Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2024 09:35

General

  • Target

    9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe

  • Size

    195KB

  • MD5

    9dba51d1d709efb322ad0babf9028c30

  • SHA1

    65916448900214e4a3a130b69767edbafa1b783a

  • SHA256

    ba142f897f9c3c3b677064b79a7b9e556b8a7060f7d89f98f4e95157497add29

  • SHA512

    acfd650221d3fedafb4782f762f88fce7272dd5286a609aa7c22d7c741317d72983e0ca6c957144897afbefa899bed2d8cbcbdfdf1209cdfed79f346f26c07f8

  • SSDEEP

    6144:WyAge9RNJSldWOANp0WGk08J6WG96HU4qWDNkz0:QJPp0WGD8J6W860tW+z0

Malware Config

Extracted

Path

C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #Cerber_Ransomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Rans0mware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B | | 2. http://cerberhhyed5frqa.as13fd.win/C875-9075-E1E9-006D-FC0B | | 3. http://cerberhhyed5frqa.45kgok.win/C875-9075-E1E9-006D-FC0B | | 4. http://cerberhhyed5frqa.wewiso.win/C875-9075-E1E9-006D-FC0B | | 5. http://cerberhhyed5frqa.5kti58.win/C875-9075-E1E9-006D-FC0B |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/C875-9075-E1E9-006D-FC0B | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B

http://cerberhhyed5frqa.as13fd.win/C875-9075-E1E9-006D-FC0B

http://cerberhhyed5frqa.45kgok.win/C875-9075-E1E9-006D-FC0B

http://cerberhhyed5frqa.wewiso.win/C875-9075-E1E9-006D-FC0B

http://cerberhhyed5frqa.5kti58.win/C875-9075-E1E9-006D-FC0B

http://cerberhhyed5frqa.onion/C875-9075-E1E9-006D-FC0B

Extracted

Path

C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber &#082;ansomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #Cerber_Ransomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Rans0mware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B" target="_blank">http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B</a></li> <li><a href="http://cerberhhyed5frqa.as13fd.win/C875-9075-E1E9-006D-FC0B" target="_blank">http://cerberhhyed5frqa.as13fd.win/C875-9075-E1E9-006D-FC0B</a></li> <li><a href="http://cerberhhyed5frqa.45kgok.win/C875-9075-E1E9-006D-FC0B" target="_blank">http://cerberhhyed5frqa.45kgok.win/C875-9075-E1E9-006D-FC0B</a></li> <li><a href="http://cerberhhyed5frqa.wewiso.win/C875-9075-E1E9-006D-FC0B" target="_blank">http://cerberhhyed5frqa.wewiso.win/C875-9075-E1E9-006D-FC0B</a></li> <li><a href="http://cerberhhyed5frqa.5kti58.win/C875-9075-E1E9-006D-FC0B" target="_blank">http://cerberhhyed5frqa.5kti58.win/C875-9075-E1E9-006D-FC0B</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B" target="_blank">http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B" target="_blank">http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B" target="_blank">http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/C875-9075-E1E9-006D-FC0B</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Contacts a large (16400) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Users\Admin\AppData\Local\Temp\9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Adds Run key to start application
      • Modifies Control Panel
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe
        "C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4464
        • C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe
          "C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe"
          4⤵
          • Adds policy Run key to start application
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Sets desktop wallpaper using registry
          • Modifies Control Panel
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2140
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3028
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffbce9f46f8,0x7ffbce9f4708,0x7ffbce9f4718
              6⤵
                PID:5080
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
                6⤵
                  PID:2584
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:3
                  6⤵
                    PID:2376
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:8
                    6⤵
                      PID:4076
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3120 /prefetch:1
                      6⤵
                        PID:3472
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:1
                        6⤵
                          PID:532
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:1
                          6⤵
                            PID:3568
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:1
                            6⤵
                              PID:1752
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:1
                              6⤵
                                PID:1936
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:1
                                6⤵
                                  PID:4496
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:1
                                  6⤵
                                    PID:2124
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 /prefetch:8
                                    6⤵
                                      PID:2976
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 /prefetch:8
                                      6⤵
                                        PID:828
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:1
                                        6⤵
                                          PID:3508
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10715162286492194957,1427962082865790431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:1
                                          6⤵
                                            PID:4228
                                        • C:\Windows\system32\NOTEPAD.EXE
                                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
                                          5⤵
                                            PID:1284
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.wet4io.win/C875-9075-E1E9-006D-FC0B
                                            5⤵
                                              PID:4872
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbce9f46f8,0x7ffbce9f4708,0x7ffbce9f4718
                                                6⤵
                                                  PID:2608
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
                                                5⤵
                                                  PID:3392
                                                • C:\Windows\system32\cmd.exe
                                                  /d /c taskkill /t /f /im "SearchIndexer.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe" > NUL
                                                  5⤵
                                                    PID:4484
                                                    • C:\Windows\system32\taskkill.exe
                                                      taskkill /t /f /im "SearchIndexer.exe"
                                                      6⤵
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1528
                                                    • C:\Windows\system32\PING.EXE
                                                      ping -n 1 127.0.0.1
                                                      6⤵
                                                      • Runs ping.exe
                                                      PID:3464
                                              • C:\Windows\SysWOW64\cmd.exe
                                                /d /c taskkill /t /f /im "9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe" > NUL
                                                3⤵
                                                • Suspicious use of WriteProcessMemory
                                                PID:1448
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /t /f /im "9dba51d1d709efb322ad0babf9028c30_JaffaCakes118.exe"
                                                  4⤵
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3632
                                                • C:\Windows\SysWOW64\PING.EXE
                                                  ping -n 1 127.0.0.1
                                                  4⤵
                                                  • Runs ping.exe
                                                  PID:408
                                          • C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe
                                            C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe
                                            1⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetThreadContext
                                            • Suspicious use of WriteProcessMemory
                                            PID:752
                                            • C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe
                                              C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe
                                              2⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3712
                                          • C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe
                                            C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe
                                            1⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetThreadContext
                                            PID:4752
                                            • C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe
                                              C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe
                                              2⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2884
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:4368
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:1468
                                              • C:\Windows\system32\AUDIODG.EXE
                                                C:\Windows\system32\AUDIODG.EXE 0x4f0 0x2c8
                                                1⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3344

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html

                                                Filesize

                                                12KB

                                                MD5

                                                e91a8674b2fa1d5871383f81bedb35b9

                                                SHA1

                                                9cf753d9118cbd3dd9d628ee0ffa6e3d4d371616

                                                SHA256

                                                be65619e56179e9d76adf0801e4fb8d4fcefa841895a262dedde4e6a3bb2a386

                                                SHA512

                                                237a0755b05f3dc5d513631b8411cf70fcd8d90bc56b17bfb8f6127590d944e4171fe5fd3670991d20ae888596ab78ec659f17917990f7f4e4a0bfa0e62a86b8

                                              • C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt

                                                Filesize

                                                10KB

                                                MD5

                                                ab417769e388e6256527b5ad2636cd1e

                                                SHA1

                                                a65fbdeec46cc24d188280afb818b069bd27449d

                                                SHA256

                                                b9f5c96d2ff8b012658ed2d1b153ab6d8e56623c08c65529de1541162a945621

                                                SHA512

                                                22a04aa4dae03bd24497d9399e2ba3ff1a1ea56e2877474fa102276ad2cf27c62d6c8967da1439a873f89f48a9538b9ce7d9ac3cda0da7e20cd3ab56fe7cbbea

                                              • C:\Recovery\WindowsRE\# DECRYPT MY FILES #.url

                                                Filesize

                                                85B

                                                MD5

                                                3ca2391c090aeefab21a670334b3912d

                                                SHA1

                                                6847c5c872612d5329665b318f868aecde909f14

                                                SHA256

                                                3fba5d97c3be34447acf9c509a73b20c3f9386a29083afb6fa03c94f901f4e0a

                                                SHA512

                                                a128ffe0043b3e0617c152b0104cdf09128c7e32158a95253395db01381197c8136f2e28e3e569aab5abc890648dca71aa36963594010290c75d00105748d750

                                              • C:\Recovery\WindowsRE\# DECRYPT MY FILES #.vbs

                                                Filesize

                                                231B

                                                MD5

                                                9d8c4bfbd009c4d6001e2125abaa8b02

                                                SHA1

                                                cd040558172b5fca5b200447a281843956243741

                                                SHA256

                                                a652297987f14317100f8c5f7eb26d1bc67eb8a64f0b39b72b5fd5046a9f29b0

                                                SHA512

                                                c4c84f43642b805a105acce9ebc9f01aa0e6ef553ea32be3f8b890fc7440f0b7d3ddf99b9336bce20ce7a3d9b9f6434a704651a8af425ffc8407ba39d5de735f

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                4dc6fc5e708279a3310fe55d9c44743d

                                                SHA1

                                                a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2

                                                SHA256

                                                a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8

                                                SHA512

                                                5874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                c9c4c494f8fba32d95ba2125f00586a3

                                                SHA1

                                                8a600205528aef7953144f1cf6f7a5115e3611de

                                                SHA256

                                                a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b

                                                SHA512

                                                9d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                5KB

                                                MD5

                                                2987d0cec46527950c3d566d38a8ed3b

                                                SHA1

                                                ddeaada3f74cab8b787cbfe819f7f20dc64fbc1a

                                                SHA256

                                                572e0540a6715f3549c6cf4389120533347958aee08ae7f558302f6a86e4875e

                                                SHA512

                                                3bc8862632a04bc26eefc635120334c5dfcb49af59f78ebaa9e1d90eb8792440025601dd6189475dab2f0436a82ecc7b367a857610e1f2bfaae06fbdc1e60920

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                7f3c68ba80e0a647643395f491fc6253

                                                SHA1

                                                3a0b6438704b7d670a5dd11a7aa8656a8d0238a9

                                                SHA256

                                                2b67c6aeb254f9b072292e66517e708bf6afc60559afd2cb1233844fcd166a1a

                                                SHA512

                                                2a291807497bd3384d7ef612e766a4522596f86f5d30bfe46f3c89a39f4c4b271631cf3dc311df2c8e9b3c8ba5c200741be49d8b1423a6a7dc0dab8f995ee4e6

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                46295cac801e5d4857d09837238a6394

                                                SHA1

                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                SHA256

                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                SHA512

                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                206702161f94c5cd39fadd03f4014d98

                                                SHA1

                                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                SHA256

                                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                SHA512

                                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                10KB

                                                MD5

                                                5a37932f9e5ae58afb81d089ef92e3bd

                                                SHA1

                                                12b35253c0eeee858da30a90a5306923b5a20d6a

                                                SHA256

                                                5af5e44dab298f35cb933dbdd7705c32dad1693d5d2a87197a5e76a2c3fbe2c3

                                                SHA512

                                                95ccb4a31a713cff6c4b17172d34e7ed2ff85b1c575a81abe6723f3b45d0686d324bbcf095675a550c90f08e8598442108fe4fce9f14676c42fb6369fe1d360b

                                              • C:\Users\Admin\AppData\Local\Temp\nsu4690.tmp\System.dll

                                                Filesize

                                                11KB

                                                MD5

                                                6f5257c0b8c0ef4d440f4f4fce85fb1b

                                                SHA1

                                                b6ac111dfb0d1fc75ad09c56bde7830232395785

                                                SHA256

                                                b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1

                                                SHA512

                                                a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8

                                              • C:\Users\Admin\AppData\Roaming\Cape_Verde

                                                Filesize

                                                97B

                                                MD5

                                                739bc3be601fc4c312fca262597514eb

                                                SHA1

                                                c14ae4cd4e2ce75b7ea4ed39a835bc8d207f2486

                                                SHA256

                                                b645b5d403881ac66ce4171af4aced39c0a17237fb78443fae623b1f4367345f

                                                SHA512

                                                c0092979146f54dd885d4b12b0f7e37285b4116aecf4a793eb524d0b33c8ed2e7a336f97ec6d2504203d51207205f192895c1850fd6dd5f30f9848d86ef4c5fd

                                              • C:\Users\Admin\AppData\Roaming\CircleSubpicture.png

                                                Filesize

                                                2KB

                                                MD5

                                                20a07038d866854806cde137985291be

                                                SHA1

                                                0757b25acc07c221f0d178500edff240f8b3f4a3

                                                SHA256

                                                fa8b9c24c5b0ad36366a3feeedd6418849b329af3e9abf768247458423314bf2

                                                SHA512

                                                d7989f2b39237547533cfc00d11768dd9585eada20d4ddcd0e55a51fabea5ed44ac080722e017b868c36607b95abd1df21082b0bb3549f05f60fe98caa12fbd3

                                              • C:\Users\Admin\AppData\Roaming\Cool Gray 9 bl 3.ADO

                                                Filesize

                                                524B

                                                MD5

                                                48e0fb6b8052f1ab8b71b3f18e4c1a43

                                                SHA1

                                                82b1b0194cea753df8b9130a40c5688e30fce472

                                                SHA256

                                                1b39315b00fd693c9d3ebe209eed643c8e18cc3ab30aa5405069de2c92d301cd

                                                SHA512

                                                4c5d66ed0145f2705ffdd7e2132683c4a627867ff72dd2de442f24288b17bfafd6b75c391f2fe5ee6cf72660f6cc7fcfb9878f74e757ad21259b418b599365e1

                                              • C:\Users\Admin\AppData\Roaming\CoupeInvolucrum.9bY

                                                Filesize

                                                4KB

                                                MD5

                                                a5cde678454ba56e36f963911bf2556c

                                                SHA1

                                                5b1f5b664a1f649ab54c626c5eb085d58e1b102f

                                                SHA256

                                                b7b300298eee7584b59897cd77793e67ccf5faf8373ea3da7078df645fbe3a91

                                                SHA512

                                                4a8d4fa353827e40248f89c2e7dbaa18cba2c55ba32a203a243284f834aa9aad88155306e222989e65fea16f0fe7ce36759dca9b36af84be4872904a2560a698

                                              • C:\Users\Admin\AppData\Roaming\Default Menus.mnu

                                                Filesize

                                                39B

                                                MD5

                                                31296c038e3154364571e61b99f8579e

                                                SHA1

                                                3e1433612c2e7f61a1310ee47d6f4ce27a2e694e

                                                SHA256

                                                4443ae9d463bf4bdde7812237ab097327ec1d23a3f4e12b319899f2cf7a0dbb0

                                                SHA512

                                                42ae2ae55d5dbc85521cf5c4df9d510b610a62038ca6800682aa95e406b3ec9316f4c74782657f7a99e125b1a908b6ada7bb32b81a46a425f6a5de5bb88d33dc

                                              • C:\Users\Admin\AppData\Roaming\GB-H

                                                Filesize

                                                4KB

                                                MD5

                                                81da9f36f9b33e1454c01fbd4fe8bb8a

                                                SHA1

                                                1141725f4d2d4c9318381ebafabca24cfe609ada

                                                SHA256

                                                acd22725de018de883eeb647690906631e10ffa4b18c56d9cc141ebd70154d8c

                                                SHA512

                                                b511ec1c39d2ebcd0a528f70670a3ae491ad3c6d26476bd41088549ec87d51e0292696472ef812c579e2d04463435219570b453f1c0c586a4fb6da503e630b29

                                              • C:\Users\Admin\AppData\Roaming\GMT+11

                                                Filesize

                                                27B

                                                MD5

                                                41dc583620885308274e1af0be12e78e

                                                SHA1

                                                9f96a25b7539ebc2a5bc0661b65a03992b63e210

                                                SHA256

                                                f3236a2b39954dc659c25482fde3dcdc735b6b6829e3827bedb7c8c8dc72dd54

                                                SHA512

                                                ec50aefdae3b9e276b1ca87677dbb89841a91169350eb88da1bd61b84726c8ffd19de6ab037bc0159a16bd44587f01daa3421298640c168ac2562a66170f9e3e

                                              • C:\Users\Admin\AppData\Roaming\HelpButton.dll

                                                Filesize

                                                48KB

                                                MD5

                                                ed6a1f9c51825426eba9c9accc70e212

                                                SHA1

                                                f49bdd25415b979fef71b227d206ad6430860f28

                                                SHA256

                                                183fbe83a879d66e03ea757fb8c130b41e58781fa9d1b08dc3ae6a2e712e0cb6

                                                SHA512

                                                db87e2a3347c83cf305fcbf957d0aa86421b93b7bc25c4664951ef523a7b1c693221eaa42bbc69d9d594f0545167a244364493797a84e80f507cdc994fafe32b

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\SearchIndexer.lnk

                                                Filesize

                                                1KB

                                                MD5

                                                22ae7ab91e881b2687c032caa0161981

                                                SHA1

                                                359d682298cbcd9e34570b7b13124088388aa39d

                                                SHA256

                                                81e567635f17882fb7f52cf5fe431cce43aeea7f3b29296fd27340bda0cd58a6

                                                SHA512

                                                e01d07d1c60309beca9347e677f695819ee28b502efd422e1d5dcab9ee819b6dc3d2b75c8b7622232a1171cb851cc28b80873c3c455260973e79496ec2404580

                                              • C:\Users\Admin\AppData\Roaming\Servitude.W

                                                Filesize

                                                128KB

                                                MD5

                                                2fc7a60cc8016d277c0bce2ebef71ab8

                                                SHA1

                                                4085b129a87faecfaa15ef6b6b7991e770c8990d

                                                SHA256

                                                936b79427c4e2550ebb989c7db80f39b7bfc28b24fd22ee536d13aa86d924a02

                                                SHA512

                                                cf464c86bfe49500acb4e83fd76fc684267b61dd0010c68975d352d23900857fa1ebb480de06a62d5d350850a198e47af171ffabaec16faa31ae00b553d82d2a

                                              • C:\Users\Admin\AppData\Roaming\autoidx-ng.xsl

                                                Filesize

                                                942B

                                                MD5

                                                b3c15ca22e2021027f4234739b578f66

                                                SHA1

                                                f3a1ad8bd3cdd9713e719ab9040194e5fd7ce33d

                                                SHA256

                                                4e14f479ff7b4fe613d169f7509ab7cb077f90e5aff3d97008c1f40019016688

                                                SHA512

                                                8a41b35641c21b07d9740aad38101475007d72d9605a2dabc17c180679e7e190e847d2a3ae21e5e24ddb77e0552bfdac4a9ebe68681ce19188c418d4f1761541

                                              • C:\Users\Admin\AppData\Roaming\but-info.png

                                                Filesize

                                                301B

                                                MD5

                                                edf1bb40465c547e373b2057117a6997

                                                SHA1

                                                f3579744a4d76be8245b5d04ba693ab19ec520c9

                                                SHA256

                                                11edbb41223aabf180c7c15822b5e2f6f7c5d60e591c83557e3afb08819a5d8f

                                                SHA512

                                                fb19deaf1ed3540210e6b87d3f0e8b3e1f163911220a84cf2f805b70a135faf4f311aa898924ae2b5a7966dfdc021c37b9e0ce80b77fe6a3706c68e4ef5098c0

                                              • C:\Users\Admin\AppData\Roaming\compare-with-callbacks.js

                                                Filesize

                                                1KB

                                                MD5

                                                2c6f5684ce8e64e2ac4d106ec6c361dd

                                                SHA1

                                                78f431b04243778cf02f29c63ec1f10e464bde6a

                                                SHA256

                                                1d552bba9fdb2557c0a0b55c79eb322852df0e6a0bcb3b48cfbdd335f32b3552

                                                SHA512

                                                0e53cd5e0c943e9c2014b8b778811b4aa83610347f7156ef4b5f616a13a7d29552f72087fe8a956c1c9464af224dcf113232d65e913049e8be8966aa7f2887a6

                                              • C:\Users\Admin\AppData\Roaming\copy.png

                                                Filesize

                                                867B

                                                MD5

                                                35cc513ff018f47876e85c705cbf1406

                                                SHA1

                                                b4616a4cd9651952b354782f291b667f5ee9a232

                                                SHA256

                                                4edd945106ec52a068241ab556a0c549c73b1bd46b2a216d6a0f82f015dec27d

                                                SHA512

                                                80d89352840492434ddd194881f428fe4c2175bf3e13bc9fe11e4e88af187315a3180b4897bffb96bf4922ccaae9b3b9998b63d1cfb425faba30247c2b33a948

                                              • C:\Users\Admin\AppData\Roaming\cyan bl 4.ADO

                                                Filesize

                                                524B

                                                MD5

                                                6b80535edccb2506b4253ca9c4b9df69

                                                SHA1

                                                9cefb2a388e5ce03e5b9a1f2eefa7f9560c2ac14

                                                SHA256

                                                8e078310abf2897c7261c116eca316ab8b172be404c1188c8376b4a141802563

                                                SHA512

                                                9dea47b9d11d1549a0a5265bad2dd0a20d1334f36b1256e3423f0fe65831262205066d30302fec2c8cefd97b60f30cb4a8e4dcfe220f7eb757022697401c3de4

                                              • C:\Users\Admin\AppData\Roaming\double.sided.xml

                                                Filesize

                                                1013B

                                                MD5

                                                0b0b81875ffaac9b717fc9f7eb35d7b8

                                                SHA1

                                                0f5b7e8acfb0b4b0a94c8d7d543b184e7e5cdea6

                                                SHA256

                                                e17138765b5c3649e13e933f3f0e40a05da6110e9709a279e5fd4906df710cfa

                                                SHA512

                                                f721b4efa8e6238aba84f6ce86b37aded60a44430a00cdc96eb1132ef6abe53ec2394350ec196b7ee7254b27d857ef8c6e1925f407ce08859a8f5ff9321bcda8

                                              • C:\Users\Admin\AppData\Roaming\dutphon.env

                                                Filesize

                                                2KB

                                                MD5

                                                d3fd7121b844308f5e0d98218b25f7a1

                                                SHA1

                                                57eda098a5ac50befbbaed81c9358542508d2025

                                                SHA256

                                                3f19660f2ffcb1b75ce092e05a9d02128025f89a378cfa302a3fe406c065139b

                                                SHA512

                                                0512e3887235754102c623ba704421c745f43d5300a8dd31cc79d1d70a537158dd5a2a25e8e0eab69dfd8cfa234a437ebfa89abafb5c31dcaf28f745a17feca5

                                              • C:\Users\Admin\AppData\Roaming\error.xsd

                                                Filesize

                                                1KB

                                                MD5

                                                3c514691acb839524ed060bf0e2a2a11

                                                SHA1

                                                b0a7bfaa6f2c2b27dc48240a3bb948ea222a76c6

                                                SHA256

                                                cea31280b99f0c6175d51c4acfc211ac985690b1b919b46b639f32b1f61362e5

                                                SHA512

                                                29195c4016c4650f12b67130213fcdb7d9901df188db718e135be9b0b7c8fb55f950f32b68856021a51fe004405f85d24f4a9514e5b070fc394368e67b2fe3b2

                                              • C:\Users\Admin\AppData\Roaming\excluded.txt

                                                Filesize

                                                1KB

                                                MD5

                                                eca0bc75a6f145bb33aabe5108dff9a8

                                                SHA1

                                                cca370c3ebb4b3bd2bab1f9c067574f47aee3f9e

                                                SHA256

                                                a5aef44fc2041f030b33a7827777dcf98917642df83e242949eb5df532eca85e

                                                SHA512

                                                b6c0b7b9780b82ce0f00a752e9942e7905c58cf9162eaaa03940772791822c5ac36cd5230c0947e2d3d6f33e6774743adf35c1b6294cf3df28615c17fce1e332

                                              • C:\Users\Admin\AppData\Roaming\filename-prefix.xml

                                                Filesize

                                                1KB

                                                MD5

                                                ce246be1354bd6501d1ccddc9d552c68

                                                SHA1

                                                6f08c8785367189bb495fc903cd8627ef90a9174

                                                SHA256

                                                1a69e5650275cefbb8d93b2d0c02128d851de7e36ddca730a8e444b6fce467c4

                                                SHA512

                                                2a3155391b483757e3c0c302ec34dd90efe9434318ce33b52d006e68d478f9d40108fe8774893b16a1c4bc60f026d113e6ceac8aba42f09ef92fa8fe32ff6e04

                                              • C:\Users\Admin\AppData\Roaming\forward_long.png

                                                Filesize

                                                887B

                                                MD5

                                                52a6ccee7b61aaebdad8b0ac25d54680

                                                SHA1

                                                4aa90440ff85fb8eb9900f4f761e1706f8a763b7

                                                SHA256

                                                78dc9a077f420c64ac03126608e052f33a471191e55ac51625b5f8081e78c96e

                                                SHA512

                                                becce92eaa29f38b11cf2fc3b68d6feb7d2de12dac03634685a8f2f09dbfeff518d2c540830a6565d27e9e4706154fdcfb592de655ad6cb480beb5f602167fdb

                                              • C:\Users\Admin\AppData\Roaming\glossterm.auto.link.xml

                                                Filesize

                                                1KB

                                                MD5

                                                a057463e49cc7a282b9de9bd1f98c940

                                                SHA1

                                                17f203dd324b4dc61fc85a2848b93f0941946d4e

                                                SHA256

                                                ca43ac52dec0ed1083c006678f4e1e0b7e6c2882e8bcc66e76bc776b7340bfe8

                                                SHA512

                                                b18514215cc196d457629ee48c08b05078aa7b61dcd26a540ef9aa107e4231a27a80de11e068a03611c85966fcb511bf22f0ab40fc8e461cb817a1caba9c0734

                                              • C:\Users\Admin\AppData\Roaming\gray 423 bl soft.ADO

                                                Filesize

                                                524B

                                                MD5

                                                f80c22abdede870a48b813be86f1dfc4

                                                SHA1

                                                55521387353a7fe5798f2d1cea608177c175aeeb

                                                SHA256

                                                1e3b4a0cd6a9017e8ffbb611587330845608ce2508a18d11a78ea03a3f220260

                                                SHA512

                                                559d3c18a038302280f897c5fd912bd3aab360a8e9ce7cf3606ca49234cf9be22ba0171e35929634beb54f39cbe4d2fe0b9a838eb8e02198c966eb9d1acfd80b

                                              • C:\Users\Admin\AppData\Roaming\green 349 bl 1.ADO

                                                Filesize

                                                524B

                                                MD5

                                                1289782651c9af159c54bd25c344a26e

                                                SHA1

                                                5ff702833f8e0b9b2bc066d7de9e9d3885984135

                                                SHA256

                                                82020a2103aa444d0b44638ee2666fa3f077af7b5dda85433607d871d103fc39

                                                SHA512

                                                afe7c5e2df5643fec0c486c7efd9b8a440d2ac9631b70369e35b14561995ca91151c1859ef2d49e20621652cf38f024ea94898ff4c2b258380f5a92613a3df51

                                              • C:\Users\Admin\AppData\Roaming\{DD1DF27B-C96F-5C89-1ECC-2BBC7CBE9EE9}\SearchIndexer.exe

                                                Filesize

                                                195KB

                                                MD5

                                                9dba51d1d709efb322ad0babf9028c30

                                                SHA1

                                                65916448900214e4a3a130b69767edbafa1b783a

                                                SHA256

                                                ba142f897f9c3c3b677064b79a7b9e556b8a7060f7d89f98f4e95157497add29

                                                SHA512

                                                acfd650221d3fedafb4782f762f88fce7272dd5286a609aa7c22d7c741317d72983e0ca6c957144897afbefa899bed2d8cbcbdfdf1209cdfed79f346f26c07f8

                                              • memory/752-168-0x0000000002030000-0x000000000203D000-memory.dmp

                                                Filesize

                                                52KB

                                              • memory/2140-112-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-488-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-110-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-470-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-472-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-180-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-181-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-187-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-474-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-215-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-216-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-108-0x0000000003740000-0x0000000003741000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2140-106-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-105-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-476-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-452-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-455-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-458-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-466-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-118-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-485-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-482-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-479-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-494-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-491-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2140-461-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2380-45-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2380-37-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2380-36-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2380-35-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2380-34-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2380-32-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2716-30-0x00000000026D0000-0x00000000026DD000-memory.dmp

                                                Filesize

                                                52KB

                                              • memory/3712-175-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/3712-174-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/4464-101-0x0000000002170000-0x000000000217D000-memory.dmp

                                                Filesize

                                                52KB

                                              • memory/4752-213-0x00000000021C0000-0x00000000021CD000-memory.dmp

                                                Filesize

                                                52KB