Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/08/2024, 08:27

240803-kcfvysxfjl 3

03/08/2024, 08:26

240803-kb15hasdmh 3

02/08/2024, 23:17

240802-292x5avcjr 6

02/08/2024, 23:16

240802-29ahwaygrc 6

02/08/2024, 23:13

240802-27q3vaygma 6

02/08/2024, 23:10

240802-256qhsvbjm 8

02/08/2024, 23:08

240802-24j55avanm 8

02/08/2024, 23:05

240802-2282gayerh 7

02/08/2024, 23:03

240802-21vgpayepe 10

02/08/2024, 22:59

240802-2yey8aydqc 6

Analysis

  • max time kernel
    82s
  • max time network
    75s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 22:40

General

  • Target

    https://github.com/Endermanch/MalwareDatabase

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___JSBUH_.txt

Family

cerber

Ransom Note
Hi, I'am CRBR ENCRYPTOR ;) ----- ALL YOUR DOCUMENTS, PH0T0S, DATABASES AND OTHER IMPORTANT FILES HAVE BEEN ENCRYPTED! ----- The only one way to decrypt your files is to receive the private key and decryption program. To receive the private key and decryption program go to any decrypted folder, inside there is the special file (*_R_E_A_D___T_H_I_S_*) with complete instructions how to decrypt your files. If you cannot find any (*_R_E_A_D___T_H_I_S_*) file at your PC, follow the instructions below: ----- 1. Download "Tor Browser" from https://www.torproject.org/ and install it. 2. In the "Tor Browser" open your personal page here: http://xpcx6erilkjced3j.onion/AD24-F30D-F5C1-0098-B56A Note! This page is available via "Tor Browser" only. ----- Also you can use temporary addresses on your personal page without using "Tor Browser". ----- 1. http://xpcx6erilkjced3j.1n5mod.top/AD24-F30D-F5C1-0098-B56A 2. http://xpcx6erilkjced3j.19kdeh.top/AD24-F30D-F5C1-0098-B56A 3. http://xpcx6erilkjced3j.1mpsnr.top/AD24-F30D-F5C1-0098-B56A 4. http://xpcx6erilkjced3j.18ey8e.top/AD24-F30D-F5C1-0098-B56A 5. http://xpcx6erilkjced3j.17gcun.top/AD24-F30D-F5C1-0098-B56A ----- Note! These are temporary addresses! They will be available for a limited amount of time! -----
URLs

http://xpcx6erilkjced3j.onion/AD24-F30D-F5C1-0098-B56A

http://xpcx6erilkjced3j.1n5mod.top/AD24-F30D-F5C1-0098-B56A

http://xpcx6erilkjced3j.19kdeh.top/AD24-F30D-F5C1-0098-B56A

http://xpcx6erilkjced3j.1mpsnr.top/AD24-F30D-F5C1-0098-B56A

http://xpcx6erilkjced3j.18ey8e.top/AD24-F30D-F5C1-0098-B56A

http://xpcx6erilkjced3j.17gcun.top/AD24-F30D-F5C1-0098-B56A

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Contacts a large (1099) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Drops startup file 1 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in System32 directory 38 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Endermanch/MalwareDatabase
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4352
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8af5dcc40,0x7ff8af5dcc4c,0x7ff8af5dcc58
      2⤵
        PID:1644
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,14801402093352212159,8025520752879804255,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1880 /prefetch:2
        2⤵
          PID:3492
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,14801402093352212159,8025520752879804255,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2164 /prefetch:3
          2⤵
            PID:2308
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,14801402093352212159,8025520752879804255,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2416 /prefetch:8
            2⤵
              PID:988
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,14801402093352212159,8025520752879804255,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3128 /prefetch:1
              2⤵
                PID:1400
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,14801402093352212159,8025520752879804255,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3168 /prefetch:1
                2⤵
                  PID:3396
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4608,i,14801402093352212159,8025520752879804255,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4620 /prefetch:8
                  2⤵
                    PID:2376
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4884,i,14801402093352212159,8025520752879804255,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5080 /prefetch:8
                    2⤵
                      PID:4364
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5136,i,14801402093352212159,8025520752879804255,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5228 /prefetch:8
                      2⤵
                        PID:4624
                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                      1⤵
                        PID:3968
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                        1⤵
                          PID:3512
                        • C:\Windows\System32\rundll32.exe
                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                          1⤵
                            PID:2448
                          • C:\Users\Admin\AppData\Local\Temp\Temp1_Cerber 5.zip\[email protected]
                            "C:\Users\Admin\AppData\Local\Temp\Temp1_Cerber 5.zip\[email protected]"
                            1⤵
                            • Drops startup file
                            • Enumerates connected drives
                            • Drops file in System32 directory
                            • Sets desktop wallpaper using registry
                            • Drops file in Program Files directory
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3212
                            • C:\Windows\SysWOW64\netsh.exe
                              C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
                              2⤵
                              • Modifies Windows Firewall
                              • Event Triggered Execution: Netsh Helper DLL
                              • System Location Discovery: System Language Discovery
                              PID:4176
                            • C:\Windows\SysWOW64\netsh.exe
                              C:\Windows\system32\netsh.exe advfirewall reset
                              2⤵
                              • Modifies Windows Firewall
                              • Event Triggered Execution: Netsh Helper DLL
                              • System Location Discovery: System Language Discovery
                              PID:2436
                            • C:\Windows\SysWOW64\mshta.exe
                              "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___JLCYCLH_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:4440
                            • C:\Windows\SysWOW64\NOTEPAD.EXE
                              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___R7O5O1XB_.txt
                              2⤵
                              • System Location Discovery: System Language Discovery
                              • Opens file in notepad (likely ransom note)
                              PID:2892
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "E" > NUL & ping -n 1 127.0.0.1 > NUL & del "C" > NUL && exit
                              2⤵
                              • System Location Discovery: System Language Discovery
                              • System Network Configuration Discovery: Internet Connection Discovery
                              PID:736
                              • C:\WINDOWS\SysWOW64\taskkill.exe
                                taskkill /f /im "E"
                                3⤵
                                • System Location Discovery: System Language Discovery
                                • Kills process with taskkill
                                PID:4600
                              • C:\WINDOWS\SysWOW64\PING.EXE
                                ping -n 1 127.0.0.1
                                3⤵
                                • System Location Discovery: System Language Discovery
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:4480
                          • C:\Users\Admin\AppData\Local\Temp\Temp1_Birele.zip\[email protected]
                            "C:\Users\Admin\AppData\Local\Temp\Temp1_Birele.zip\[email protected]"
                            1⤵
                            • Modifies WinLogon for persistence
                            • Impair Defenses: Safe Mode Boot
                            • Adds Run key to start application
                            • System Location Discovery: System Language Discovery
                            PID:3800
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM explorer.exe
                              2⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              PID:1472

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            2KB

                            MD5

                            b9c6f1207e4aec277c4cee4c68c58d67

                            SHA1

                            e455de996317c5b3cd81bb7ec5156952cacf8baf

                            SHA256

                            a83102beaab03ae09fb99b0cb727eca2c5f82f7f05b65b4eb448a77cf6ed3333

                            SHA512

                            084c40b1e5baf39c6bb415438ae4dadef22523b86002d0668b299c6244ec6b43b66436558d06affa5e3c9d54a121864aaa7a2c80bd0b76da5dbc7d7c9dbfa8cc

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            2KB

                            MD5

                            6609994e3a21f30296a9114a8dd26784

                            SHA1

                            eccee612141f9baea815d334cb956ef2768ea521

                            SHA256

                            d9b5cd0c4806cf6a0c1b2b938fe687d24e650d267205497862eb77e23f6011c6

                            SHA512

                            da4fd686058fa4d88e1895a2fe1679154025d3fffe80cd9c4e33fb8123d520ecc45d0b091ee9a96b8412a4907abda58fdd0341a9a0e1537e52eae9e9e02b2711

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            1KB

                            MD5

                            2d544204c9047e5d0ab92d30805a8e59

                            SHA1

                            f28f90ee9d6f60321c7e4a0a124993d9d4eec42c

                            SHA256

                            b87b446ea1df46b3b531edc7b7d2b044af8bacdb8cd84bff44f5dbc544fcdba1

                            SHA512

                            915f776ff6a9eafc5c819f90e0917a275eecd9c6382195e7b39692151c71fa8f1b91ccdb76f25f5041db9e626ea9a05f73ad05396f8a66bac36da4e8a82b5e3f

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            1KB

                            MD5

                            01e649b1061725b6e8424c163b4da1cd

                            SHA1

                            84a4b24ee430880b5e5209b62c7c47d0d534021d

                            SHA256

                            efd8d5a6f9f3b36531b17c804a593073dae27088e6d0bd63bfd73843d57444fb

                            SHA512

                            f4c85f66733aa8b86aefdb550d68f281a45c41d87ddc0b9da707581b0858f5582155d0e6e2be70acd3c1c4c7883ca1e13ff35f144cc797e995a7076380d4957a

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            1KB

                            MD5

                            622abec8dd3a7bcfbfa4ebc92b69d379

                            SHA1

                            ad89abe252a7ed57a7afd5bccd0266e255db37c6

                            SHA256

                            0e42bc68bfb495ff04c21673af08a6ed1746b8a8f8d85b931c2129534b60e374

                            SHA512

                            f3e4b06dab55d8219808c980ab2564c41c9e85e85ab82531a7b16899a8d508356b378b47434dac1e2833398f2b423936ae398faebfe05416f3d892628f4133e1

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            8KB

                            MD5

                            35d07e2e1c7ef2f4292b60611656d7a7

                            SHA1

                            48296e2f0f824c5e6e28afe9b1232d11bb08128c

                            SHA256

                            06e9d4d3be987ef54095cd033017f3414e7b7e131f2cfdd226936f02c093044a

                            SHA512

                            272717d83422272ee836f150a4cf8f3b062229b6491b200803e4ae86e9505ca6cf4f676fcbb6b9815668423f6339360e65daf27eb556bc26247e38c9ea55ed19

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            8KB

                            MD5

                            c36bafdae0aa34da0191c9edd3e6f57e

                            SHA1

                            9f2e6d6beff1bf88d8e9e1ccb9eafaf16c81e847

                            SHA256

                            c15767f7232709d48675ecbb918db7d865194551f374ef93526fc6a4e146ee5c

                            SHA512

                            f618277810236bb949cfe47861e23169ea78524d71583c819e4614059ab132532e868a3d29543838e70016b2288afa8d408b8b340aec57a0a6a12d0574ec16d6

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            8KB

                            MD5

                            9f95fc2103e65bb3eac525aa3f83e7a6

                            SHA1

                            831f0a63ed230015c0b1001212d84a257a0e8c20

                            SHA256

                            5ecff00d349e88acc0ca5361145df3d0cdde86624e9e41fe536ae7854409b7ba

                            SHA512

                            e298af11a3380093ab2ffc3de77d293eed6974125e6bc3acf41578e96d0658e5a002830abcb748aa81933373bdf8b5a16c24bf97e6982ea21641f4643119202e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            8KB

                            MD5

                            d641527493fc8d36dc82af63dca85fc4

                            SHA1

                            f108a2aec316037990e905b9827c027072c570da

                            SHA256

                            07e5b195bd15ecd762c87ebfaba038cb710eb581a15ded2f8a3651c6b2665496

                            SHA512

                            67f3a5362c0f0cb35a14769676cf1f437a473dac92a7471a4ff31caf25b4370aaebe4099469f2902155d99c94626ff8c7f98827096c843ee485933909c1eebac

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            e2e305f60f7a0ad5bb5251f37ade5f70

                            SHA1

                            8c7ddd1913c1501fd3af715cdd06fdec460c1449

                            SHA256

                            feb77759eaa46395a68a9b05d5818ba26d744bbea6d76b5ce171fb8107859ec6

                            SHA512

                            21b56386fed5c972ffe4c6e72241ff79fa59dd9a575fb6bd09621b0a290dc89a7640efc7a417578eef5c3d95415c172309d12e411282b40e1693eaf62c715f2f

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            99KB

                            MD5

                            baf064cb5cd63b4e7d03604fa4ee4601

                            SHA1

                            646e6bd4ce5dd22abd41385e421285a909461cc0

                            SHA256

                            2abc3dfba9b639303d6ba49f7ef29c087a1c7661c6b625b5c0bb816ab3d2c514

                            SHA512

                            43729820108ff0314b81b5d7b47f0b7b6ec176898421a771d07999843352eb0cdebcfb19e703fc925490edcdb6fb4b8b75e5042afa17bb96de0eaacbb7bc7826

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            99KB

                            MD5

                            fc31aee2466a3a323c253e17a8b34e7f

                            SHA1

                            9a39eca1b02c071d6cb7ca420f70ebe6f2703778

                            SHA256

                            aabaf6b834316d580000c1545578d1c84ab87aa2e79d201e069ce957741bc215

                            SHA512

                            a1aa5538baba9895ae69737ad4e24b9b75b391366fbae7faa6417bd35fa2aa16dcb81d118959b9946cffc645ab54a855a128800a9b6047650561575f832f9839

                          • C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___JSBUH_.txt

                            Filesize

                            1KB

                            MD5

                            ecdbb8066094a95b5d53b5c05c431057

                            SHA1

                            2224af33862fe32ef899d3881e0407204f189e85

                            SHA256

                            d673ab0af9d706b457ef8c372bdf0737f3152c03ce5abd11becd6a4df13acfcd

                            SHA512

                            87b6473c767511bbc8ddc13426457ac79a422b44e60649457f612cba31ac5c8a8847df4d59e6a49a846c0cc48d24844ebed67a309c08351defb7f290f16e9205

                          • C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___S97A0_.hta

                            Filesize

                            75KB

                            MD5

                            72e474fdf38a7a4bf3ebe303ec9fc886

                            SHA1

                            a9b2416cd015893f59dfbede2e228153e33893d9

                            SHA256

                            4c1a90de39754b5bdd9873b4b3cb547f1e21fb389947b8c961713b3ada0b0c9c

                            SHA512

                            5b2b3d3b100b420672d8a533f2f9483c34cc6ac4cbdb967f6e07d3bbcae155cd2413764d3c1fa32b5ebc4bfb7b2b28e143bdb84c7911ab650ffbdf969fad3e0c

                          • C:\Users\Admin\Downloads\Birele.zip.crdownload

                            Filesize

                            113KB

                            MD5

                            6ca327b67f1a2b2a4fbb7f342e15e7bf

                            SHA1

                            aab4a7d8199e8416ad8649fede35b846fc96f082

                            SHA256

                            460a3e3a039c2d0bb2c76017b41403bf3e92727269f49b08778d33108278b58f

                            SHA512

                            b7a7574ca52885e531aca71ebe52f7832f8a2436cda047e7686936fe0337eae7c4ebcc57df27c26316871d4167ea4e6794beb933f7c13efb0addac0d400e4d9a

                          • C:\Users\Admin\Downloads\Cerber 5.zip.crdownload

                            Filesize

                            181KB

                            MD5

                            10d74de972a374bb9b35944901556f5f

                            SHA1

                            593f11e2aa70a1508d5e58ea65bec0ae04b68d64

                            SHA256

                            ab9f6ac4a669e6cbd9cfb7f7a53f8d2393cd9753cc1b1f0953f8655d80a4a1df

                            SHA512

                            1755be2bd1e2c9894865492903f9bf03a460fb4c952f84b748268bf050c3ece4185b612c855804c7600549170742359f694750a46e5148e00b5604aca5020218

                          • memory/3212-639-0x0000000000400000-0x0000000000433000-memory.dmp

                            Filesize

                            204KB

                          • memory/3212-252-0x0000000000400000-0x0000000000433000-memory.dmp

                            Filesize

                            204KB

                          • memory/3212-690-0x0000000000400000-0x0000000000433000-memory.dmp

                            Filesize

                            204KB

                          • memory/3212-249-0x0000000000400000-0x0000000000433000-memory.dmp

                            Filesize

                            204KB

                          • memory/3212-243-0x0000000000400000-0x0000000000433000-memory.dmp

                            Filesize

                            204KB

                          • memory/3212-242-0x0000000001520000-0x0000000001551000-memory.dmp

                            Filesize

                            196KB

                          • memory/3800-711-0x0000000000400000-0x0000000000438000-memory.dmp

                            Filesize

                            224KB

                          • memory/3800-712-0x0000000000400000-0x0000000000438000-memory.dmp

                            Filesize

                            224KB

                          • memory/3800-728-0x0000000000400000-0x0000000000438000-memory.dmp

                            Filesize

                            224KB