Resubmissions

15-09-2024 17:48

240915-wdv7tavfnh 6

15-09-2024 17:45

240915-wb81wsverh 10

Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-09-2024 17:45

General

  • Target

    https://github.com/kh4sh3i/Ransomware-Samples

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___3NGDOG_.hta

Family

cerber

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>C&#069;&#82;BE&#82; &#82;ANSOMWA&#82;&#069;: Instructi&#111;ns</title> <HTA:APPLICATION APPLICATIONNAME="4NyZcox" SCROLL="yes" SINGLEINSTANCE="yes" WINDOWSTATE="maximize"> <style type="text/css"> a { color: #04a; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #222; font-family: "Lucida Sans Unicode", "Lucida Grande", sans-serif; font-size: 13pt; line-height: 19pt; } body, h1 { margin: 0; padding: 0; } hr { color: #bda; height: 2pt; margin: 1.5%; } h1 { color: #555; font-size: 14pt; } ol { padding-left: 2.5%; } ol li { padding-bottom: 13pt; } small { color: #555; font-size: 11pt; } ul { list-style-type: none; margin: 0; padding: 0; } .button { color: #04a; cursor: pointer; } .button:hover { text-decoration: underline; } .container { background-color: #fff; border: 2pt solid #c7c7c7; margin: 5%; min-width: 850px; padding: 2.5%; } .header { border-bottom: 2pt solid #c7c7c7; margin-bottom: 2.5%; padding-bottom: 2.5%; } .h { display: none; } .hr { background: #bda; display: block; height: 2pt; margin-top: 1.5%; margin-bottom: 1.5%; overflow: hidden; width: 100%; } .info { background-color: #efe; border: 2pt solid #bda; display: inline-block; padding: 1.5%; text-align: center; } .updating { color: red; display: none; padding-left: 35px; background: url("data:image/gif;base64,R0lGODlhGQAZAKIEAMzMzJmZmTMzM2ZmZgAAAAAAAAAAAAAAACH/C05FVFNDQVBFMi4wAwEAAAAh+QQFAAAEACwAAAAAGQAZAAADVki63P4wSEiZvLXemRf4yhYoQ0l9aMiVLISCDms+L/DIwwnfc+c3qZ9g6Hn5hkhF7YgUKI2dpvNpExJ/WKquSoMCvd9geDeuBpcuGFrcQWep5Df7jU0AACH5BAUAAAQALAoAAQAOABQAAAMwSLDU/iu+Gdl0FbTAqeXg5YCdSJCBuZVqKw5wC8/qHJv2IN+uKvytn9AnFBCHx0cCACH5BAUAAAQALAoABAAOABQAAAMzSLoEzrC5F9Wk9YK6Jv8gEYzgaH4myaVBqYbfIINyHdcDI+wKniu7YG+2CPI4RgFI+EkAACH5BAUAAAQALAQACgAUAA4AAAMzSLrcBNDJBeuUNd6WwXbWtwnkFZwMqUpnu6il06IKLChDrsxBGufAHW0C1IlwxeMieEkAACH5BAUAAAQALAEACgAUAA4AAAM0SLLU/lAtFquctk6aIe5gGA1kBpwPqVZn66hl1KINPDRB3sxAGufAHc0C1IkIxcARZ4QkAAAh+QQFAAAEACwBAAQADgAUAAADMUhK0vurSfiko8oKHC//yyCCYvmVI4cOZAq+UCCDcv3VM4cHCuDHOZ/wI/xxigDQMAEAIfkEBQAABAAsAQABAA4AFAAAAzNIuizOkLgZ13xraHVF1puEKWBYlUP1pWrLBLALz+0cq3Yg324PAUAXcNgaBlVGgPAISQAAIfkEBQAABAAsAQABABQADgAAAzRIujzOMBJHpaXPksAVHoogMlzpZWK6lF2UjgobSK9AtjSs7QTg8xCfELgQ/og9I1IxXCYAADs=") left no-repeat; } #change_language { float: right; } #change_language, #texts div { display: none; } </style> </head> <body> <div class="container"> <div class="header"> <a id="change_language" href="#" onclick="return changeLanguage1();" title="English">&#9745; English</a> <h1>C&#069;&#82;BE&#82; &#82;ANSOMWA&#82;&#069;</h1> <small id="title">Instructions</small> </div> <div id="languages"> <p>&#9745; Select your language</p> <ul> <li><a href="#" title="English" onclick="return sh_bl('en');">English</a></li> <li><a href="#" title="Arabic" onclick="return sh_bl('ar');">العربية</a></li> <li><a href="#" title="Chinese" onclick="return sh_bl('zh');">中文</a></li> <li><a href="#" title="Dutch" onclick="return sh_bl('nl');">Nederlands</a></li> <li><a href="#" title="French" onclick="return sh_bl('fr');">Français</a></li> <li><a href="#" title="German" onclick="return sh_bl('de');">Deutsch</a></li> <li><a href="#" title="Italian" onclick="return sh_bl('it');">Italiano</a></li> <li><a href="#" title="Japanese" onclick="return sh_bl('ja');">日本語</a></li> <li><a href="#" title="Korean" onclick="return sh_bl('ko');">한국어</a></li> <li><a href="#" title="Polish" onclick="return sh_bl('pl');">Polski</a></li> <li><a href="#" title="Portuguese" onclick="return sh_bl('pt');">Português</a></li> <li><a href="#" title="Spanish" onclick="return sh_bl('es');">Español</a></li> <li><a href="#" title="Turkish" onclick="return sh_bl('tr');">Türkçe</a></li> </ul> </div> <div id="texts"> <div id="en"> <p>Can't yo<span class="h">1Ie7L</span>u find the necessary files?<br>Is the c<span class="h">N6IDKNObg</span>ontent of your files not readable?</p> <p>It is normal be<span class="h">SIxJ</span>cause the files' names and the data in your files have been encryp<span class="h">8wjdh92bEN</span>ted by "Ce<span class="h">LxsIpNYhxF</span>r&#98;er&nbsp;Rans&#111;mware".</p> <p>It me<span class="h">wQAe</span>ans your files are NOT damage<span class="h">VXRLO</span>d! Your files are modified only. This modification is reversible.<br>F<span class="h">yslpR</span>rom now it is not poss<span class="h">Ag</span>ible to use your files until they will be decrypted.</p> <p>The only way to dec<span class="h">Wcn8qmBa</span>rypt your files safely is to &#98;uy the special decryption software "C<span class="h">K</span>er&#98;er&nbsp;Decryptor".</p> <p>Any attempts to rest<span class="h">kMklgS1C</span>ore your files with the thir<span class="h">cmFZ</span>d-party software will be fatal for your files!</p> <hr> <p class="w331208">You can proc<span class="h">sI4MGyu</span>eed with purchasing of the decryption softw<span class="h">XkdP2YKrtl</span>are at your personal page:</p> <p><span class="info"><span class="updating">Ple<span class="h">mxR9U1G</span>ase wait...</span><a class="url" href="http://p27dokhpz2n7nvgr.12hygy.top/3FCE-F6C3-CA25-0446-9B18" target="_blank">http://p27dokhpz2n7nvgr.12hygy.top/3FCE-F6C3-CA25-0446-9B18</a><hr><a href="http://p27dokhpz2n7nvgr.14ewqv.top/3FCE-F6C3-CA25-0446-9B18" target="_blank">http://p27dokhpz2n7nvgr.14ewqv.top/3FCE-F6C3-CA25-0446-9B18</a><hr><a href="http://p27dokhpz2n7nvgr.14vvrc.top/3FCE-F6C3-CA25-0446-9B18" target="_blank">http://p27dokhpz2n7nvgr.14vvrc.top/3FCE-F6C3-CA25-0446-9B18</a><hr><a href="http://p27dokhpz2n7nvgr.129p1t.top/3FCE-F6C3-CA25-0446-9B18" target="_blank">http://p27dokhpz2n7nvgr.129p1t.top/3FCE-F6C3-CA25-0446-9B18</a><hr><a href="http://p27dokhpz2n7nvgr.1apgrn.top/3FCE-F6C3-CA25-0446-9B18" target="_blank">http://p27dokhpz2n7nvgr.1apgrn.top/3FCE-F6C3-CA25-0446-9B18</a></span></p> <p>If t<span class="h">BiULAk5Mu1</span>his page cannot be opened &nbsp;<span class="button" onclick="return _url_upd_('en');">cli<span class="h">mAjVMNuy</span>ck here</span>&nbsp; to get a new addr<span class="h">JUUDeq5</span>ess of your personal page.<br><br>If the addre<span class="h">xigTCDAR1</span>ss of your personal page is the same as befo<span class="h">JkSkdOnnT</span>re after you tried to get a new one,<br>you c<span class="h">Y</span>an try to get a new address in one hour.</p> <p>At th<span class="h">JjO5owJku</span>is p&#097;ge you will receive the complete instr<span class="h">Tyoapvj</span>uctions how to buy the decrypti<span class="h">rAIhiI</span>on software for restoring all your files.</p> <p>Also at this p&#097;ge you will be able to res<span class="h">m0M</span>tore any one file for free to be sure "Cer&#98;e<span class="h">2jzYyHSKCy</span>r&nbsp;Decryptor" will help you.</p> <hr> <p>If your per<span class="h">PJ</span>sonal page is not availa<span class="h">oXRGgEa</span>ble for a long period there is another way to open your personal page - insta<span class="h">Ap</span>llation and use of Tor&nbsp;Browser:</p> <ol> <li>run your Inte<span class="h">QoiDiwlMz</span>rnet browser (if you do not know wh&#097;t it is run the Internet&nbsp;Explorer);</li> <li>ent<span class="h">yj</span>er or copy the &#097;ddress <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/downlo&#097;d/download-easy.html.en</a> into the address bar of your browser &#097;nd press ENTER;</li> <li>wait for the site load<span class="h">RgXmOb</span>ing;</li> <li>on the site you will be offered to do<span class="h">Z9VUfKPwF3</span>wnload Tor&nbsp;Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>ru<span class="h">M</span>n Tor&nbsp;Browser;</li> <li>connect with the butt<span class="h">BI9KVvVXY</span>on "Connect" (if you use the English version);</li> <li>a normal Internet bro<span class="h">vE</span>wser window will be opened &#097;fter the initialization;</li> <li>type or copy the add<span class="h">pDjV</span>ress <br><span class="info">http://p27dokhpz2n7nvgr.onion/3FCE-F6C3-CA25-0446-9B18</span><br> in this browser address bar;</li> <li>pre<span class="h">QhEXl40P</span>ss ENTER;</li> <li>the site sho<span class="h">yqcdkjBP</span>uld be loaded; if for some reason the site is not lo<span class="h">j</span>ading wait for a moment and try again.</li> </ol> <p>If you have any pr<span class="h">X</span>oblems during installation or use of Tor&nbsp;Browser, please, visit <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> and type request in the searc<span class="h">ItidY14AVm</span>h bar "Install Tor&nbsp;Browser Windows" and you will find a lot of training videos about Tor&nbsp;Browser installation and use.</p> <hr> <p><strong>Addit<span class="h">6R5cmLR</span>ional information:</strong></p> <p>You will fi<span class="h">Z</span>nd the instru<span class="h">bNZ</span>cti&#111;ns ("*_READ_THIS_FILE_*.hta") for re<span class="h">oD</span>st&#111;ring y&#111;ur files in &#097;ny f<span class="h">r</span>&#111;lder with your enc<span class="h">z7s2FlhR</span>rypted files.</p> <p>The instr<span class="h">8</span>ucti&#111;ns "*_READ_THIS_FILE_*.hta" in the f<span class="h">5wLJiUXdB</span>&#111;lder<span class="h">a5IjQ2qveH</span>s with your encry<span class="h">o6ffKFo</span>pted files are not vir<span class="h">H0i8SH</span>uses! The instruc<span class="h">aALzYAgUjv</span>tions "*_READ_THIS_FILE_*.hta" will he<span class="h">Knw</span>lp you to dec<span class="h">HT</span>rypt your files.</p> <p>Remembe<span class="h">lUTiJ3Xu</span>r! The w&#111;rst si<span class="h">0TOStmoVrv</span>tu&#097;tion already happ<span class="h">noSGhQ</span>ened and n&#111;w the future of your files de<span class="h">4rSplPdX</span>pends on your determ<span class="h">VY1</span>ination and speed of your actions.</p> </div> <div id="ar" style="direction: rtl;"> <p>لا يمكنك العثور على الملفات الضرورية؟<br>هل محتوى الملفات غير قابل للقراءة؟</p> <p>هذا أمر طبيعي لأن أسماء الملفات والبيانات في الملفات قد تم تشفيرها بواسطة "Cer&#98;er&nbsp;Rans&#111;mware".</p> <p>وهذا يعني أن الملفات الخاصة بك ليست تالفة! فقد تم تعديل ملفاتك فقط. ويمكن التراجع عن هذا.<br>ومن الآن فإنه لا يكن استخدام الملفات الخاصة بك حتى يتم فك تشفيرها.</p> <p>الطريقة الوحيدة لفك تشفير ملفاتك بأمان هو أن تشتري برنامج فك التشفير المتخصص "Cer&#98;er&nbsp;Decryptor".</p> <p>إن أية محاولات لاستعادة الملفات الخاصة بك بواسطة برامج من طرف ثالث سوف تكون مدمرة لملفاتك!</p> <hr> <p>يمكنك الشروع في شراء برنامج فك التشفير من صفحتك الشخصية:</p> <p><span class="info"><span class="updating">أرجو الإنتظار...</span><a class="url" href="http://p27dokhpz2n7nvgr.12hygy.top/3FCE-F6C3-CA25-0446-9B18" target="_blank">http://p27dokhpz2n7nvgr.12hygy.top/3FCE-F6C3-CA25-0446-9B18</a><hr><a href="http://p27dokhpz2n7nvgr.14ewqv.top/3FCE-F6C3-CA25-0446-9B18" target="_blank">http://p27dokhpz2n7nvgr.14ewqv.top/3FCE-F6C3-CA25-0446-9B18</a><hr><a href="http://p27dokhpz2n7nvgr.14vvrc.top/3FCE-F6C3-CA25-0446-9B18" target="_blank">http://p27dokhpz2n7nvgr.14vvrc.top/3FCE-F6C3-CA25-0446-9B18</a><hr><a href="http://p27dokhpz2n7nvgr.129p1t.top/3FCE-F6C3-CA25-0446-9B18" target="_blank">http://p27dokhpz2n7nvgr.129p1t.top/3FCE-F6C3-CA25-0446-9B18</a><hr><a href="http://p27dokhpz2n7nvgr.1apgrn.top/3FCE-F6C3-CA25-0446-9B18" target="_blank">http://p27dokhpz2n7nvgr.1apgrn.top/3FCE-F6C3-CA25-0446-9B18</a></span></p> <p>في حالة تعذر فتح هذه الصفحة &nbsp;<span class="button" onclick="return _url_upd_('ar');">انقر هنا</span>&nbsp; لإنشاء عنوان جديد لصفحتك الشخصية.</p> <p>في هذه الصفحة سوف تتلقى تعليمات كاملة حول كيفية شراء برنامج فك التشفير لاستعادة جميع الملفات الخاصة بك.</p> <p>في هذه الصفحة أيضًا سوف تتمكن من استعادة ملف واحد بشكل مجاني للتأكد من أن "Cer&#98;er&nbsp;Decryptor" سوف يساعدك.</p> <hr> <p>إذا كانت صفحتك الشخصية غير متاحة لفترة طويلة فإن ثمّة طريقة أخرى لفتح صفحتك الشخصية - تحميل واستخدام متصفح Tor:</p> <ol> <li>قم بتشغيل متصفح الإنترنت الخاص بك (إذا كنت لا تعرف ما هو قم بتشغيل إنترنت إكسبلورر);</li> <li>قم بكتابة أو نسخ العنوان <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> إلى شريط العنوان في المستعرض الخاص بك ثم اضغط ENTER;</li> <li>انتظر لتحميل الموقع;</li> <li>سوف يعرض عليك الموقع تحميل متصفح Tor. قم بتحميله وتشغيله، واتبع تعليمات التثبيت، وانتظر حتى اكتمال التثبيت;</li> <li>قم بتشغيل متصفح Tor;</li> <li>اضغط على الزر "Connect" (إذا كنت تستخدم النسخة الإنجليزية);</li> <li>سوف تُفتح نافذة متصفح الإنترنت العادي بعد البدء;</li> <li>قم بكتابة أو نسخ العنوان <br><span class="info">http://p27dokhpz2n7nvgr.onion/3FCE-F6C3-CA25-0446-9B18</span><br> في شريط العنوان في المتصفح;</li> <li>اضغط ENTER;</li> <li>يجب أن يتم تحميل الموقع؛ إذا لم يتم تحميل الموقع لأي سبب، انتظر للحظة وحاول مرة أخرى.</li> </ol> <p>إذا كان لديك أية مشكلات أثناء عملية التثبيت أو استخدام متصفح Tor، يُرجى زيارة <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> واكتب الطلب "install tor browser windows" أو "تثبيت نوافذ متصفح Tor" في شريط البحث، وسوف تجد الكثير من أشرطة الفيديو للتدريب حول تثبيت متصفح Tor واستخدامه.</p> <hr> <p><strong>معلومات إض<span class="h">R</span>افية:</strong></p> <p>س<span class="h">lLdGejg</span>وف تجد إرشادات استعادة الملفات الخاصة بك ("*_READ_THIS_FILE_*") في أي مجلد مع ملفاتك المشفرة.</p> <p>الإرش<span class="h">zA4a9C9</span>ادات ("*_READ_THIS_FILE_*") الموجودة في المجلدات مع ملفاتك المشفرة ليست فيروسات والإرشادات ("*_READ_THIS_FILE_*") سوف تساعدك على فك تشفير الملفات الخاصة بك.</p> <p>تذكر أن أسوأ مو<span class="h">SJx2r5y</span>قف قد حدث بالفعل، والآن مستقبل ملفاتك يعتمد على عزيمتك وسرعة الإجراءات الخاصة بك.</p> </div> <div id="zh"> <p>您找不到所需的文件?<br>您文件的内容无法阅读?</p> <p>这是正常的,因为您文件的文件名和数据已经被“Cer&#98;er&nbsp;Rans&#111;mware”加密了。</p> <p>这意味着您的文件并没有损坏!您的��

Extracted

Path

C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___DPMTPP_.txt

Family

cerber

Ransom Note
CERBER RANSOMWARE ----- YOUR DOCUMENTS, PH0TOS, DATABASES AND OTHER IMPORTANT FILES HAVE BEEN ENCRYPTED! ----- The only way to decrypt y0ur files is to receive the private key and decryption program. To receive the private key and decryption program go to any decrypted folder, inside there is the special file (*_READ_THIS_FILE_*) with complete instructions how to decrypt your files. If you cannot find any (*_READ_THIS_FILE_*) file at your PC, follow the instructions below: ----- 1. Download "Tor Browser" from https://www.torproject.org/ and install it. 2. In the "Tor Browser" open your personal page here: http://p27dokhpz2n7nvgr.onion/3FCE-F6C3-CA25-0446-9B18 Note! This page is available via "Tor Browser" only. ----- Also you can use temporary addresses on your personal page without using "Tor Browser". ----- 1. http://p27dokhpz2n7nvgr.12hygy.top/3FCE-F6C3-CA25-0446-9B18 2. http://p27dokhpz2n7nvgr.14ewqv.top/3FCE-F6C3-CA25-0446-9B18 3. http://p27dokhpz2n7nvgr.14vvrc.top/3FCE-F6C3-CA25-0446-9B18 4. http://p27dokhpz2n7nvgr.129p1t.top/3FCE-F6C3-CA25-0446-9B18 5. http://p27dokhpz2n7nvgr.1apgrn.top/3FCE-F6C3-CA25-0446-9B18 ----- Note! These are temporary addresses! They will be available for a limited amount of time! -----
URLs

http://p27dokhpz2n7nvgr.onion/3FCE-F6C3-CA25-0446-9B18

http://p27dokhpz2n7nvgr.12hygy.top/3FCE-F6C3-CA25-0446-9B18

http://p27dokhpz2n7nvgr.14ewqv.top/3FCE-F6C3-CA25-0446-9B18

http://p27dokhpz2n7nvgr.14vvrc.top/3FCE-F6C3-CA25-0446-9B18

http://p27dokhpz2n7nvgr.129p1t.top/3FCE-F6C3-CA25-0446-9B18

http://p27dokhpz2n7nvgr.1apgrn.top/3FCE-F6C3-CA25-0446-9B18

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Contacts a large (1101) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Drops startup file 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 38 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies registry class 3 IoCs
  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/kh4sh3i/Ransomware-Samples
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe9b9b3cb8,0x7ffe9b9b3cc8,0x7ffe9b9b3cd8
      2⤵
        PID:3368
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,1446861725408729355,11521574431801120645,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:2
        2⤵
          PID:2120
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,1446861725408729355,11521574431801120645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2100
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,1446861725408729355,11521574431801120645,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:8
          2⤵
            PID:1744
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,1446861725408729355,11521574431801120645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
            2⤵
              PID:1768
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,1446861725408729355,11521574431801120645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
              2⤵
                PID:3464
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,1446861725408729355,11521574431801120645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4156
              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,1446861725408729355,11521574431801120645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3452
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,1446861725408729355,11521574431801120645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:1
                2⤵
                  PID:2572
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,1446861725408729355,11521574431801120645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:1
                  2⤵
                    PID:1484
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,1446861725408729355,11521574431801120645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:1
                    2⤵
                      PID:2440
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,1446861725408729355,11521574431801120645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:1
                      2⤵
                        PID:956
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,1446861725408729355,11521574431801120645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6224 /prefetch:1
                        2⤵
                          PID:2464
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1924,1446861725408729355,11521574431801120645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2816 /prefetch:8
                          2⤵
                          • NTFS ADS
                          • Suspicious behavior: EnumeratesProcesses
                          PID:540
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,1446861725408729355,11521574431801120645,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4852 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3612
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:1356
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:340
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:1180
                            • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Cerber.zip\cerber.exe
                              "C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Cerber.zip\cerber.exe"
                              1⤵
                              • Drops startup file
                              • Drops file in System32 directory
                              • Sets desktop wallpaper using registry
                              • Drops file in Program Files directory
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2812
                              • C:\Windows\SysWOW64\netsh.exe
                                C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
                                2⤵
                                • Modifies Windows Firewall
                                • Event Triggered Execution: Netsh Helper DLL
                                • System Location Discovery: System Language Discovery
                                PID:4124
                              • C:\Windows\SysWOW64\netsh.exe
                                C:\Windows\system32\netsh.exe advfirewall reset
                                2⤵
                                • Modifies Windows Firewall
                                • Event Triggered Execution: Netsh Helper DLL
                                • System Location Discovery: System Language Discovery
                                PID:2104
                              • C:\Windows\SysWOW64\mshta.exe
                                "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___RH1ABL1_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:4776
                              • C:\Windows\SysWOW64\NOTEPAD.EXE
                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___K8F553ET_.txt
                                2⤵
                                • System Location Discovery: System Language Discovery
                                • Opens file in notepad (likely ransom note)
                                PID:4984
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2184
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /f /im "cerber.exe"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1012
                                • C:\Windows\SysWOW64\PING.EXE
                                  ping -n 1 127.0.0.1
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Runs ping.exe
                                  PID:1416
                            • C:\Windows\system32\OpenWith.exe
                              C:\Windows\system32\OpenWith.exe -Embedding
                              1⤵
                              • Modifies registry class
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of SetWindowsHookEx
                              PID:576

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              b4ae6009e2df12ce252d03722e8f4288

                              SHA1

                              44de96f65d69cbae416767040f887f68f8035928

                              SHA256

                              7778069a1493fdb62e6326ba673f03d9a8f46bc0eea949aabbbbc00dcdaddf9d

                              SHA512

                              bb810721e52c77793993470692bb2aab0466f13ed4576e4f4cfa6bc5fcfc59c13552299feb6dfd9642ea07b19a5513d90d0698d09ca1d15e0598133929c05fe1

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              4bf4b59c3deb1688a480f8e56aab059d

                              SHA1

                              612c83e7027b3bfb0e9d2c9efad43c5318e731bb

                              SHA256

                              867ab488aa793057395e9c10f237603cfb180689298871cdf0511132f9628c82

                              SHA512

                              2ec6c89f9653f810e9f80f532abaff2a3c0276f6d299dce1b1eadf6a59e8072ed601a4f9835db25d4d2610482a00dd5a0852d0ef828678f5c5ed33fe64dddca9

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              2KB

                              MD5

                              6931aebca4b0ad3040183ce355d7f1de

                              SHA1

                              44f93f5a7d59651401c72f4f96a927154fc228dd

                              SHA256

                              a5cf1d798c1334ae0171cb36999bfe104e3f1753516250311ff4cc9607769394

                              SHA512

                              4da06bb57fe9b6119cc02721e0dbf45c5fc6efcb1e723f38ba98c103e551edd1cc342f2860a80d437cf8dc1a775702ef5f079a4dcc4155f98af808c87da2eabc

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              656B

                              MD5

                              94750bc552efe904ff6715266f49860a

                              SHA1

                              001795ced5b39abfaf5c69f15e0e40acfb0eb09d

                              SHA256

                              8b33f36925738b64913ba9dabb9f45d0ee5f9a830fce52228de1607483f37077

                              SHA512

                              a2898a9595171d39a215e56746b921099dd044a1767393161d2c394471aff65cd466e972b88c115f2f17f269c6068bd3b069c0033d48d605e27b7a4a8e0ac3c1

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              d1d666a4c4b8b52d124b2e5d0c087a89

                              SHA1

                              fdd25b9d9a31d0b8396d1bcd61fa3542b65818e8

                              SHA256

                              39055d4c59f4d4357e86937b95866196baae08b724c17c0674707dd5f8f73c02

                              SHA512

                              c70816fa0b3de14bfeced62d79f36aed87f5c16e8569cacd00450968e59f5cb32fc6ec7a87a9d8f1f82dd5527510da481b59c5a31bdcd0b71b2e024f3f39b87b

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              28bf2f2ef1322174b611e713f067a826

                              SHA1

                              ce5031b76afd0901a919d49038c0af817eda2fbe

                              SHA256

                              0b912f19e526f1ecfb87560d092d0cf7c70793d474b1453e6075224019db3eeb

                              SHA512

                              149323272fdcabf8e334e96bf12324da74dbaabb92edfc7008fa3d529e2245349aeceae030104d93e9ea75335ccf44d76934c45c4576463e165aa884e1488610

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              cf7b537a15d4a61095b29b396371e319

                              SHA1

                              60b8b4276c7d682669198a544333139ebae240d0

                              SHA256

                              3690398e326873c798498aa4837c26139a5e8f6b3ce56d2d33bab1f598cc665f

                              SHA512

                              73cdb1cda615003707cdff8aed0918486803b6341590c3c98e8b7e5ce05424f98840fd0a9a192ad34db06c73d65c40852e1ceef9f5b5e6aa2030bb8df2d1d9ee

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              ca777385fc1f8997de7a33784489dea2

                              SHA1

                              a3ffcd2d214af8b0173a96bc21b9775eee6f11eb

                              SHA256

                              3cd4f93ae0932121412c90c8d7b70c739e68980caa413ce7faca1aaf631517f1

                              SHA512

                              b45b6dff12b9670396ba50b8b5ecd16c090fa468cd4a53160f86b9370ac511e1c495b158db86d1897107927bbd0e2fda2f8adfd18f9a55fdd01b61a043818b35

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              42a3af19dff42a0d2ad697f4712dc382

                              SHA1

                              93e2aa52e455f560f47bc1297825c30ba6a26a82

                              SHA256

                              bd832257ae04a607a2b1f568d1d7b2b90dbe75155e20478ded93255cc74ba4a4

                              SHA512

                              297d4ee09d0af8375500e8a2dd6c3ee5747a8c14f4f1710b5fd3e05414e9aac2c0c4893203396d605b0b7f892be03546d49ead3018e6786554822d8fd3853bb4

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              4c284055232573fa52894070e0ca586f

                              SHA1

                              0056c77d54c68a5aaa58254ad1e809e65f4ace54

                              SHA256

                              6547e1e2a1ca0509f16946f5504406814c1fd78b3eb79808eefcb6338183949f

                              SHA512

                              0c11b553df4391cf0811b1802157b4dda8b058884283d49b7d1ebdd9bdde39a20bbb082516812d49fbf5f7ab488eb186dc520c212f13e96b96c2267b39565fad

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe580644.TMP

                              Filesize

                              1KB

                              MD5

                              942e989f83cb8ff04c3137a1aefdb401

                              SHA1

                              3e3567b94dff1948d4a6981eeeee70ed20e0c904

                              SHA256

                              1c3c3505075069a4a060889bb5caddcd69a369071b7e7be42190458356de85f5

                              SHA512

                              c9bb442a47e7d19fc88dcb917e121fb61a454d628dd684ccf3f0176abbdd15a8c6fa83d01f26739d206812fa62eb1cb8c4e99fb4d3b717c8e0e30d0069108534

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              46295cac801e5d4857d09837238a6394

                              SHA1

                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                              SHA256

                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                              SHA512

                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              206702161f94c5cd39fadd03f4014d98

                              SHA1

                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                              SHA256

                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                              SHA512

                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              10KB

                              MD5

                              6d926c47675ba50cc93bf9de75ac21c3

                              SHA1

                              f2cba63c7e3b419ce2f758b812018144d65e0f68

                              SHA256

                              363baf905d8dfe2be15019807f685db57520608a3403dd15b8537f7685380dde

                              SHA512

                              0ca120aab76341823d311a04fa17bfb3685fa9828135e157a9d417db1553353d8206594f985536f492fcf2392721df044ee83237cc99d81d8874a5f74b3c0f9a

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              80957820ad429205d07e9933e444eeed

                              SHA1

                              497f4f3c5cdd2a142b343269e7267ac3fc597f20

                              SHA256

                              3065417605834dc0fd0e943ab6f195b7343336a97e82f1bda116252f4cd24095

                              SHA512

                              8145333257c6052d7759e9fcf00f9c79299945df974266b0b61f5630f22086fd1f1b050b99fcbd79df6545a29a56f2dadea337ca8678b1a3e6125bc7cdbfc707

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              b2c26c61a7bbe367b009bde176cc8ae4

                              SHA1

                              bb04a97f955de744e801ca104d8ed0d3b94fda56

                              SHA256

                              f33c3daf2ba5bfe02067410b52db4aa84de1197b482f9d983afa376a71b6d0df

                              SHA512

                              3ad8bc36249e0d8bff5aa1977acbe0e881753d5bd75af5d9f164981df9c21245353b664c3d9a6e8f9dd176193e62f79ac13f3e36f507deb99a38a454ba03327a

                            • C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___DPMTPP_.txt

                              Filesize

                              1KB

                              MD5

                              6799ab78e280688b1a0f89ed9b04a635

                              SHA1

                              4c8ba24cc24c7685cf128af371c66ab9e867e456

                              SHA256

                              71d8e23e2587d2811a0472cd15cb289721a4e319d647e9fe89dbfeb0723970c1

                              SHA512

                              c0b3a99afb0a453d7406bd55cccf3724f3e9e602cef47addb0ec4c339b224c575c886c9596d23aeb0049e95a036a146d9d6cc5e0db965ec79377ecc17c7253bc

                            • C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___3NGDOG_.hta

                              Filesize

                              75KB

                              MD5

                              12fe2043291e5e4077537b4ed425024b

                              SHA1

                              c2d189f8384276b50452794c0c190faf3859b917

                              SHA256

                              02568c5efd2f88c7db355e55355fd2c61e9f268597c8effa5454943fa4c4aa8e

                              SHA512

                              bf7895ca53b6961f54892f94c7c780de529b6a460b69949b04f74af61d9010d1e9bb1477116af8e0b4a8bed7f9775a330bb8f9436ca3534282c44de699239fce

                            • C:\Users\Admin\Downloads\Ransomware-Samples-main.zip:Zone.Identifier

                              Filesize

                              26B

                              MD5

                              fbccf14d504b7b2dbcb5a5bda75bd93b

                              SHA1

                              d59fc84cdd5217c6cf74785703655f78da6b582b

                              SHA256

                              eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                              SHA512

                              aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                            • C:\Users\Admin\Downloads\Unconfirmed 956154.crdownload

                              Filesize

                              15.1MB

                              MD5

                              e88a0140466c45348c7b482bb3e103df

                              SHA1

                              c59741da45f77ed2350c72055c7b3d96afd4bfc1

                              SHA256

                              bab1853454ca6fdd3acd471254101db1b805b601e309a49ec7b4b1fbcfc47ad7

                              SHA512

                              2dc9682f4fb6ea520acc505bdbe7671ab7251bf9abd25a5275f0c543a6157d7fa5325b9dce6245e035641ab831d646f0e14f6649f9464f5e97431ab1bf7da431

                            • memory/2812-310-0x0000000000400000-0x0000000000435000-memory.dmp

                              Filesize

                              212KB

                            • memory/2812-706-0x0000000000400000-0x0000000000435000-memory.dmp

                              Filesize

                              212KB

                            • memory/2812-703-0x0000000000400000-0x0000000000435000-memory.dmp

                              Filesize

                              212KB

                            • memory/2812-708-0x0000000000400000-0x0000000000435000-memory.dmp

                              Filesize

                              212KB

                            • memory/2812-308-0x0000000000400000-0x0000000000435000-memory.dmp

                              Filesize

                              212KB

                            • memory/2812-305-0x0000000000400000-0x0000000000435000-memory.dmp

                              Filesize

                              212KB

                            • memory/2812-755-0x0000000000400000-0x0000000000435000-memory.dmp

                              Filesize

                              212KB

                            • memory/2812-756-0x0000000000440000-0x0000000000451000-memory.dmp

                              Filesize

                              68KB