Analysis

  • max time kernel
    128s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 22:15

General

  • Target

    2024052783237ebead491c851477fd609d999112cerber.exe

  • Size

    177KB

  • MD5

    83237ebead491c851477fd609d999112

  • SHA1

    959652b34973aa73161f7f02acffe667b37e3562

  • SHA256

    27f3384ffb49590d669a02beaeb350eb603eb752f065ffc570d0ff30c7bcd156

  • SHA512

    1b686f3fc8bf1251313396148ef2cfe711d6cd2634d5dc4f3815476f765896f333d1c430579833db7c5d4aec015ae368367942fd0c38457becb7d22f59b694cc

  • SSDEEP

    3072:5UtN1FlUqaTkJPFAJwt33qFS2Ac/koKJFfFlo4U7ipdS8TZGVZ+Fbvc9A:W1F9EkJPyG3qqchjD7u6Ovx

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

Ransom Note
CERBER RANSOMWARE ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #CerberRansomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Ransomware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.onion.to/3515-C54D-5091-0072-8313 | | 2. http://cerberhhyed5frqa.onion.cab/3515-C54D-5091-0072-8313 | | 3. http://cerberhhyed5frqa.onion.nu/3515-C54D-5091-0072-8313 | | 4. http://cerberhhyed5frqa.onion.link/3515-C54D-5091-0072-8313 | | 5. http://cerberhhyed5frqa.tor2web.org/3515-C54D-5091-0072-8313 |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.onion.to/3515-C54D-5091-0072-8313); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.onion.to/3515-C54D-5091-0072-8313 appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.onion.to/3515-C54D-5091-0072-8313); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/3515-C54D-5091-0072-8313 | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.onion.to/3515-C54D-5091-0072-8313

http://cerberhhyed5frqa.onion.cab/3515-C54D-5091-0072-8313

http://cerberhhyed5frqa.onion.nu/3515-C54D-5091-0072-8313

http://cerberhhyed5frqa.onion.link/3515-C54D-5091-0072-8313

http://cerberhhyed5frqa.tor2web.org/3515-C54D-5091-0072-8313

http://cerberhhyed5frqa.onion/3515-C54D-5091-0072-8313

Extracted

Path

C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber Ransomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>CERBER RANSOMWARE</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #CerberRansomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Ransomware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.onion.to/3515-C54D-5091-0072-8313" target="_blank">http://cerberhhyed5frqa.onion.to/3515-C54D-5091-0072-8313</a></li> <li><a href="http://cerberhhyed5frqa.onion.cab/3515-C54D-5091-0072-8313" target="_blank">http://cerberhhyed5frqa.onion.cab/3515-C54D-5091-0072-8313</a></li> <li><a href="http://cerberhhyed5frqa.onion.nu/3515-C54D-5091-0072-8313" target="_blank">http://cerberhhyed5frqa.onion.nu/3515-C54D-5091-0072-8313</a></li> <li><a href="http://cerberhhyed5frqa.onion.link/3515-C54D-5091-0072-8313" target="_blank">http://cerberhhyed5frqa.onion.link/3515-C54D-5091-0072-8313</a></li> <li><a href="http://cerberhhyed5frqa.tor2web.org/3515-C54D-5091-0072-8313" target="_blank">http://cerberhhyed5frqa.tor2web.org/3515-C54D-5091-0072-8313</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.onion.to/3515-C54D-5091-0072-8313" target="_blank">http://cerberhhyed5frqa.onion.to/3515-C54D-5091-0072-8313</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.onion.to/3515-C54D-5091-0072-8313" target="_blank">http://cerberhhyed5frqa.onion.to/3515-C54D-5091-0072-8313</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.onion.to/3515-C54D-5091-0072-8313" target="_blank">http://cerberhhyed5frqa.onion.to/3515-C54D-5091-0072-8313</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/3515-C54D-5091-0072-8313</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Contacts a large (16393) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024052783237ebead491c851477fd609d999112cerber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024052783237ebead491c851477fd609d999112cerber.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies Control Panel
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\charmap.exe
      "C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\charmap.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Modifies Control Panel
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Windows\system32\vssadmin.exe
        "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:2600
      • C:\Windows\system32\wbem\wmic.exe
        "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2508
      • C:\Windows\System32\bcdedit.exe
        "C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1900
      • C:\Windows\System32\bcdedit.exe
        "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1924
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1868
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1584
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:537601 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2952
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
        3⤵
          PID:1592
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
          3⤵
            PID:2792
          • C:\Windows\system32\cmd.exe
            /d /c taskkill /t /f /im "charmap.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\charmap.exe" > NUL
            3⤵
              PID:1052
              • C:\Windows\system32\taskkill.exe
                taskkill /t /f /im "charmap.exe"
                4⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3012
              • C:\Windows\system32\PING.EXE
                ping -n 1 127.0.0.1
                4⤵
                • Runs ping.exe
                PID:2436
          • C:\Windows\SysWOW64\cmd.exe
            /d /c taskkill /t /f /im "2024052783237ebead491c851477fd609d999112cerber.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\2024052783237ebead491c851477fd609d999112cerber.exe" > NUL
            2⤵
            • Deletes itself
            • Suspicious use of WriteProcessMemory
            PID:1680
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /t /f /im "2024052783237ebead491c851477fd609d999112cerber.exe"
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2456
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 1 127.0.0.1
              3⤵
              • Runs ping.exe
              PID:2684
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3000
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {1B28D891-0A13-40E8-AB2B-9300442D1EF7} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2752
          • C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\charmap.exe
            C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\charmap.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2768
          • C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\charmap.exe
            C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\charmap.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1768
        • C:\Windows\SysWOW64\DllHost.exe
          C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
          1⤵
            PID:232

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

            Filesize

            12KB

            MD5

            0abc2a59d009a1e7f4a04ce5c1d02d39

            SHA1

            ed651ebabe113d843a3e741a89050dfd5993ce64

            SHA256

            3731c3b1d1b0e211635428471c7ccf7ab4d2ba34a310eae712a01046d6f4bfbd

            SHA512

            b6603c8149d0b44ea4d0bbb3257a81811cdd08bb8367f7964233dfaf030ddc423cde6a56b311a596a4909814c4d446361e6250f002de775b11528e12c062654d

          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

            Filesize

            10KB

            MD5

            b9a5db22e7e8f620f82d16dbe112c6e9

            SHA1

            9e04f758d7caeaeca343d3afd36871d8fe5e4b11

            SHA256

            207ce5afed71dbf30cf01c9c1f812599a3693aee57eb2d9f8bbf0589c092dd15

            SHA512

            5b9d4cf6ebd7fa4006fa7bec61f9462efee454327ee8d8f34f0374cc30a062c93201a351d9437fa8b83f5a2559cdc95177f45234b1db18f362918db5dbb98ad7

          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.url

            Filesize

            83B

            MD5

            08f47234a3dccdad826c4f50bda6b56f

            SHA1

            4bc086f9b32a9298d4e1360de572c9a0f953d272

            SHA256

            ea2fd84bac08d67390d7d0568ec3eef43de1e92f2fc8be70885ba1e4678f877c

            SHA512

            5ad4f4b267d13a06778f5def3a88692a97e0e2f5d8419e1d33bc51a13d98ced50ced719b328873c189c6be74aef907ef28d82199c2130a3f8e6485ccd4a334c8

          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.vbs

            Filesize

            210B

            MD5

            e885e348f83d97db3deb82ed43a64eeb

            SHA1

            931f6266326fb778117d52d9e74eb9b8545bb2f2

            SHA256

            bf4b1b2372317eb80d719b452100e9538ea7d44f5e168a7e59d0aecfebf5b660

            SHA512

            4fee5c7cf95a5930062eea507911d172644c73c592291a520230eca5bb27009923cf03f0b6bdc1912eee841dcc561f82b4071265e75787801a07547650d1be44

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

            Filesize

            914B

            MD5

            e4a68ac854ac5242460afd72481b2a44

            SHA1

            df3c24f9bfd666761b268073fe06d1cc8d4f82a4

            SHA256

            cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

            SHA512

            5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            68KB

            MD5

            29f65ba8e88c063813cc50a4ea544e93

            SHA1

            05a7040d5c127e68c25d81cc51271ffb8bef3568

            SHA256

            1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

            SHA512

            e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            1KB

            MD5

            a266bb7dcc38a562631361bbf61dd11b

            SHA1

            3b1efd3a66ea28b16697394703a72ca340a05bd5

            SHA256

            df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

            SHA512

            0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

            Filesize

            252B

            MD5

            01de34b54428300a8447577f8971fe27

            SHA1

            24974b9b83dbe54def6286441310e8965d7eb2ac

            SHA256

            183cf1af8cdb3f0b8c761e49c9eee928db68aa0bea7063fb0cca9148941f362c

            SHA512

            de8f1be9a88721db5247ef10acbfeb96f7d54e4dae3db6140581fb0a05d20c319fcfe33e3c07336c12a6777d2835a78e038185dc12c17bdc452f55da1d61bc55

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            1a529716d0dd6401f45bacd6723258c0

            SHA1

            8d971693a35379dfc391f952c51fd74733b36a01

            SHA256

            a01f93a5f71535c711696f7bc25cc1c317980638659f30b470eeb6a8fe817f89

            SHA512

            cf900d3aa4bf290e8b29b895e8dd4bf4586a1974fe2417c31ae713f39eef971abb05534038ca7d6ae0ff642fe2a6c7333a093b6da03bd04ae6a9eb0c33455598

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            14708f03bf930d77e178ee9e197bd6df

            SHA1

            38838119f95ed189375c51765ede6b9e894f2920

            SHA256

            f882bdb15a1188a0f3f3ac7d6f59752928a0a135e78c67a7e626d6de672024d3

            SHA512

            5221c2415b1883ec2064b7272813b3fd94996584464e797b951fff043c411f653be0e23554fdc13cfa4dbf961c312e49079625f8bb2f34c878931c2921043265

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            7c8cf67e8124f78007c4552681c5caa8

            SHA1

            e5f02736c1f527880f8850104d66de59d0a729dc

            SHA256

            8a47d8ab82ba6fbb262af884d108fa5317f17ec637a23044017f454534b6d98b

            SHA512

            dc601da9e3213f7fcc473aebeb3b11c633bf57f5399cef5f7909353bd18d9c3cde5ef4e7a541d53ecef19b6a013da5e13896f0ae3913d661d975857e41593034

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            556823c059ddbfd59d86428849580b53

            SHA1

            0a2562490861168f56cf06fd0dd261eea504ecfc

            SHA256

            944d3bf195aa595b34d5331abc72ed06c29fca12613367cedf330d7454e62572

            SHA512

            b52280b008ce20fb187291a45aacd7c714cf06db4f5a84c8aad51262ce8021e4d1ec27b00fbd9ecc07e4826527ce50367628189c0aeeeb35c307c04316e10880

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            bc7ba8f0616c747f02150686de73a626

            SHA1

            ae82c0cbf689e1d846cff00ebc3b088cc87d4554

            SHA256

            67a5bce68113cc1a302187da37c9d2db34a95cfb2cd02134f6b88406f443f3f2

            SHA512

            192bfb03b2a62d2e85f82293f37d303915ac79f145571793286f241588c48a2a1181af7c233cd448d66d69cc9dde93342f4dc4d678f8a4201418ca7f3597201c

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            1081964db78021df7c1bc2afcde81db4

            SHA1

            2dc374cb19fe94da4fd4b4322214fd50cb8dbd2d

            SHA256

            26126fff73c2db7de028868b26087bdf4a76f5fdd1ded7bb025bd1bed9f8b649

            SHA512

            628bbba980ab464967b06a174837305616d6a77edd78e68ab098069944db48644eb5697baeca18675b82c08fff5b95d3b3abc1928f4dd640196d4fa321f24b2f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            24464c276acc5747b48cf3e04a9bb112

            SHA1

            6a782b14cdc69ff00bb3d6c30ddcab769161d45c

            SHA256

            3225bb34ebdf274d2214de73c9097d709d56218418be46daa9f9feddb1784119

            SHA512

            b154b35551d07399a1af23ce1b78dc9df917721d67209b89a41762479f51eedfba1b76a69da88294cd7730d2e58134a4b804ffce17eea878b1229e1f047cc34b

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            e6d29c8a225b45f79acbbb4dc9676f95

            SHA1

            ed9fb46d58c188974da9887789ced97256f476cc

            SHA256

            1086a681f3260ac9027d24ffbe65d2131295b5dff949ec0af2285e28d59217f6

            SHA512

            b6d58dfb834cd2f4339d5b4ee0b51fcedf51e225f1998f4c802ad29245b85e110b20eecf3a880f39ee7d521602917c559e58c1e25e3813416a11f6062660c6d0

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            79839d9f0edf3c52dc7e1d017cc2512f

            SHA1

            fd0fb6f03b698acabe2619cb82e3e52cdd2088b4

            SHA256

            3e90713cb234f31635cacd438aa6e2ff45634bf1fd96581ca071eb87fedc31a5

            SHA512

            a8c71f625c82fc64bfdf896fc4198a4906456e715875f453d56994360eb346f4e1eac2d6de2ead1df4aa5a65f50fd1c2c89c50cdfed5300508febc49e928ba2b

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            1ef5eb3e578d73be5a164cfa1d23a136

            SHA1

            ef8654c220f6a1d14c8e1656c9778fa2f7c67661

            SHA256

            afb2b61394315c67321c485fb514bf7c68c6649fe932fce9d6763f7ed632b1c5

            SHA512

            a66dae13c5064307e6ceba688dfa24cb1be745c4b5799409c018a794e15e294fc05bfa118d58e138816d456b955443b143078ef2687b4444952bb05cea2ac59c

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            1b35de190c80382c5415cdd674b57795

            SHA1

            3f7551eb7e723014e82af3253da8ee6b7cc6c5ea

            SHA256

            239a4a883be65120cab444bde854c880ecf4ba7f82a47f567d98dc5d52222b30

            SHA512

            e47acd8f9dcf182aad98d11583d94d82f575045365b7604a96cf661539e8f74a1a8a6dd5c5cfcf74bdb67f09281776b4421e88cec64a74234a4e23558dac01ff

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            3e89527e5ab323f1474f8657af159a4e

            SHA1

            cdeb4eabcc316a020af67840c2a90ff71d7ae103

            SHA256

            bad0514858c98862df746485ea6f81401d9816cfa4de6ff2c3d9ccf2be7f8f72

            SHA512

            56933f5e67fb030f1f4795e86a171fb157e9ea29033dff58743b400733f9f3f4a9906570ef1690e316b6da7a133a39512f606ebd5c75c83a9e4ac6c89c9c9a4e

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            be7fc7d7e23b6236924b21f3f962936b

            SHA1

            123bc18c648f5ca6d18e8021ab589b11708458e0

            SHA256

            2020060dba22bd600be502834d2b97322bd8394e9f16e894d7ba7fee188692be

            SHA512

            21c6d1e82c1fcb7c06f06f2a3933422a8e2ae708b478ef8d2a3c13131542b68f3de37d34c483a10d7d00d88ab021c73b405e70e627292b447b3b6c93753bb22e

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            20a46b8f7c450f60f1cd6e6c983a6c32

            SHA1

            900a9886fa30a383eb8c0fec7b0e7ac5c35cf0dc

            SHA256

            1af2f4edc38559992079729737bdf75425fc12265c4b27301b9730807ed8fdbd

            SHA512

            b77b6df98ee8c582d2dc07a04a170873d17218ba6b883a6c6f65d4c3beab5f9e44b22b3a05c3f041084f74f501587178d5e798f6c283b5af2d4669b1922ba5ec

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            034ea89cd52cb589d4a3b129a16818f9

            SHA1

            2c485ca0b9b2d502839339b5c7f26597b4588ec3

            SHA256

            02670207cea3d112c1f899c17d64ca3e54c49ae2b8eaac574db79862146b9e52

            SHA512

            d3ae98bdc5d7d4aa12772c76b3bd211eb4322c7ccb9593c45bd727d45abcdef898f2af2fae68411f734cfac6cee6e446b1b077fc2891df2fb5c886fa992b5dd3

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            6ffb050a5d555d9631b0a636328f694d

            SHA1

            8c5bc0b01ceacb663e922ec1a4d267499ff62de6

            SHA256

            6b518b43acf23ccde88b9188a5433b00ed4e88024301b54dbe38984706c4159d

            SHA512

            97f488516f83fdec47ecdd3acc2707fbfe3dd88ed662c6cabecf7eeb43c5b9609ef87175f381f8cb5f5aaa4c53de305442ea259620124bd4624c68f0400a8521

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            ab054d96650143ee513b1ee75ccafe8f

            SHA1

            7903916138358f855db24abba024fdaa5e64c4da

            SHA256

            4bda4c49a1c4dd19c47c92e26641d8f0e9d4c80f5a11525dc6e564b38aa0e351

            SHA512

            ab24fa837be31a85ef1391805f1dae37fd52de79ff642fb78cda9397b9e602765687e871d3eb9a39846d80b0bf899cf7fda8131d18366e416058a6d0e709f030

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            fdfcc60414f1e8570e9d22f242159566

            SHA1

            d8cf34cc6eb1d221185607b006d829ef5dc80e8d

            SHA256

            92e99551338a7738b977bec989c6f29646265b8b31a776bb2b12bc72c3a4ff8f

            SHA512

            bf699892cf51e45f5552cb3a4cce2cb67a5405974e73a570e68e1a82c75139d851b5cf14e2fa4dc7b9eb0789006fe65b053348a93ca3c84594f01e1c20e703c2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            cf8a4ab52f478f92064d93a19ad82f8b

            SHA1

            1ee507686e0fb27d6c6059ffbdaa5c864a46320c

            SHA256

            31f3e9daa535c27b4d8b6664d20fea0c4e2cbe8cf095912430b27ca649e45ca4

            SHA512

            9094bf25f4440eb36e43f54e435bb63ccb949235a57a0784149ac30f037d66990413b2ee377050c0eccd257f4fa4f11a6b5d8323e964d6c50b648376b210ebe0

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            694a175233b356d2d1d2cbdb887e9da3

            SHA1

            24d9630a18ce8cdf2f1f7fb8aa3b1d3ddf7d5d6f

            SHA256

            89ff0276f5471575f5734dbcd7e3389cd2065c218bd0d0ff84acb216e8f2acc3

            SHA512

            c54bb70267a19d30ae65a49cc1c9e6d3527c6221d413bb1b326de259914226cc91091c132c444506f5a9a38de9a6af3286212f57051d9da08ab769def7acdf9e

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            dbfc40259cb92842f70132fd23701f9a

            SHA1

            8a352017df02d3fbd7a8f9a588919ddbb52b17c0

            SHA256

            9d2f467bbba654b0c4b6b534cc89f225b5af58b2ced69f99be871a61f47e2516

            SHA512

            643fe6400d9e635b8401f10efff877e482008414f4c85249b804d43d3f4ced6df72b663df520197af360fa115174283636ed1e6b2b9bf9cf78e4fed3579d311c

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            5aa1e9fb97176ac350cfe92877076252

            SHA1

            8df893773232efc48332cbfa2ef472bba81d7453

            SHA256

            9de293d9f1735780a249d28342f6af7ef5b67bb1ab692ceb9dace02a89fd78b5

            SHA512

            36f707bb1481783bffacb28cafb1bb346a9f455ea34189ce67f35ebc1a765f26806367caf4d9f04c0d31de32c67d07207fb5ee7816613672d576f633d57015ba

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            242B

            MD5

            c045ba7e07380e04a52a4d8e39e7c9a2

            SHA1

            2b03c7bc3a93df1ecd0e0518a29bec6ae447d1af

            SHA256

            282495ce5f71c663823a54bfcc421f821d2d50645191b4d6cb47170a1b3b6562

            SHA512

            1b30273d158bb752e5130c3e1d69751ca80432a77e0c820d7844463647ecff05643f8e3d9dbbdd4e4cea0b51fa8d96b63ad269a4989270c650597dc940065b15

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UK4F3SAK\favicon[2].ico

            Filesize

            4KB

            MD5

            da597791be3b6e732f0bc8b20e38ee62

            SHA1

            1125c45d285c360542027d7554a5c442288974de

            SHA256

            5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

            SHA512

            d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

          • C:\Users\Admin\AppData\Local\Temp\Tar14A1.tmp

            Filesize

            177KB

            MD5

            435a9ac180383f9fa094131b173a2f7b

            SHA1

            76944ea657a9db94f9a4bef38f88c46ed4166983

            SHA256

            67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

            SHA512

            1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\charmap.lnk

            Filesize

            1KB

            MD5

            91abde38a6bc4fc8cfdb00b39bce98ea

            SHA1

            b8bbc124dcf6d4313ca4a67226603f56a68300f9

            SHA256

            63366d1f3671df0e7d6dccbab37bcba94db734acc5badc17d361a543a55e5eca

            SHA512

            d40c67b2ea241f1a763465ac236100dbdac5cc95b52e1c4b8965fb0663989e80260fd06a9f850cb09096d2497d2df11cd21aeeb2d60e60d4167e28f44884f1bc

          • \Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\charmap.exe

            Filesize

            177KB

            MD5

            83237ebead491c851477fd609d999112

            SHA1

            959652b34973aa73161f7f02acffe667b37e3562

            SHA256

            27f3384ffb49590d669a02beaeb350eb603eb752f065ffc570d0ff30c7bcd156

            SHA512

            1b686f3fc8bf1251313396148ef2cfe711d6cd2634d5dc4f3815476f765896f333d1c430579833db7c5d4aec015ae368367942fd0c38457becb7d22f59b694cc

          • memory/1276-1-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1276-4-0x0000000000230000-0x000000000024F000-memory.dmp

            Filesize

            124KB

          • memory/1276-22-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1276-3-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1276-2-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1276-0-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1276-5-0x0000000000401000-0x0000000000413000-memory.dmp

            Filesize

            72KB

          • memory/1768-480-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1940-32-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1940-33-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1940-462-0x00000000044D0000-0x00000000044D2000-memory.dmp

            Filesize

            8KB

          • memory/1940-18-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1940-474-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1940-19-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1940-1066-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1940-35-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2768-31-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB