Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-07-2024 19:45

General

  • Target

    http://193.117.208.109

Malware Config

Extracted

Path

C:\Users\Admin\Music\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #Cerber_Ransomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Rans0mware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF | | 2. http://cerberhhyed5frqa.onion.cab/B65A-6FB4-F9F6-0000-07EF | | 3. http://cerberhhyed5frqa.onion.nu/B65A-6FB4-F9F6-0000-07EF | | 4. http://cerberhhyed5frqa.onion.link/B65A-6FB4-F9F6-0000-07EF | | 5. http://cerberhhyed5frqa.tor2web.org/B65A-6FB4-F9F6-0000-07EF |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/B65A-6FB4-F9F6-0000-07EF | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF

http://cerberhhyed5frqa.onion.cab/B65A-6FB4-F9F6-0000-07EF

http://cerberhhyed5frqa.onion.nu/B65A-6FB4-F9F6-0000-07EF

http://cerberhhyed5frqa.onion.link/B65A-6FB4-F9F6-0000-07EF

http://cerberhhyed5frqa.tor2web.org/B65A-6FB4-F9F6-0000-07EF

http://cerberhhyed5frqa.onion/B65A-6FB4-F9F6-0000-07EF

Extracted

Path

C:\Users\Admin\Music\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber &#082;ansomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #Cerber_Ransomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Rans0mware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF" target="_blank">http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF</a></li> <li><a href="http://cerberhhyed5frqa.onion.cab/B65A-6FB4-F9F6-0000-07EF" target="_blank">http://cerberhhyed5frqa.onion.cab/B65A-6FB4-F9F6-0000-07EF</a></li> <li><a href="http://cerberhhyed5frqa.onion.nu/B65A-6FB4-F9F6-0000-07EF" target="_blank">http://cerberhhyed5frqa.onion.nu/B65A-6FB4-F9F6-0000-07EF</a></li> <li><a href="http://cerberhhyed5frqa.onion.link/B65A-6FB4-F9F6-0000-07EF" target="_blank">http://cerberhhyed5frqa.onion.link/B65A-6FB4-F9F6-0000-07EF</a></li> <li><a href="http://cerberhhyed5frqa.tor2web.org/B65A-6FB4-F9F6-0000-07EF" target="_blank">http://cerberhhyed5frqa.tor2web.org/B65A-6FB4-F9F6-0000-07EF</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF" target="_blank">http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF" target="_blank">http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF" target="_blank">http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/B65A-6FB4-F9F6-0000-07EF</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Contacts a large (16408) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 3 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://193.117.208.109
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb24046f8,0x7ffdb2404708,0x7ffdb2404718
      2⤵
        PID:2748
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2
        2⤵
          PID:1064
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4788
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:8
          2⤵
            PID:1032
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
            2⤵
              PID:4836
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
              2⤵
                PID:2276
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:8
                2⤵
                  PID:2264
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3488
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:1
                  2⤵
                    PID:3428
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:1
                    2⤵
                      PID:2428
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:1
                      2⤵
                        PID:3276
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:1
                        2⤵
                          PID:4876
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4048 /prefetch:8
                          2⤵
                            PID:116
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                            2⤵
                              PID:4152
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6164 /prefetch:8
                              2⤵
                                PID:2332
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:1
                                2⤵
                                  PID:3204
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
                                  2⤵
                                    PID:1868
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:1
                                    2⤵
                                      PID:4216
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:1
                                      2⤵
                                        PID:2352
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6480 /prefetch:8
                                        2⤵
                                          PID:1144
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1780 /prefetch:1
                                          2⤵
                                            PID:944
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 /prefetch:8
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:1920
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:1
                                            2⤵
                                              PID:4764
                                            • C:\Users\Admin\Downloads\Cerber_7 (1).exe
                                              "C:\Users\Admin\Downloads\Cerber_7 (1).exe"
                                              2⤵
                                              • Adds policy Run key to start application
                                              • Drops startup file
                                              • Executes dropped EXE
                                              • Adds Run key to start application
                                              • Modifies Control Panel
                                              • NTFS ADS
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1868
                                              • C:\Users\Admin\AppData\Roaming\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\GamePanel.exe
                                                "C:\Users\Admin\AppData\Roaming\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\GamePanel.exe"
                                                3⤵
                                                • Adds policy Run key to start application
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Adds Run key to start application
                                                • Sets desktop wallpaper using registry
                                                • Modifies Control Panel
                                                • Modifies registry class
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4092
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
                                                  4⤵
                                                    PID:2528
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xfc,0x128,0x7ffdb24046f8,0x7ffdb2404708,0x7ffdb2404718
                                                      5⤵
                                                        PID:392
                                                    • C:\Windows\system32\NOTEPAD.EXE
                                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
                                                      4⤵
                                                        PID:2696
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.onion.to/B65A-6FB4-F9F6-0000-07EF
                                                        4⤵
                                                          PID:1132
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdb24046f8,0x7ffdb2404708,0x7ffdb2404718
                                                            5⤵
                                                              PID:1292
                                                          • C:\Windows\System32\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
                                                            4⤵
                                                              PID:468
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            /d /c taskkill /t /f /im "Cerber_7 (1).exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Downloads\Cerber_7 (1).exe" > NUL
                                                            3⤵
                                                              PID:2204
                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                taskkill /t /f /im "Cerber_7 (1).exe"
                                                                4⤵
                                                                • Kills process with taskkill
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1668
                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                ping -n 1 127.0.0.1
                                                                4⤵
                                                                • Runs ping.exe
                                                                PID:3840
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:2
                                                            2⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:2352
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:1
                                                            2⤵
                                                              PID:1568
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:1
                                                              2⤵
                                                                PID:1932
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14098169258239957817,18134826536803558975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6580 /prefetch:1
                                                                2⤵
                                                                  PID:4004
                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                1⤵
                                                                  PID:3376
                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                  1⤵
                                                                    PID:4832
                                                                  • C:\Users\Admin\AppData\Roaming\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\GamePanel.exe
                                                                    C:\Users\Admin\AppData\Roaming\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\GamePanel.exe
                                                                    1⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:5132
                                                                  • C:\Users\Admin\AppData\Roaming\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\GamePanel.exe
                                                                    C:\Users\Admin\AppData\Roaming\{DFEA5107-F97C-E1D3-7283-35C06F2E9BE2}\GamePanel.exe
                                                                    1⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:3568
                                                                  • C:\Windows\system32\AUDIODG.EXE
                                                                    C:\Windows\system32\AUDIODG.EXE 0x3cc 0x33c
                                                                    1⤵
                                                                      PID:4660

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                      Filesize

                                                                      152B

                                                                      MD5

                                                                      2f842025e22e522658c640cfc7edc529

                                                                      SHA1

                                                                      4c2b24b02709acdd159f1b9bbeb396e52af27033

                                                                      SHA256

                                                                      1191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e

                                                                      SHA512

                                                                      6e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                      Filesize

                                                                      152B

                                                                      MD5

                                                                      54aadd2d8ec66e446f1edb466b99ba8d

                                                                      SHA1

                                                                      a94f02b035dc918d8d9a46e6886413f15be5bff0

                                                                      SHA256

                                                                      1971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e

                                                                      SHA512

                                                                      7e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                      Filesize

                                                                      180B

                                                                      MD5

                                                                      00a455d9d155394bfb4b52258c97c5e5

                                                                      SHA1

                                                                      2761d0c955353e1982a588a3df78f2744cfaa9df

                                                                      SHA256

                                                                      45a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed

                                                                      SHA512

                                                                      9553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      5cbf3277a7ca55810504384f314a005a

                                                                      SHA1

                                                                      7b5331630634e1e2a7e8b161195bf6e83def6eee

                                                                      SHA256

                                                                      1b2e0e3f79188816ad8e6c54ffc072df5d24d8c7141c4df9636d07aad96ca8c8

                                                                      SHA512

                                                                      30b815e1a9f3e5a41e96e27ca6c8c65ce634c51fbd9d0441e1f90fce473ce42ae13022b61aa0a061dbd6e12c02c7f59c1520643ba429c7af64499e43020e4207

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      29fcc3b086d49fe198c26e900ec6ee2d

                                                                      SHA1

                                                                      889a92e45975b0b7148534ad637f3cef75f23056

                                                                      SHA256

                                                                      39b1715cd01d68b1db0062b938bf5bfd7c38b9b97917eed8f7bbac157d13c72b

                                                                      SHA512

                                                                      920939de08eb9c8317ae60ab454b5667b602bcd422bd623b462005f5e9d8c194fa0588a4750ffbc34fe48754bb1d88c31a9a223d8b9c66deab0807b9b7e7c87d

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      3a93e65ef272e6982206007d4c4fc491

                                                                      SHA1

                                                                      95d591d501ff8cdebdad94fa3d61ad3e815c8ee1

                                                                      SHA256

                                                                      2ac6e16c19e23afc18c3dcae945754213f93f75e736fbe193cb720261af3f0d7

                                                                      SHA512

                                                                      e0d6adfda1a6f846e24f163f8efd59e55553f33086aa0ea695bf9a183eff1b50b429a49e3a356d175636a6440bb682c9a99009bbcddcdccfc14ef9e1bbea245d

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      ab5a7c7532b93c50387c45fa4363a662

                                                                      SHA1

                                                                      9e7942e22bc4584c37d536014d74be97c935d004

                                                                      SHA256

                                                                      7d28b91f8ffb925f53a450624a525bdc33dc4de029abf0f85e9a029890306e8f

                                                                      SHA512

                                                                      579c28e31b11b027260125e9d77109fac7f7a7a7d59a5e08274ad18875e9eedfd2fd6bceadb47eb31453391855e64669b88ab6b7a12e9c3dfac4a1a1ef30dab5

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      fc2be03b4110c970dfbc73c94c251f18

                                                                      SHA1

                                                                      0f00edbc40cb94a5fe919e77be60af18731bccf8

                                                                      SHA256

                                                                      21c06bdc8ee9855ee6afd0d8fec726f2ac89a8ae415da5247d3a6ee262768d8a

                                                                      SHA512

                                                                      bba1398af002fb201953a297821452ff8fa3a819ac8b649ab244998a08f0fd123acb9807543f4297c7d3bffc83a09d6246f0dfba1c0beb4797056c5f25e453d3

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      c94f1ccd6ffe7b5cf2a859f35bac5801

                                                                      SHA1

                                                                      96ad1d5d792721fbd88a900f39d23a5036ff9f93

                                                                      SHA256

                                                                      87521db49b33dde9ae8dbd91a5056e97e57de1aff28c897b4e9dee4a2aee0ce4

                                                                      SHA512

                                                                      87c31e1da5382a28cffdbb1344fb398f3a7a9b95451a8a61ece1f0ccc10e2f93d1fe42f6b9fc8bc5124d4629df96794a2fde4c9a30d22de6b3ca41865b6e6a77

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                      Filesize

                                                                      16B

                                                                      MD5

                                                                      206702161f94c5cd39fadd03f4014d98

                                                                      SHA1

                                                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                      SHA256

                                                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                      SHA512

                                                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                      Filesize

                                                                      16B

                                                                      MD5

                                                                      46295cac801e5d4857d09837238a6394

                                                                      SHA1

                                                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                      SHA256

                                                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                      SHA512

                                                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      0ed5338e905646bba95f3b540109bb23

                                                                      SHA1

                                                                      9287d5b5cd181e7b84a6a30305f747b4a017c928

                                                                      SHA256

                                                                      069ec1f6fcf04248c0d87d105f77a2a40e70c8ee84e9492a81e7f0eb7e48c17a

                                                                      SHA512

                                                                      3def19e7cd8f790eaff8048d7c515b40a5501f0843d287f41c9d1c93f732425caf1216bd960533d069b74eb2ad9a6896c38c1ff7c7c088da1c1e29502b624fcc

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      aba0edb3cc2e66f93a4a09b240c90617

                                                                      SHA1

                                                                      085724e7155a8c4bf0f5b4b51e2c06a16f712fcb

                                                                      SHA256

                                                                      902cbfd376e64a8ac2a2a98887b5c8c29726c70aace3d8af49840c50863c774c

                                                                      SHA512

                                                                      271f44fd0d8e3f6d9f8a23bd30baa1633a2c78c66b333b06e408ec4de778254337a329ec173cea9f7e74cf4839b0ce449cdf257309f616b11bc2b0b20eede68b

                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\GamePanel.lnk

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      ae061d461d65e831d55a12a76aed4ce7

                                                                      SHA1

                                                                      eedbc52f96e9ae7992307d5c690f5a5e99900fd4

                                                                      SHA256

                                                                      27ce12bda6e9238c7ed909a30409011afc2c7bc707278bb77ed7b0f5d88f036f

                                                                      SHA512

                                                                      ad3af646135fba987c7007975bdbb4d4edb7d60e40bd0c45fbf7dbb22b620c8963a61d11d9cd9fc14d9512aa2391491ad7eaaee7d6a35a1041c019f5feedc8c5

                                                                    • C:\Users\Admin\Downloads\Unconfirmed 265109.crdownload

                                                                      Filesize

                                                                      193KB

                                                                      MD5

                                                                      bd25986b516c1aaddff41235af6527fc

                                                                      SHA1

                                                                      3a786c703627216d6fd5669c50564978dfbea142

                                                                      SHA256

                                                                      02ff523b0330900767277b319cba76ee33f47d0a71774155613ed6667855adf6

                                                                      SHA512

                                                                      733ce84cc4b8a7fcdb6c0f817888a5dc0962e108892651f30d7e5e12afdd06c87954fe4ae21fa3339d12901a5bd40110670d0b3a86b53985d7500774a32b0fce

                                                                    • C:\Users\Admin\Music\# DECRYPT MY FILES #.html

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      248a408bf772b71f8054b7b730ebd7c1

                                                                      SHA1

                                                                      9577028a34a7fdc3637fd0dc046dcedbd5bbcc36

                                                                      SHA256

                                                                      b80c89dc9ee72b8f8f71084fcf83e759e73e4e747101e979e0144f37cea4675c

                                                                      SHA512

                                                                      aff0f2f95c65d7d9fb26dd0143682efd19c588c9073919c76ad4da93478048008c415cf88bb3ceb0a21e0e2fa8253b7af83453ff688246c37446e0a7ddf14608

                                                                    • C:\Users\Admin\Music\# DECRYPT MY FILES #.txt

                                                                      Filesize

                                                                      10KB

                                                                      MD5

                                                                      1728631a8bf74a8a0788048ba16bf88f

                                                                      SHA1

                                                                      cd9e79acf0b6434941cb6de1db136182fc47b313

                                                                      SHA256

                                                                      77344bf248997586c8c9a457c2ecbd48b875250971cf14dd6afc04adb1c8b1cc

                                                                      SHA512

                                                                      58420f3fdc208c7a3672f635c60f098e7c2023a730690d35a953961824e2c26c78265c6b85474b89806bcb0f411bc2b23e645e0dd613f53d803aa65bbf6f8636

                                                                    • C:\Users\Admin\Music\# DECRYPT MY FILES #.url

                                                                      Filesize

                                                                      83B

                                                                      MD5

                                                                      86d62371492ea63ec014a274d5fb9aa7

                                                                      SHA1

                                                                      87c138637b04e274f5eb48cc609889f39feadd13

                                                                      SHA256

                                                                      6afc6c71b85ae7c089eccd2b3de63575df079137ce1a468f6c54d18ba0750f0e

                                                                      SHA512

                                                                      199f932a915e07722676b8a1d7eb1d1fa36ccc9d9f659423c7380d20b13278005f0a6c0cfc7ca555ae797acfa3c0cab02171a9a0c675d38bd0e98aa84bb44532

                                                                    • C:\Users\Admin\Music\# DECRYPT MY FILES #.vbs

                                                                      Filesize

                                                                      231B

                                                                      MD5

                                                                      9d8c4bfbd009c4d6001e2125abaa8b02

                                                                      SHA1

                                                                      cd040558172b5fca5b200447a281843956243741

                                                                      SHA256

                                                                      a652297987f14317100f8c5f7eb26d1bc67eb8a64f0b39b72b5fd5046a9f29b0

                                                                      SHA512

                                                                      c4c84f43642b805a105acce9ebc9f01aa0e6ef553ea32be3f8b890fc7440f0b7d3ddf99b9336bce20ce7a3d9b9f6434a704651a8af425ffc8407ba39d5de735f

                                                                    • memory/1868-150-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/1868-165-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/1868-152-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/1868-151-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/1868-149-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/3568-239-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/3568-243-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/3568-242-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/3568-241-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/3568-240-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/4092-246-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/4092-248-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/4092-164-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/4092-234-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/4092-162-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/4092-161-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/4092-200-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/4092-163-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/4092-226-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/4092-167-0x0000000003760000-0x0000000003761000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5132-203-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/5132-205-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/5132-202-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/5132-204-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB

                                                                    • memory/5132-206-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                      Filesize

                                                                      204KB