Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-08-2024 23:52

General

  • Target

    c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe

  • Size

    191KB

  • MD5

    c7df36eb377bc1d7965c5168b261ec5d

  • SHA1

    5f046f37524868a8213d9b86f83ee57ed5140598

  • SHA256

    0771142a235814ff46baa6de400da78a31a7fb77fd3919e1978fad59edf03c20

  • SHA512

    f3f7ea21fff12888f9451185039052f330a724707688ac8e3791f28eddf4a8b00ee5a8c0bb30c8d96749c9e9e643bff51b6ee335f8f36915722e7ba9f3540b6e

  • SSDEEP

    3072:MyAaQqe90u5DdXJ745v+fxqGM1CKnXWE2J/ENGNTHO8TsgqVLZERioMCxrPY3KFC:MyAge9RVwAa0KXWlENkDTyV1ERioM0bq

Malware Config

Extracted

Path

C:\Users\Admin\Pictures\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber Ransomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #Cerber_Ransomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Rans0mware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB31" target="_blank">http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB31</a></li> <li><a href="http://cerberhhyed5frqa.adevf4.win/55E8-4626-DBD0-0042-FB31" target="_blank">http://cerberhhyed5frqa.adevf4.win/55E8-4626-DBD0-0042-FB31</a></li> <li><a href="http://cerberhhyed5frqa.fkri48.win/55E8-4626-DBD0-0042-FB31" target="_blank">http://cerberhhyed5frqa.fkri48.win/55E8-4626-DBD0-0042-FB31</a></li> <li><a href="http://cerberhhyed5frqa.xtrvb4.win/55E8-4626-DBD0-0042-FB31" target="_blank">http://cerberhhyed5frqa.xtrvb4.win/55E8-4626-DBD0-0042-FB31</a></li> <li><a href="http://cerberhhyed5frqa.cmfhty.win/55E8-4626-DBD0-0042-FB31" target="_blank">http://cerberhhyed5frqa.cmfhty.win/55E8-4626-DBD0-0042-FB31</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB31" target="_blank">http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB31</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB31" target="_blank">http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB31</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB31" target="_blank">http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB31</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/55E8-4626-DBD0-0042-FB31</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Extracted

Path

C:\Users\Admin\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #Cerber_Ransomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Rans0mware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB31 | | 2. http://cerberhhyed5frqa.adevf4.win/55E8-4626-DBD0-0042-FB31 | | 3. http://cerberhhyed5frqa.fkri48.win/55E8-4626-DBD0-0042-FB31 | | 4. http://cerberhhyed5frqa.xtrvb4.win/55E8-4626-DBD0-0042-FB31 | | 5. http://cerberhhyed5frqa.cmfhty.win/55E8-4626-DBD0-0042-FB31 |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB31); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB31 appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB31); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/55E8-4626-DBD0-0042-FB31 | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB31

http://cerberhhyed5frqa.adevf4.win/55E8-4626-DBD0-0042-FB31

http://cerberhhyed5frqa.fkri48.win/55E8-4626-DBD0-0042-FB31

http://cerberhhyed5frqa.xtrvb4.win/55E8-4626-DBD0-0042-FB31

http://cerberhhyed5frqa.cmfhty.win/55E8-4626-DBD0-0042-FB31

http://cerberhhyed5frqa.onion/55E8-4626-DBD0-0042-FB31

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Contacts a large (16402) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:888
    • C:\Users\Admin\AppData\Local\Temp\c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4692
      • C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe
        "C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1164
        • C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe
          "C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe"
          4⤵
          • Adds policy Run key to start application
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Sets desktop wallpaper using registry
          • System Location Discovery: System Language Discovery
          • Modifies Control Panel
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3428
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3180
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ff9c07746f8,0x7ff9c0774708,0x7ff9c0774718
              6⤵
                PID:796
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:2
                6⤵
                  PID:4016
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:3
                  6⤵
                    PID:4428
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:8
                    6⤵
                      PID:4580
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:1
                      6⤵
                        PID:628
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:1
                        6⤵
                          PID:736
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:1
                          6⤵
                            PID:2496
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:1
                            6⤵
                              PID:2820
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
                              6⤵
                                PID:444
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 /prefetch:8
                                6⤵
                                  PID:2188
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 /prefetch:8
                                  6⤵
                                    PID:4908
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:1
                                    6⤵
                                      PID:1920
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:1
                                      6⤵
                                        PID:3080
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:1
                                        6⤵
                                          PID:5228
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1712,16368821086297498368,16559698457884700860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:1
                                          6⤵
                                            PID:5344
                                        • C:\Windows\system32\NOTEPAD.EXE
                                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
                                          5⤵
                                            PID:3696
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.sims6n.win/55E8-4626-DBD0-0042-FB31
                                            5⤵
                                              PID:1408
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c07746f8,0x7ff9c0774708,0x7ff9c0774718
                                                6⤵
                                                  PID:740
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
                                                5⤵
                                                  PID:1852
                                                • C:\Windows\system32\cmd.exe
                                                  /d /c taskkill /t /f /im "getmac.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe" > NUL
                                                  5⤵
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  PID:5868
                                                  • C:\Windows\system32\taskkill.exe
                                                    taskkill /t /f /im "getmac.exe"
                                                    6⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5920
                                                  • C:\Windows\system32\PING.EXE
                                                    ping -n 1 127.0.0.1
                                                    6⤵
                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                    • Runs ping.exe
                                                    PID:6008
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /d /c taskkill /t /f /im "c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe" > NUL
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              • Suspicious use of WriteProcessMemory
                                              PID:5092
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /t /f /im "c7df36eb377bc1d7965c5168b261ec5d_JaffaCakes118.exe"
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1680
                                              • C:\Windows\SysWOW64\PING.EXE
                                                ping -n 1 127.0.0.1
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                • Runs ping.exe
                                                PID:5076
                                        • C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe
                                          C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetThreadContext
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of WriteProcessMemory
                                          PID:3080
                                          • C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe
                                            C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe
                                            2⤵
                                            • Executes dropped EXE
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4288
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:2500
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:1976
                                            • C:\Windows\system32\AUDIODG.EXE
                                              C:\Windows\system32\AUDIODG.EXE 0x320 0x4ec
                                              1⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:164
                                            • C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe
                                              C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe
                                              1⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetThreadContext
                                              • System Location Discovery: System Language Discovery
                                              PID:5180
                                              • C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe
                                                C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe
                                                2⤵
                                                • Executes dropped EXE
                                                PID:5804

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\# DECRYPT MY FILES #.txt

                                              Filesize

                                              10KB

                                              MD5

                                              2fc816d6d09bd2a20e5e86c9fddd5b91

                                              SHA1

                                              c785449f0834c48ade85bb3a7a8d11fc818cc227

                                              SHA256

                                              d4b827df3d84780d34edf5371b8f3eeee2fecf05eed2e92bf08df2018fb6f52d

                                              SHA512

                                              99f648253b1ac374030f8b24f23302a60d9daef46cab67475ef40063cb828576789d67b51c82b2228384d132b4be1ebd70176074b58ccfd9fca90bfb38d1ed35

                                            • C:\Users\Admin\# DECRYPT MY FILES #.url

                                              Filesize

                                              85B

                                              MD5

                                              a15789d5b26ad5373cdb93359eff19fe

                                              SHA1

                                              acff0e3a25f1bfd24456c6d5679d76e7fcfc41f2

                                              SHA256

                                              ebdedd9844f3f13c6bd226225f40d799165c3e596ff3ceb22e8b70904db9e0dc

                                              SHA512

                                              bd197a32fad10706b2af9a07ccb7418faa7942031b2d6d1407e386c5a70c4764c5450a2cd6db0930bfcb7f81b5779c6f55a393dab32b20d2d5a26410eb21fcb0

                                            • C:\Users\Admin\# DECRYPT MY FILES #.vbs

                                              Filesize

                                              225B

                                              MD5

                                              f6d629f2a4c0815f005230185bd892fe

                                              SHA1

                                              1572070cf8773883a6fd5f5d1eb51ec724bbf708

                                              SHA256

                                              ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f

                                              SHA512

                                              b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              e765f3d75e6b0e4a7119c8b14d47d8da

                                              SHA1

                                              cc9f7c7826c2e1a129e7d98884926076c3714fc0

                                              SHA256

                                              986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89

                                              SHA512

                                              a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              53bc70ecb115bdbabe67620c416fe9b3

                                              SHA1

                                              af66ec51a13a59639eaf54d62ff3b4f092bb2fc1

                                              SHA256

                                              b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771

                                              SHA512

                                              cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              1eb8df0569085764b9d29be046be4cb0

                                              SHA1

                                              e9bb6cc5109a3a41a5e04a0905604d6e258ddd25

                                              SHA256

                                              433c33e0999d1be78c58e789116f50d36723779c2ce60d539cb2fed475ce072b

                                              SHA512

                                              9926aca7d170f7a64b5d13b8f9efab813f82889c08f1f17dc4a6395a4819592c9962bdbd9772ec9705bc9c4bda610f86d64a2b2238e27845691dc607e531f7a6

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              ada107c5f1f0163a0a2915a440414221

                                              SHA1

                                              0cb5f9a8116fa28b5282f11b9eeb3da586b629e6

                                              SHA256

                                              6f4b5f9ffbdbfe58e95b250f4d39c72de2b973ac66f3ab9fe7ada52393078e82

                                              SHA512

                                              e92e5225a3b0ff2d7883b4c15fe0ccd25e8f0fb1b9b2646b9eebe1d2ca46256e795fc744923b3b15ebeb034187835bb67f2a2d2e007ddfced1112c4eba59291e

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              6752a1d65b201c13b62ea44016eb221f

                                              SHA1

                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                              SHA256

                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                              SHA512

                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              afcad7ee47655ced203a9a44d32ee2cf

                                              SHA1

                                              85e9cc5bd1e1c60d5483001d967ed7079579d2a9

                                              SHA256

                                              9c0c5102df77cc5260bac3f464be76f0645d9d38e181beff1dbf4668242fc444

                                              SHA512

                                              e11c7bdf6a61a7df13e1ce7b09f74aa277a9b809dafea56118403a55a783a0692499a5bc9627ec43dfd9cf4135378f10fcdf5192a22c6434d9ef48c25fb784f8

                                            • C:\Users\Admin\AppData\Local\Temp\nslBC3D.tmp\System.dll

                                              Filesize

                                              11KB

                                              MD5

                                              6f5257c0b8c0ef4d440f4f4fce85fb1b

                                              SHA1

                                              b6ac111dfb0d1fc75ad09c56bde7830232395785

                                              SHA256

                                              b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1

                                              SHA512

                                              a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8

                                            • C:\Users\Admin\AppData\Roaming\10.svg

                                              Filesize

                                              1KB

                                              MD5

                                              6d5f1f192e1e5dcb3feb43b9991f60ea

                                              SHA1

                                              0e65b9f9351483ddeb91f7a7b13584558df96616

                                              SHA256

                                              48dc83d59cc2968c4c80f453d6931a2ac36e7365003cfe6f07d86c211b973bd9

                                              SHA512

                                              87ed46419fc99f0299ac64adfa5abab5ef5a649a41249e1888b8311904b762895d50de52d65a6184c8608451a54de4b0b18552b39ab5826eba51836cd5002eec

                                            • C:\Users\Admin\AppData\Roaming\15.png

                                              Filesize

                                              640B

                                              MD5

                                              c98123e95a83670c84ba0e3975ea7adf

                                              SHA1

                                              eead94e70f84f44b479f48e7bca718da105b9d22

                                              SHA256

                                              55a55277a99de117c73ce703de8b00da09bee122498a2b83776192b723a9cb1e

                                              SHA512

                                              b25f4089fb985e2f830ef9ebf59e8eb298cfccb6b3fb27328f9a915be52c19277b264a17254efe771db73e795d279c82fcff7ce87c5c423fdf81adc606317868

                                            • C:\Users\Admin\AppData\Roaming\404-15.htm

                                              Filesize

                                              1KB

                                              MD5

                                              7682d2239c18a25040d9e78b0e139743

                                              SHA1

                                              f63cfad85a557169207b85aa644101c89f60f299

                                              SHA256

                                              eaf892b9c065b602c5d7e5a92349c756e2513838a51c1056f7267db428a3a0ef

                                              SHA512

                                              9149070ccffbeb37dd54d78eabdebc54dbbcbfc047f1617ab51ef5a5e62fdff1f92fd425e264543feec079bdfe9279b1f462f8d8d6904c0676263fb6d8ec366c

                                            • C:\Users\Admin\AppData\Roaming\404-5.htm

                                              Filesize

                                              1KB

                                              MD5

                                              b32ee0da29e26569bd038838f1928528

                                              SHA1

                                              8d50ef0a8ed90ea61ff3393009e795b3cea4b590

                                              SHA256

                                              b560e11a6bb6d7585b216bf2139ab01f36636f9054d26a4179a5b6ca8080ccfc

                                              SHA512

                                              f1ef5377936a193465117ccce25e6c4b90628a32eeca1f2a40ae5ebe170389bd41462bca9684916d8809e74da3c208a5a5902e2908982fc52bdbca6618ac6679

                                            • C:\Users\Admin\AppData\Roaming\Anadyr

                                              Filesize

                                              585B

                                              MD5

                                              0b49103fe701234d0b1ea1ff208171c3

                                              SHA1

                                              ab271e83639fb2f9d35358ff0338d1790dd76fc1

                                              SHA256

                                              2998ad144e0794a54caeded2fd839d792bf311923a4f513124cee0f8bc6aed4e

                                              SHA512

                                              1b31edaeb6cd7ca6803376271d00d99080412bee18764ab28004a0d3dcccdef5b9cfefbaba59e3bb9bea9bfd448b3ac0ba143bd495ab5b164b1b644338e3fa9d

                                            • C:\Users\Admin\AppData\Roaming\BMY red 3.ADO

                                              Filesize

                                              524B

                                              MD5

                                              f603a2c217b5b63995d8c39730d35491

                                              SHA1

                                              bb25bbde47ecb5f2c40db35c9bd4f6621a403337

                                              SHA256

                                              bcda37996eadb7820490356c0f70c4f47811bea513b48de5e1566c6f365945e5

                                              SHA512

                                              c2ff6fe9761eaaf520678989d516819349aa585d872dce806aca137ae23e934fee8a1462eed68cfd4cca15db40ddd02e9d32f9c4f9b69f46c267162cfa2ceb8e

                                            • C:\Users\Admin\AppData\Roaming\Bamako

                                              Filesize

                                              85B

                                              MD5

                                              313a92eb9dc6f52cf9368d7bdb49f636

                                              SHA1

                                              119974836f996a58a14584497d853e3f24b68057

                                              SHA256

                                              cde9b6a758da6349dc02027cc178ff4dd2b51676844935d134456bc814b74bdc

                                              SHA512

                                              15a851200cea62c693f3ceb03d56e77147aaea7d1019da66ea8cafca627a1316115a523c8f4f2aba9f4869d7e2cceb1e72bd328b7cdb7a11aa3f3f9a7b336d21

                                            • C:\Users\Admin\AppData\Roaming\Bishkek

                                              Filesize

                                              485B

                                              MD5

                                              ad8baefe636e08b8d937ee4303d37231

                                              SHA1

                                              0f58d13ae045ea62f4f64dedd7de4bdfef7e985c

                                              SHA256

                                              b510a9f128b96f387a21d7b719fdc1d7ae81480a94620d11456699fd76271442

                                              SHA512

                                              31b60710c0c59c882d21dd9d4eb5449c62e4f1bb75366d2b006b68f28e49f7cf63058272c0e2f8621d4bc80ccde0cc1e4cfdb503f3a513f0e2123c97524cc485

                                            • C:\Users\Admin\AppData\Roaming\Default Menus.mnu

                                              Filesize

                                              39B

                                              MD5

                                              31296c038e3154364571e61b99f8579e

                                              SHA1

                                              3e1433612c2e7f61a1310ee47d6f4ce27a2e694e

                                              SHA256

                                              4443ae9d463bf4bdde7812237ab097327ec1d23a3f4e12b319899f2cf7a0dbb0

                                              SHA512

                                              42ae2ae55d5dbc85521cf5c4df9d510b610a62038ca6800682aa95e406b3ec9316f4c74782657f7a99e125b1a908b6ada7bb32b81a46a425f6a5de5bb88d33dc

                                            • C:\Users\Admin\AppData\Roaming\GB-EUC-H

                                              Filesize

                                              4KB

                                              MD5

                                              15b9f0e2441fd17618d7a7fc6e9311d2

                                              SHA1

                                              446e32280d884e0fb9c8e804d8818636b0cf2cba

                                              SHA256

                                              7516789b109fc823443cb40dde8c6d5a4d81e7598123bea4c767de1eb7d1243d

                                              SHA512

                                              6ac1bd67b7cad14383c823680798f8cb36327a324bb99e8aa90598e1add9acab45ff371833bcca245a31018d941d059816de372966ee4312c5e875e0367c157f

                                            • C:\Users\Admin\AppData\Roaming\GIF 64 Dithered.irs

                                              Filesize

                                              1KB

                                              MD5

                                              ef627124721490d26fecd2a106eb6862

                                              SHA1

                                              3b65c37c5942591609a816424bddbe91ccccfa73

                                              SHA256

                                              aa345a078107a81e8c52607fcdd938f944a6838d80c93a42183c4da08dc2e6c4

                                              SHA512

                                              fe1b70078d01737ffbab3d000bf81ee5cc5fe718c5a477c888714ada6638224f538eba7ecb542d1ebab5c39b2b9a8630875e14e540af96ab5b1369124103e9d9

                                            • C:\Users\Admin\AppData\Roaming\GMT+7

                                              Filesize

                                              27B

                                              MD5

                                              11f8e73ad57571383afa5eaf6bc0456a

                                              SHA1

                                              65a736dddd8e9a3f1dd6fbe999b188910b5f7931

                                              SHA256

                                              0e6a7f1ab731ae6840eacc36b37cbe3277a991720a7c779e116ab488e0eeed4e

                                              SHA512

                                              578665a0897a2c05eda59fb6828f4a9f440fc784059a5f97c8484f164a5fcec95274159c6ff6336f4863b942129cb884110d14c9bd507a2d12d83a4e17f596d2

                                            • C:\Users\Admin\AppData\Roaming\GMT-8

                                              Filesize

                                              27B

                                              MD5

                                              a5c7fa421ee9dc0d1d98f366aa9b4497

                                              SHA1

                                              ced1602fad5f086ab6a35b64c08816879790162a

                                              SHA256

                                              cd05c73a160de891afc73c2f6b313ac10551eb6d3a0b750b650367ad26b81884

                                              SHA512

                                              9277c33f587b47482b3855bbfd3a943d890eae9b85ab6be54339fde3201154e8e45b2725d633ac1ad41ae3be3239a769f19b3474c3b21cabe2531d12a03ab968

                                            • C:\Users\Admin\AppData\Roaming\Gaborone

                                              Filesize

                                              77B

                                              MD5

                                              c5212e7e40cfb0cd10d4cfc7012a22d1

                                              SHA1

                                              26b1ae1d8c1c75ead9d379ce76c37d33d367ab1b

                                              SHA256

                                              ac112db94e34658ccb71484b86b88904dc8687e2a09f7fd11debf436db89ed3b

                                              SHA512

                                              188a4a28e2defd7982233e39dd98b6954a37b0def69b6b99f1333f675654de1853eb51ad719330c669bc7a9a13c475a8b0394e4ab7dcb8d6b33c5e03f323c8a3

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\getmac.lnk

                                              Filesize

                                              1KB

                                              MD5

                                              faa5d7a4c895c09ba61ce4b9ad3fbf7e

                                              SHA1

                                              a9e2324affd43dbe74421910c80e3db255890178

                                              SHA256

                                              a979993763e02179b716d3c9447501230f6897d09e6e5fee8ce23d55b7898b3f

                                              SHA512

                                              3b9e3a106f691c869ae8e3cfbefa130d7a6765736f541afc6eb340c1b94148f19a8ee23afefee575880bc6e5899594de007f3e1dd41ebb856a643265388c867e

                                            • C:\Users\Admin\AppData\Roaming\Perl.dll

                                              Filesize

                                              28KB

                                              MD5

                                              6a4ed02f66d624facceac22f19a3266a

                                              SHA1

                                              b1a7ccf40b3433bc0ea5ac4dc38f0afcff9da81a

                                              SHA256

                                              981c41a566327583e4335ce439004c9728e2a810a95735b990e97afd37d617c5

                                              SHA512

                                              bf722437bee1bc0a267d3fce0fb600ca2f2e9f1d4fc2c2a4f9c9b31d865c4ba1430e12f8cfa8db187035e583404021fcab214efa67b089648564d9504b30aff8

                                            • C:\Users\Admin\AppData\Roaming\TipAppendectomy.f

                                              Filesize

                                              1KB

                                              MD5

                                              ca41559acc4b1b1f63bd262a588a31b7

                                              SHA1

                                              99946001f1fde3363384a77b04fd249ff99afdcc

                                              SHA256

                                              9f5bbe934510b03198858861e7f35085808a1c0a89ae7f9da8e3b9e9155cdb78

                                              SHA512

                                              9a2cc46381124b848e618f29192fe28d1792ff6b2054e7a9fcd9bf1bf8482b960a04fc5d4b2098499292ebf950d1d472aaadbfbff6919db066c292780c32c92d

                                            • C:\Users\Admin\AppData\Roaming\alert.png

                                              Filesize

                                              4KB

                                              MD5

                                              dd3b3d2e4b33573dc9314c195ec16ad2

                                              SHA1

                                              cff1a2cf0288e3941d47e3847daf3acd2ccab328

                                              SHA256

                                              d3866fb4241b3069a7d7bca80dcf0a4266c6bf08b1142df51c5b993abeacd0ce

                                              SHA512

                                              f5eed963ee7fb793d2f4944878a0cffd2d88de498a7a3cf58ddcf03daf7f2cc9a634f43124812a9e994411fb5bbaa8954b5d03b6ef3bd3dfac67c2706627bacb

                                            • C:\Users\Admin\AppData\Roaming\atstamp.xsl

                                              Filesize

                                              2KB

                                              MD5

                                              ee1ea399056a74f3e90996b198b23533

                                              SHA1

                                              1bf06bc18cd19e769a23fb1c7dde3ac82d1dc05e

                                              SHA256

                                              0d5620c426c14276135373978f381b53dc5d0fd0b9c3ec0d07e597eb53f8c3ae

                                              SHA512

                                              497222110bb4698ef6034b166577c53c9c06b48c26bcbe2dfcb97299fee0aed7268e3733c171a019ddafe92cbea10795cf3ae2995bfed94e2127a9e83c09a0e4

                                            • C:\Users\Admin\AppData\Roaming\chrome.manifest

                                              Filesize

                                              108B

                                              MD5

                                              7b43d30d4ae41144de0bdf0dec1ca287

                                              SHA1

                                              b22140ddf86afd5ec099098b5f4282c62a14246c

                                              SHA256

                                              cde318a46a1b354eca6a1f02e7f0d8c1118abe4c032330d04f25d057d99281b4

                                              SHA512

                                              5d8b58167c8019c0e93a8eab5a48f9a04f5ec0b9d71c87931ce7c2280c8e58d3338a2698d4519ed0c5fb60a4287c6105965a3ebcf23d527d8c78eb78d1ebf0f5

                                            • C:\Users\Admin\AppData\Roaming\cloud_Thumbnail.bmp

                                              Filesize

                                              4KB

                                              MD5

                                              7ef5e8f497d92a03e960c8c43cfb805c

                                              SHA1

                                              3ee56f16fafb757da51306c5a4710f096ca4cc32

                                              SHA256

                                              5d3e3207a2a1375c110ecd8296ed77972ab5a5d517ebad6c0533a11cbb646812

                                              SHA512

                                              83b329aeb3e893eaf422994495594aba0134044de39ae98f8966d20a50c28e100daad5e5f7bbb0dedd8983a1a9f62564cee4aa0822d684e38978db104a43b166

                                            • C:\Users\Admin\AppData\Roaming\connection.png

                                              Filesize

                                              287B

                                              MD5

                                              c6ff2cbe837f7bb191a3dd17f855c7d4

                                              SHA1

                                              d8a837f474a2c432d60e02d8117ea1cb2a5a873b

                                              SHA256

                                              bc16225b3aab11c8f32020b76a330fc37eb0acff6ad21fe2f5d94fd4459288b1

                                              SHA512

                                              0f8b53824bc8447695d72ea948e6c404fef9e3950304b8ac8da2bb39d9d6073f951e4c587fefa4cc246599c259e04ecfc5370de13623eac008e66c3cfeb58263

                                            • C:\Users\Admin\AppData\Roaming\cpu_cache.png

                                              Filesize

                                              3KB

                                              MD5

                                              d5ac73cc778c7f4047eac63c162a1996

                                              SHA1

                                              af275b4f656a5beda641c4fa5cbd5c9cc2622c5b

                                              SHA256

                                              0c63d814477288aed4e20c2b898cdc8e343d1b9d4b8991f4191e998a1652940d

                                              SHA512

                                              e2151b6c32e0d9d2ea9e64cfb74709271b4494867b029f6d7af7fb297d84a2204f66bf724785b667b5db237a6dd128af0842419c6da259bf2f90a890a431bcf5

                                            • C:\Users\Admin\AppData\Roaming\dsfroot.inf

                                              Filesize

                                              1KB

                                              MD5

                                              a9525c72b61ca351d7adc155866f3331

                                              SHA1

                                              1acd90bbb46c2d8ede1018bb62e8fbf4b788326f

                                              SHA256

                                              44f7115e9c4a02f1a1d712ba719094c5e68f7850bd9247dc14d381ac53ad1c19

                                              SHA512

                                              15d2512ab113662728af610d2c9c2583043bf20b53433a2e1aa11590a3c61da6a48c0ba8bd7268abb7ca4e5bea9f54cb95bc397a004490b4efe134b2355d431a

                                            • C:\Users\Admin\AppData\Roaming\ehdrv.inf

                                              Filesize

                                              1KB

                                              MD5

                                              f7680db2f3ca203a38412d3fbd5a7df4

                                              SHA1

                                              f3789f83109ea8277428c5e5bbc624ba6b610ac4

                                              SHA256

                                              65fc65d02fc9a1ce34795bc08937f592df73602e8e19376c89d689a92fe002cb

                                              SHA512

                                              8489955f064421a07b20eb8d5a9da743aa5d860b6e475614b7523ac060e461a87320b4f49f166feebc85b03ed9fe9e330e5a3df2c5497d47134f3d396b84ef58

                                            • C:\Users\Admin\AppData\Roaming\f11.png

                                              Filesize

                                              1KB

                                              MD5

                                              df3ab2210fccd0c5d8b4279fd4391417

                                              SHA1

                                              7dac476b07ed01ba6a971a6eaf764924cebcf339

                                              SHA256

                                              4c4cbcb81ee87fb708e52a0f22e85b2ba8331db31f5f853387c149c975c1fa8f

                                              SHA512

                                              04c07790f3b9d80da43b61ccc1186480b22b90f69e958a22afaffcdf2f2d2c55426cc64ec0efc3e7966cf05e2468c725e98df1b4590d1e88f541af74df3e8cb1

                                            • C:\Users\Admin\AppData\Roaming\f26.png

                                              Filesize

                                              1KB

                                              MD5

                                              31a4f57993e8039d7bc4dbd31184c397

                                              SHA1

                                              cec7bb8a22245eb3c0277c50fcacd27d10ebe722

                                              SHA256

                                              8af5c3a634d4ec1ca556d442ca1fe3cbc41401a4739758adf6af0a8743d0e0dd

                                              SHA512

                                              aa09075a0b7f8717976450c11ac17cab24dcc1cc118b4521c53bdecc1ccf66f1febcae92e6b55936a60e278274f4b57408a15f090e460acf74769159aefd1822

                                            • C:\Users\Admin\AppData\Roaming\fix.jpg

                                              Filesize

                                              932B

                                              MD5

                                              97ff50949348e378d3f177af3ddd68c4

                                              SHA1

                                              650b87565a7e1806eeabdddacf49840d72736791

                                              SHA256

                                              a23a733e4d6b2bd48d9b80d60c13f34f0ba8b0bc1d00d0cf33497e0d3f47a632

                                              SHA512

                                              25485dd166febeec416f6080daedba400f1738813269d94477e7d5630e2d3591842ec095f6561b3ba615a231d68c68b2b1bf1c1c8dee34a45a7eb991ea06d8db

                                            • C:\Users\Admin\AppData\Roaming\globe.png

                                              Filesize

                                              2KB

                                              MD5

                                              eed8f97cfcee662001cc34f0ca382db1

                                              SHA1

                                              631106c6b1d5b6e70e670b2f4eee3757c072f13a

                                              SHA256

                                              8d330af6424df369cf4e383ff5dd374742cabce0fdc8473bb9e12ccb5ad7649f

                                              SHA512

                                              b5215164ef4a5169c6e1888031f98a0048ec9b00ffb85dfdfb572190e70afb4e080c94c7a514ed8beab2e2551ace99ab9f4b3deb556d011af2982fbb4d630fc6

                                            • C:\Users\Admin\AppData\Roaming\{19923940-1D30-C683-172B-F15FA51771E4}\getmac.exe

                                              Filesize

                                              191KB

                                              MD5

                                              c7df36eb377bc1d7965c5168b261ec5d

                                              SHA1

                                              5f046f37524868a8213d9b86f83ee57ed5140598

                                              SHA256

                                              0771142a235814ff46baa6de400da78a31a7fb77fd3919e1978fad59edf03c20

                                              SHA512

                                              f3f7ea21fff12888f9451185039052f330a724707688ac8e3791f28eddf4a8b00ee5a8c0bb30c8d96749c9e9e643bff51b6ee335f8f36915722e7ba9f3540b6e

                                            • C:\Users\Admin\Pictures\# DECRYPT MY FILES #.html

                                              Filesize

                                              12KB

                                              MD5

                                              f16efeaecbf8c6f88a78dfb313ee8425

                                              SHA1

                                              88209e0abd22362ca85c5ec045327b7289c6d4f1

                                              SHA256

                                              26f46f2e5b918493892493c09b0900bb393ae742913b7cde2bdca8301b3abe1f

                                              SHA512

                                              cf9b9a4af16c284112912a0294104ec7dc53d74a373f7205d74c789c2d0ec59309a3b52f1535ea7b8e221e0e59f90eb8214450061a96f43ad73cbcb4d2ced649

                                            • memory/3428-131-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-570-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-634-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-538-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-209-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-210-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-212-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-213-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-136-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-135-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-133-0x0000000003770000-0x0000000003771000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/3428-130-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-380-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-555-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-564-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-574-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-571-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-138-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-567-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-562-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-559-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-557-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-553-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-551-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-549-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-548-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-545-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3428-544-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/4288-206-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/4288-205-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/4692-58-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/4692-46-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/4692-45-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/4692-44-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/4692-43-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/4692-41-0x0000000000400000-0x0000000000424000-memory.dmp

                                              Filesize

                                              144KB