

                                              SHA1

                                              4d525d254adbe2187b4543c5c92d5c01a61885cc

                                              SHA256

                                              90e9fc4efe897e08e4a6182c4a077e3303ca0c132ac2199ce1a5473ba91b3205

                                              SHA512

                                              f49a801bb62c22f95d4e52ee74fdd1dab2020839c5c10c21afbd0a9b9f1a7b6e34ba026ea5b9f504f60af3feb1e2a6c5cdfa2d926addd4b65ffdd01708f3b6d2

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\ktmutil.lnk

                                              Filesize

                                              1KB

                                              MD5

                                              927b9f9afabcd9e3f77f1db84adc9c0f

                                              SHA1

                                              d8567dc6a6ad6afd3ab185ce3a8e2a8d76dd3fc3

                                              SHA256

                                              f2a6faee56a7b639cb99025643e9d920411df84eebbfae1115ecf646ecd7064b

                                              SHA512

                                              0b066b83153a222bd641329a27886aef834f1173670b8f139ab50e7af1ad4b15374584338764af630d8537af166217218659d6f8b8170e6ca891dc14e7cf1949

                                            • C:\Users\Admin\AppData\Roaming\Oxidase.guE

                                              Filesize

                                              123KB

                                              MD5

                                              c337e3929a8857455ab4c910ced96e11

                                              SHA1

                                              f308027fe3786f197908e9df3f947b351ee8d147

                                              SHA256

                                              4a0d1df4e5bb396c09e59ad6d8ae83c5d39bf8cb2468a3125725812d22395290

                                              SHA512

                                              5b8eeb64016ad880a7a21d6392b393cf795d56d0bcd241d3bc95074c2c677c4845d73c96e3ac8dc01d27d66dee76cc47fc58c916d24838cb4017fd19dd6c21e7

                                            • C:\Users\Admin\AppData\Roaming\StripSelfworth.j

                                              Filesize

                                              1KB

                                              MD5

                                              63177602d55dc84d6cd0a2a57bd23188

                                              SHA1

                                              d51c49344136ac7fbc511bb47b686dcde30de989

                                              SHA256

                                              9d542f61355d3acda4e6c77d252b8a5285a6abbd00bf85ee1390cad66c9275e5

                                              SHA512

                                              1ab99e824c1e5b7a53eb216cba9734e633386ad9327769286067f637678d8269ab47c1a16acefab0cedcaaa644a0cfe4dc8e6e8c5223f43a55a6cbf41f09d572

                                            • C:\Users\Admin\AppData\Roaming\body.end.indent.xml

                                              Filesize

                                              1KB

                                              MD5

                                              f54a1db59872675c66c0f6451b3d3bd7

                                              SHA1

                                              f7f8bb4e465f62c770bc934c1c7457fb7ce96001

                                              SHA256

                                              bbb0dbe902d683af20a30c031d1b25733dc940e0f7f0992b2d70a77d8f7862d8

                                              SHA512

                                              11a4d80c8bfe8dd1f06b4330f7712421619ed67c92ba1f21d2390e19f47050e080f8b1763387a904f3f4aa8626183b1fbd394ece10c9fb002af218c9568c7d81

                                            • C:\Users\Admin\AppData\Roaming\body.end.indent.xml

                                              Filesize

                                              1KB

                                              MD5

                                              96fbf408fb9c1a281ae2c5179c66be7d

                                              SHA1

                                              a7b0afef1255652d44c1245172a672b2ed38f3e6

                                              SHA256

                                              2fd2206f1e7db86d4bc0e25982b12ac3a769c261b2791802c544201a9dc73666

                                              SHA512

                                              c34ef857b057181bf8cf5184d22716140eafaf18d74d61018e42171a0572d0a0c2b7cf5d7085c5eeede42336fc481772008567a7a36ad56044ea135228d855fa

                                            • C:\Users\Admin\AppData\Roaming\btn-next-static.png

                                              Filesize

                                              3KB

                                              MD5

                                              0f35831306ce56cc5d24f98a79ce2c71

                                              SHA1

                                              214525f3fa4a0a20f50d5eb14939d29bc948ddf8

                                              SHA256

                                              7df8896768ebab6c524dd13acddccf4129816686219ed8ee0ffd716658d73c08

                                              SHA512

                                              e9a856b47949cde50b413c654f3bfc0e2ff5cb5489dfd4b04be75cbb5dad39acb1312c06d73314613593deba8776d7a4a08963b80c1e02a7d363ba6ad0b17c99

                                            • C:\Users\Admin\AppData\Roaming\btn-next-static.png

                                              Filesize

                                              3KB

                                              MD5

                                              20418349e7f8244ea53bc174b2ff9576

                                              SHA1

                                              edb9087b6d85247ea0cad0060f540b0f890a80e1

                                              SHA256

                                              35d36d6619e249e8bf4838098fd1770c78617e3019162aaca092f8fa37c82dcb

                                              SHA512

                                              b12946ca17bb23403e106d561ae42d15695efde73eb4efb4099b57824c7ba0d2e331850022405f1d5da9502b568a217c06f259600cbbacc0d1c2b7210b31081f

                                            • C:\Users\Admin\AppData\Roaming\communications.png

                                              Filesize

                                              5KB

                                              MD5

                                              9e1ca7064624f37fe0be75e53fe66376

                                              SHA1

                                              78807cb8305b7e98079dc361c0ed3edaf8eb1015

                                              SHA256

                                              eb5cef68cb9b7b55d2fa3c62e741f23782904f877ff18ac8bdad00e89d470e63

                                              SHA512

                                              9619cbe7f1be4d4bf52b492b7c80ebae746a34f6a9f1769baa462a6e370262af743818846e1e6c006ca9bd536f7c638baa72d173e6f83b824601c321522dec69

                                            • C:\Users\Admin\AppData\Roaming\communications.png

                                              Filesize

                                              4KB

                                              MD5

                                              db4452b6491adb8f5dd4a318bec9f901

                                              SHA1

                                              d0854e442a158da86b7a4113c3e765d435e02066

                                              SHA256

                                              f4b792c5a07fc27ca2e675971d7bc2e6aaa9a28951995725e19cc0214c469a52

                                              SHA512

                                              6442f88490703393598e50db5ee0697e69e5c623b48b87a052c603ca60fb0ae201b5e3cc2aeb32dc1ad6211fb4cffe7d069120325974f673d5783dc126593b2f

                                            • C:\Users\Admin\AppData\Roaming\computer_diagnostics_2.png

                                              Filesize

                                              1KB

                                              MD5

                                              f10ee52893c12ca486fdca6504dc67f0

                                              SHA1

                                              c228c9102bf8aa985f4f45be7fecec50201c8a7b

                                              SHA256

                                              4130f64ec5a7c18c732fede0cc539182c9f15eeb5ec8b11dae92406c4d42422b

                                              SHA512

                                              159ae48b990de73e43f2be9250cd215bf001fd32b491026a3abb56bd0edbe5fff8a56c1fa9f01b28d4ec4cdd4b385fffdd7f807d03b9c1ef7c287be50c6c6986

                                            • C:\Users\Admin\AppData\Roaming\computer_diagnostics_2.png

                                              Filesize

                                              1KB

                                              MD5

                                              671026e8f81a523575b346275f619ea7

                                              SHA1

                                              974512f4dbd74248120922478d01ffba73ce44ea

                                              SHA256

                                              ff9bd1b23341b5ef229ce7b706842db6b2f6691fc5f7df31ba49b13e0c26d3d7

                                              SHA512

                                              bc8a89eff659242a8af09003c99bf1f469123e35612cf48215dae1f53680bad4f438764d230c6f2c9f3da21831706fa82f1b6843edb52b2cbc0fc25801b93eef

                                            • C:\Users\Admin\AppData\Roaming\draft.mode.xml

                                              Filesize

                                              1KB

                                              MD5

                                              cbbc86e59b6ccc6d26f554d5dffe02cc

                                              SHA1

                                              66e460bdc8d2c1760ba82b3653c65aab4d85367e

                                              SHA256

                                              bd780f6dc2337ec62094bd80e2fc470dc298ecc739663b9a0ccc74512cb45371

                                              SHA512

                                              42a5baca3894233559fe1c3f4f5f937d058d8e439d17632ee0093541461febf4ab5639140d1048979506f9d617d45b93198efd4a98f0408979abe6b990ae1b83

                                            • C:\Users\Admin\AppData\Roaming\draft.mode.xml

                                              Filesize

                                              1KB

                                              MD5

                                              94fda49e032aaee5149670d9595419fa

                                              SHA1

                                              62c2f1d3f71ba95fd9f5c4297ddf66d5e995a5f5

                                              SHA256

                                              3c13443ae7fdf9322db48c3ca147d61301ce574b0c706f5369332f09d4f8dcb5

                                              SHA512

                                              1ff03cf386edffa4dc01ab8c9554b08a4ee89ddf06ee32f6b6529a1ed3f4d32b0ed29185a7d07147777ab6070df66a7a77057f875e49390289c9b01d5e3e352d

                                            • C:\Users\Admin\AppData\Roaming\error_1.png

                                              Filesize

                                              4KB

                                              MD5

                                              5a9ca682974b4d70bd1147ec1689fd45

                                              SHA1

                                              9ac3cb66eed7ba4d251c4142cdf8bc9d2fb35cf5

                                              SHA256

                                              6b21e2cfc46235a4a003f2165c634338a0b20e65b75014ca45bb6489f54eb225

                                              SHA512

                                              e7bf143cd9fa6fee1bd7dfc4996b4ba172f5f98336667e5a06d49ecc4e2e3225778e10694e96189850d9efb34b85e0e7809e0227c9be64aa44a844794edaf722

                                            • C:\Users\Admin\AppData\Roaming\error_1.png

                                              Filesize

                                              3KB

                                              MD5

                                              6f42ca6b4105204fcd946cc2ae17d9a1

                                              SHA1

                                              7d4a234e40ef4564943ece66d46d9e1417586887

                                              SHA256

                                              7d4b3a73836005095e230d6d34297baa68f816b71cc6b78ced7a6f60b46c829c

                                              SHA512

                                              724726aa1b898646522140872210fb4766d5c9998eed3192f112313081377e68077536f6589d98f3300909592584bf3b65820da253feea8eeb558153900cf97a

                                            • C:\Users\Admin\AppData\Roaming\eulaver.xml

                                              Filesize

                                              2KB

                                              MD5

                                              9fc48923343e48542e75a9ad63f058aa

                                              SHA1

                                              5f0d0f52f0320252c8e095f952d20569259bca35

                                              SHA256

                                              8583bbf1e634a1a1f117f4a79767b4d0e9885f3926a88a336564d52d43f1f06b

                                              SHA512

                                              509fb1e14a6828288d3f2f5031db2073f67f14e65eb3dc1d52bb99c0be43e75177db4c09871e8831f40ff6455b008da2c2423c8b73a6f6e8f020d5fa307a8728

                                            • C:\Users\Admin\AppData\Roaming\eulaver.xml

                                              Filesize

                                              2KB

                                              MD5

                                              b8403bed485ab2bf409901580574bae2

                                              SHA1

                                              f1b17751d3f08b77ed8f0b1528ebefdc72081626

                                              SHA256

                                              bc2165aecccaa1d0ec5cb14f147a19d265d944f10ca7c69b9c61709a63c5b866

                                              SHA512

                                              2a0d9054f9ed885884122042ba065c84b833b12bdf0997ea5e8f1c1b16d422de36bde24d15910eb0a54513c31995bdeb1a8ab5ebbe479efb27e1070e72168aa8

                                            • C:\Users\Admin\AppData\Roaming\f32.png

                                              Filesize

                                              1KB

                                              MD5

                                              bc1246d86ec68e75e83cb0724b66ee63

                                              SHA1

                                              66963ca5859b96ac72db863b9f6cdd26a30f3103

                                              SHA256

                                              675556d6c41118dccb394758c2d754f1b3f5ead6737a0d320ccc22713e96db82

                                              SHA512

                                              94fc6cfbfbea1505812ada9dba6d8e3b8be189300200fd187d9c16bdfa42ab5ff863116508dbd457f1f87c988aa8d826e04b59116a9e60922fb4026b7a0b396f

                                            • C:\Users\Admin\AppData\Roaming\f32.png

                                              Filesize

                                              1KB

                                              MD5

                                              193e264b1fe2fdfc15045e201ddf04a0

                                              SHA1

                                              999ccc70d4c4c45c808271b751cd1dfacce9be03

                                              SHA256

                                              ac2c14478f5cc431f4f9e57b8b8469db26cd7b94bbcbb886c6965bcec587bebf

                                              SHA512

                                              00f2b20621ca0cf73434b7693891f77167aa658818572f046b0929e2f3cfc00ad653d3edb435a498e42ad71aa26d5fc634d61f4e9f0a1a31c8386a43d06f52a5

                                            • C:\Users\Admin\AppData\Roaming\feed-icon-14x14.png

                                              Filesize

                                              1KB

                                              MD5

                                              c0be85541da54ab492119060486ba5c7

                                              SHA1

                                              cd15d21918a1cfb2428d9ab2d26ee01085cc073b

                                              SHA256

                                              bf2d1ffc671de47f6dea14d06bd4ef65ca392910b1865e437414691a1503ec05

                                              SHA512

                                              be10a88be94bf90675bcb5d553693ed5907de8a58d1e9f0837c4c93147cff3a288ffa7569e2f6c5f0d5dcfdb7ff105c55dc5433078e6bf93191aadf74b05d726

                                            • C:\Users\Admin\AppData\Roaming\feed-icon-14x14.png

                                              Filesize

                                              689B

                                              MD5

                                              2168a573d0d45bd2f9a89b8236453d61

                                              SHA1

                                              30733f525b9d191ac4720041a49fc2d17f4c99a1

                                              SHA256

                                              8ee173565b2e771fecf3b471a79bdf072aaa1bd9dc27582cfda2b2a322beeba8

                                              SHA512

                                              1263589e12f587143ec1dd8ac87293a041f7d77439fcf91503e62be02e36d13e28560342deed86cf800c7bc01cd31837004d1ebe7ae53c670340040c68eb0e22

                                            • C:\Users\Admin\AppData\Roaming\getBlank.js

                                              Filesize

                                              1KB

                                              MD5

                                              68fd0c4ee03e5c0ba1668d1fc086931a

                                              SHA1

                                              5f69a5bc03d87363f762aac8857fc4d91382314b

                                              SHA256

                                              4fb441a278cf2c85c08c9eca7eb2cf5b35c3e4519e989265f2447a6bcf1ac7ea

                                              SHA512

                                              af1431c40d614c2eb7f529cd3b99611a2e1bbb3dbd76a1dafc4886a0a7c12086e552e169e989f6e0387b6b31a9060e3bf9f88169e2af735634487399c59ff240

                                            • C:\Users\Admin\AppData\Roaming\getBlank.js

                                              Filesize

                                              1KB

                                              MD5

                                              7fa0203427f8c830ee89e253aba6a774

                                              SHA1

                                              6d29176a6adb5a1984c5a0306b9eba1521e6ae2d

                                              SHA256

                                              3be925ddc71466effd0796939f0963f3e6ad0ceb110a39c2ac6e7ec0a9e6e298

                                              SHA512

                                              2d1d13de10408a05986862e5975f0563554facc6e2c2cec4f0b97b965236b6f8b38b6d1c30c77d972d5b058f7fe8b49c8d6f60a6dc317035dd134901c41bd509

                                            • C:\Users\Admin\AppData\Roaming\{D7C5F711-6E4C-D772-9749-829CD9653CCF}\ktmutil.exe

                                              Filesize

                                              215KB

                                              MD5

                                              69aa03bcd10948392b001bb9ae368a92

                                              SHA1

                                              12741edebdd6accd7e309da808083a60113d8dad

                                              SHA256

                                              021cdf3bf0bbd3e078cf45cbae784ac1056bfe8e7fc5ff8c5d446b9a45c0bb63

                                              SHA512

                                              abf0752de3827af70f75ba5c74fa77b077659e55e4a3478cc2e8b8aedc945a61097b813649655ad2f76c40e982acba37832bc4820ad8d3e5a498e59dd3eeba9c

                                            • memory/772-93-0x0000000002710000-0x0000000002726000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/772-96-0x0000000002710000-0x0000000002726000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/772-98-0x0000000002710000-0x0000000002726000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/1608-45-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/1608-35-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/1608-33-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/1608-29-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-353-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-349-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-379-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-362-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-359-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-356-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-110-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-388-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-99-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-391-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-394-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-366-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-369-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-385-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-100-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-104-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-398-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-401-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-105-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-107-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-115-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-114-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-500-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-112-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4328-481-0x0000000000400000-0x0000000000423000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/4596-30-0x0000000002380000-0x0000000002396000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/4596-27-0x0000000002380000-0x0000000002396000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/4596-32-0x0000000002380000-0x0000000002396000-memory.dmp

                                              Filesize

                                              88KB