Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 22:35

General

  • Target

    541364a81cb365be420373fce3d1f19b_JaffaCakes118.exe

  • Size

    280KB

  • MD5

    541364a81cb365be420373fce3d1f19b

  • SHA1

    fffb124ed79715769e61f793cd3b47458ab74293

  • SHA256

    2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75

  • SHA512

    c19e4d702ea3656b1f73ff263574459fc572f955dd7b492efe7f360659d93739334d669edaeeb15a0589490d67092087f7349bb964d426bc86ee412480a08732

  • SSDEEP

    6144:TBFKoJwFOa/QA1LaVEiPZHeYyXIK/ZqVhPy/sBybCcRnYnaFX0:20w7/QuLaVEiP7yYPVJyQOYnaG

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #Cerber_Ransomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Rans0mware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://52uo5k3t73ypjije.495iru.top/7445-38FE-7823-0063-72BC | | 2. http://52uo5k3t73ypjije.fkgrie.top/7445-38FE-7823-0063-72BC | | 3. http://52uo5k3t73ypjije.mix3hi.top/7445-38FE-7823-0063-72BC | | 4. http://52uo5k3t73ypjije.cmfkru.top/7445-38FE-7823-0063-72BC | | 5. http://52uo5k3t73ypjije.onion.to/7445-38FE-7823-0063-72BC |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://52uo5k3t73ypjije.495iru.top/7445-38FE-7823-0063-72BC); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://52uo5k3t73ypjije.495iru.top/7445-38FE-7823-0063-72BC appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://52uo5k3t73ypjije.495iru.top/7445-38FE-7823-0063-72BC); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://52uo5k3t73ypjije.onion/7445-38FE-7823-0063-72BC | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://52uo5k3t73ypjije.495iru.top/7445-38FE-7823-0063-72BC

http://52uo5k3t73ypjije.fkgrie.top/7445-38FE-7823-0063-72BC

http://52uo5k3t73ypjije.mix3hi.top/7445-38FE-7823-0063-72BC

http://52uo5k3t73ypjije.cmfkru.top/7445-38FE-7823-0063-72BC

http://52uo5k3t73ypjije.onion.to/7445-38FE-7823-0063-72BC

http://52uo5k3t73ypjije.onion/7445-38FE-7823-0063-72BC

Extracted

Path

C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber &#082;ansomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #Cerber_Ransomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Rans0mware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://52uo5k3t73ypjije.495iru.top/7445-38FE-7823-0063-72BC" target="_blank">http://52uo5k3t73ypjije.495iru.top/7445-38FE-7823-0063-72BC</a></li> <li><a href="http://52uo5k3t73ypjije.fkgrie.top/7445-38FE-7823-0063-72BC" target="_blank">http://52uo5k3t73ypjije.fkgrie.top/7445-38FE-7823-0063-72BC</a></li> <li><a href="http://52uo5k3t73ypjije.mix3hi.top/7445-38FE-7823-0063-72BC" target="_blank">http://52uo5k3t73ypjije.mix3hi.top/7445-38FE-7823-0063-72BC</a></li> <li><a href="http://52uo5k3t73ypjije.cmfkru.top/7445-38FE-7823-0063-72BC" target="_blank">http://52uo5k3t73ypjije.cmfkru.top/7445-38FE-7823-0063-72BC</a></li> <li><a href="http://52uo5k3t73ypjije.onion.to/7445-38FE-7823-0063-72BC" target="_blank">http://52uo5k3t73ypjije.onion.to/7445-38FE-7823-0063-72BC</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://52uo5k3t73ypjije.495iru.top/7445-38FE-7823-0063-72BC" target="_blank">http://52uo5k3t73ypjije.495iru.top/7445-38FE-7823-0063-72BC</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://52uo5k3t73ypjije.495iru.top/7445-38FE-7823-0063-72BC" target="_blank">http://52uo5k3t73ypjije.495iru.top/7445-38FE-7823-0063-72BC</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://52uo5k3t73ypjije.495iru.top/7445-38FE-7823-0063-72BC" target="_blank">http://52uo5k3t73ypjije.495iru.top/7445-38FE-7823-0063-72BC</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://52uo5k3t73ypjije.onion/7445-38FE-7823-0063-72BC</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Contacts a large (2054) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Kills process with taskkill 3 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\541364a81cb365be420373fce3d1f19b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\541364a81cb365be420373fce3d1f19b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\541364a81cb365be420373fce3d1f19b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\541364a81cb365be420373fce3d1f19b_JaffaCakes118.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Users\Admin\AppData\Roaming\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\UserAccountControlSettings.exe
        "C:\Users\Admin\AppData\Roaming\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\UserAccountControlSettings.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Users\Admin\AppData\Roaming\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\UserAccountControlSettings.exe
          "C:\Users\Admin\AppData\Roaming\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\UserAccountControlSettings.exe"
          4⤵
          • Adds policy Run key to start application
          • Drops startup file
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Sets desktop wallpaper using registry
          • System Location Discovery: System Language Discovery
          • Modifies Control Panel
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2172
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2720
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2128
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:537601 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2276
          • C:\Windows\system32\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
            5⤵
              PID:2372
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
              5⤵
                PID:2020
              • C:\Windows\system32\cmd.exe
                /d /c taskkill /t /f /im "UserAccountControlSettings.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\UserAccountControlSettings.exe" > NUL
                5⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                PID:2820
                • C:\Windows\system32\taskkill.exe
                  taskkill /t /f /im "UserAccountControlSettings.exe"
                  6⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2828
                • C:\Windows\system32\PING.EXE
                  ping -n 1 127.0.0.1
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:2712
          • C:\Windows\SysWOW64\cmd.exe
            /d /c taskkill /t /f /im "541364a81cb365be420373fce3d1f19b_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\541364a81cb365be420373fce3d1f19b_JaffaCakes118.exe" > NUL
            3⤵
            • Deletes itself
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:2556
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /t /f /im "541364a81cb365be420373fce3d1f19b_JaffaCakes118.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1496
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 1 127.0.0.1
              4⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:2112
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {F61184C2-B62D-48CE-931B-913D81C0E4E7} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Users\Admin\AppData\Roaming\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\UserAccountControlSettings.exe
          C:\Users\Admin\AppData\Roaming\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\UserAccountControlSettings.exe
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:2236
        • C:\Users\Admin\AppData\Roaming\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\UserAccountControlSettings.exe
          C:\Users\Admin\AppData\Roaming\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\UserAccountControlSettings.exe
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:1340
          • C:\Users\Admin\AppData\Roaming\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\UserAccountControlSettings.exe
            C:\Users\Admin\AppData\Roaming\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\UserAccountControlSettings.exe
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2772
            • C:\Windows\SysWOW64\cmd.exe
              /d /c taskkill /t /f /im "" > NUL & ping -n 1 127.0.0.1 > NUL & del "" > NUL
              4⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              PID:2432
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /t /f /im ""
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1840
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 1 127.0.0.1
                5⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:1056
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:2
          2⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2860
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
        1⤵
        • System Location Discovery: System Language Discovery
        PID:1720
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x4e8
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1128

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

        Filesize

        12KB

        MD5

        d12788e560805a1c5295a01ea0baafbe

        SHA1

        9a2c5a1e41850e1a8f3d489276b31e89f10ecdf3

        SHA256

        78ce88673dfa681a0938ba1a97d3db679b279addecb8684b0370fd023d29d672

        SHA512

        59f2b48a7c7c3f48f11e59d6f73669cb38561d5d98b4c89bd532960789c7813026ba696d6ecde48693f668e4ed9d21766956ecedc9b115b9d6081469438c44ab

      • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

        Filesize

        10KB

        MD5

        3a73048fe18698afd17c58cbf67fb1fc

        SHA1

        fa2ac8b44d05b667d3ecae5759a85a2bad3817b2

        SHA256

        57a6177e502a025f1df08d0f304f145fd8b08a00ae878ba696ada53f1d1a38b5

        SHA512

        079809f119812941ed8fee34fb2bed7b8a2650964dd20f7d7cbc8cf298ba851eaba43afccc47ba1c5df758217da3a840793f5ab9d3190fd986187f2294fd2a12

      • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.url

        Filesize

        90B

        MD5

        e5db65a9a24ba65a95c1afe56975996f

        SHA1

        ec203c8c15f5874deede0e75eb57e79ad0c9fd9c

        SHA256

        f10d5bd29b64da209e8dffd4bb28d366b89f99ed867d18e72b047ed20b8032ce

        SHA512

        8b1fcfd2cd67d7f752d968227ab1d49e0981047598996a6a1e831609cda29b6933331b1db07e6ed583b0d7235457c0420ce18f6d9fa1ce0e624b42b2f364c928

      • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.vbs

        Filesize

        231B

        MD5

        9d8c4bfbd009c4d6001e2125abaa8b02

        SHA1

        cd040558172b5fca5b200447a281843956243741

        SHA256

        a652297987f14317100f8c5f7eb26d1bc67eb8a64f0b39b72b5fd5046a9f29b0

        SHA512

        c4c84f43642b805a105acce9ebc9f01aa0e6ef553ea32be3f8b890fc7440f0b7d3ddf99b9336bce20ce7a3d9b9f6434a704651a8af425ffc8407ba39d5de735f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        606ea73c0571cc208fa678d65a648a5b

        SHA1

        fbea3472cfa95576c1b5d1f4f6b0932b592b945d

        SHA256

        cc360cb6f780caaaee7216dd1f9df679df9c18b76aed7c273ee6171a17d171c5

        SHA512

        4efa89da3801dcf96bae698d4b8c127fb937fe001e0b564dcad0834ec4be75870f58a147f69cf03577203b11692f950b33ce5eb9d89da206c037e5aecc4d368c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e7d61895685fcf7118235f05476cc263

        SHA1

        1d02cf316988d2ef0e95e57d8d6cbec4697d6121

        SHA256

        89fbf8a65cce029d9dd18ce69a52620157cc125dfefc545fb6868c02e40c7318

        SHA512

        13417012a3e51eb8a6b22c603a6b748877068585e11b0cf94e48991b19f4420cec70654d33bb291c6c4c4935089bdce2f56ac7b45c873afdea95d78ce8fae582

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        102ceabca04a7c8ffc71ba3b0407d16a

        SHA1

        26640d5e65b084b4429d8eb30b78e8ede967a7d9

        SHA256

        d4b499df25980cf92e554da95fb664c4e2a191d48ea9e7f8f823e60981afeaba

        SHA512

        06e51959ad129781b529790468d9fec68d781202d65e90f89281ebdbeae5647291004b3fe427613b1582624ff887f97f21a2b263dfd86af0fa20fe2f37b5a60b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        18d4f753dc91453412aa0fb19695ef82

        SHA1

        4078f91df293937a290dce508ec2c9cf4a438803

        SHA256

        c84cf2ca6688e803c8ecafb5d21f5a983ea02af19eebd6f541de7819a6fa6321

        SHA512

        31c6b3e91553b51cd3adaf6aac1f9b1553bf298ab21de56dc55d1c3ff730de3cca36b6fd345459c36aecb85a9af456111cb1ecae4cc65673d4473a162f2a464e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        214a7a8f86514876fa3759700f770559

        SHA1

        1463ce15b082022d8021474f5762da31dbc62c11

        SHA256

        6a2416e173d30539ccc5cb9e50f26a853ae791c8dbd4b72f55f70fdcf25c4b4a

        SHA512

        941d72482d13da577496992be33fd78352ec3ccfe01123ad2ad2757a1a18024976677bf12b9d6ce40b0a4323566866be43f3bb8436f8cb883efdc09d5c9edf29

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        67a68dfde70892d560167d184727c266

        SHA1

        0d845e2f28435990f6cfa7e1e2f49b88dd8d9953

        SHA256

        93299a0db936e8b1581de0c43c1b9b719bf1817ad76a7d1dff15fd9dada5e4d0

        SHA512

        c2a6423232e8aa336e09328145b63f43a6f012dbf1c65e7be1b00279f5911771e601c159c74af892ad5ec8100a6b7e95de8b5ad4ae20fb9f692cf3e9bf73b0a8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        758237d20c92367bb6747192f055d482

        SHA1

        5da830dce84597f2ea00bc88c7d5a7c8c1d55c44

        SHA256

        53bef443d747e1cd6af2d788b0748b14aa5cccb527c650adc61c25bd2736170f

        SHA512

        6381787f25ed724b9ffc671c45d0e6140e05a802011d95b8575a9e93e2432285b96f603bda3e4d287720645dacb4e156d984235ad5b54c77112fc254a7cbf655

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        7d9b2521da763b9f252fcf3f7052a757

        SHA1

        18208c2c1743de100a8afb0e700a2a0166654381

        SHA256

        e1f5fdbd2b8ab785fcb96bd624e36aa9d8dea507cad02af96f6e6ff2244e7919

        SHA512

        b5dccdd8349b15fa62f81d155e8a024098f427f3bb5f07606f47b6c80d1a7a0b358e8761920ea2c3d52332d3ea00c4a155cdc1218ebbc5fd80c5e5c0dd7e8c24

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f9d4616a16f9491ecd0766f06828555f

        SHA1

        429cce37ac16bbdc4532a42eb75c4bef440cf68f

        SHA256

        ed3d864d20334e51726a2051e9661ff9584ffd6ef3078f7eaf300f88bdad9f82

        SHA512

        35830c1e866b84001b5eda0ea7bf04b7ea876959ce7b8352fc8c673d068922f118a4f8ffe240841ae848491bfad9db406083eefb26fc781d395ac8f3db0e4bb4

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        b11ff2e6b03cc42d81c35c5e87ecfd33

        SHA1

        068685907bed75c0ea388d3af4aa01ab523a3bb9

        SHA256

        9c1e0db90a5156f4a265d6b462b78e9c25c45a2ae52275296a73633b51fc29e4

        SHA512

        624f15e8127979a7c415eebcb65373ba7323af4f2fe220627825a1e428ae60b35ae0ed40710caaa7fc0e8219d6773cf7d992e78e8b5d0892ff0850ea3bea401d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        ab5bad128950270f7691f638e543b422

        SHA1

        eea349ac3e67e21875fb675817df0c0233d1850e

        SHA256

        4aa114eef8068cabe3c19439dfd9389f490ac90617dfa0c242f56f4176032cbd

        SHA512

        de97b18c110756be2b7cfef7a2a6467638ea6d3a5d3554255957b7b378404c8c79d67ec321befffc12d7d555101b621b90dc18597cc7c2b1e347bd634945c55c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        29f366d3578965da66903a59d8b8ab47

        SHA1

        1591bab9927d1376580e8e1ba9dae9ce6fe638e7

        SHA256

        605ad776f0eeb299045f77ed2a6ce59f3eb41e3551c771c6e120f7f1524a915f

        SHA512

        1f4815bbde792aacd308d922c85683c2f5e344681d11fca1ff75f0066ec99884c7a4e433b5defd26387663aa07e2032cdfbadce7f42fe8664de362f34d859ac8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        9ff297ccdb049939107503aa02b530ab

        SHA1

        65bb1f18f915424074159f9cd424d13a3d27a1d5

        SHA256

        3100ab4cfeb9020cbda3219cf3463ff8ee1f31535d4d320966b40bb105a5207f

        SHA512

        22a053074e0c658d3a837e8cd68e3c0ac3edea5bc56f1d11f921016dd31f0573430dee43d3818b27bf6425045fc189d7ec490a8c06adc09cacc3deb93d66effb

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        8c26a80878ce3dd6a06f74197066250c

        SHA1

        5757702c372f0ed9db94f4a97b4e5344a080eb4d

        SHA256

        c2460cf3c0dca3f48eb4a0d85833572c84122523e4766ae6d7e25c343972e5d1

        SHA512

        2494d5ea642b1575ac052901407f5f57080bb624813ea1dd3313926c54c7236ffde44077a9954deb8764f97fdee2b449b1b7fbc246e1907ec1b74fe20ae36917

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        b2f65bb2fc1c236103662f3adbcef0d1

        SHA1

        a4a3baa98f24b12414a51027a96831936759dbc9

        SHA256

        f63360ee414ef81f8d4a99d375ab356cda5e60033cd347c401afb39443b0ca50

        SHA512

        41b4d668236e171ee60a8fd74b406509b3b60f49b65e8c7ad80e131bfdd3e9ac8b2ec253e358c6d7d05ff8637b612f57e69297ace18098289b6321df1611caf3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        b778e249eacf8c14585fb3ed3dac08e9

        SHA1

        490cbfc4d35784486893226992955e18e5d8b944

        SHA256

        7a2c3304f0331dbb982cab37dc14e98a903e020dc88c6f8410e7620a2946669b

        SHA512

        f63eed0a8edf4bda8f1e08b2e44583ce320e74a494be585de29334b4c3a2409dbc259a6c4ae54ba29068983268f689eaa874d5837558f0178178f3f84f1d26f4

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        a100df4e6797f382df0984689d68940b

        SHA1

        db29511bc357e7c265dbdfc08d6b9adb7f7133fa

        SHA256

        1252072d0917594fc9b45e24ef9ac9aaef6df5e71b25497fb468509955ab2fad

        SHA512

        5f2b4b24262ac0f6090607a82eadd770efa54f4bb7b064decdbbae0648758b8c5cd8f6c60718e182a88a7f81293fa4f69e29fe5267ec73aed598c3d146e25b7a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        956d3b859a48901c4b3079a93aa44281

        SHA1

        05a851a8b073aaf8d7da4f0f09943d01e97d02e6

        SHA256

        5a54d72e6761fc5d006e3d0e27288f6f1cd6394073c4e2e6a112d7801dede57c

        SHA512

        79055d57d3e57ac3cd779245c5dae14e5a8666a2e5a73a0c8e4875c985efe4ca40c176e46c706984c47af53a88ee072b272a9890b6a8a2bedf425f80c52a329c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f3d4ae9e894a3369fa11fd8a6fc19cbc

        SHA1

        388fc470804423f9c9ba2314184972cd8b330031

        SHA256

        811ba2084bd56e5d6f49f604c646c9fac3ac8b26599b689039b6eb3671374f56

        SHA512

        9cb4e849970d568732e64391517d8e0243a51f17efd50c04de6d4657608d68abb54ecb339152f56ade74dd0f37fcc743b9c3a426d78da29194f8bb91d7804a24

      • C:\Users\Admin\AppData\Local\Temp\CabFD84.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\TarFE23.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Roaming\24.svg

        Filesize

        1KB

        MD5

        c971329597cf88d8b5e87cf5557067d4

        SHA1

        7fc2be6bf2920d5d34c3bd7318288c4aa12c6c88

        SHA256

        e1fda58d0d4eeb62eb790f7e23594eac460db03a2d2373bfd13e94860dcf38b7

        SHA512

        045b48c780d3482bee79cecb372f36cb1e705eeda37c6130dd12dbd432bce1fcf04a9b3c68618a9c9995c29c7f93314cd8d2fc6f6c6d44ac150c556926307577

      • C:\Users\Admin\AppData\Roaming\24.svg

        Filesize

        1KB

        MD5

        9daf50b43c9481a9fbe0e30cb77791d5

        SHA1

        fe90cba11921809d116fb80196978d6e6a45d267

        SHA256

        1865a2c1705d62d6e87abced8bd3bc5870e5d6826352310638dfdd1409968c04

        SHA512

        0f1150256a39a231c102ad44b12d443604c25be6eaa34bdd16a862a329e412e8b3848db6f790b4f7c3f53f0ce53bb6fc600664c33965424f6141f544b882f324

      • C:\Users\Admin\AppData\Roaming\404-4.htm

        Filesize

        1KB

        MD5

        47b31ceaa4ee437bcb996584938f55ca

        SHA1

        00a04f6b1d3a6efcd1c2e24898d08e20c5ceee64

        SHA256

        c24863f16c118fba14e5cff2beaad3f9bd0017d3f55800837398d5518534207a

        SHA512

        2add86690e8aff4e905d4c09816fdb1b084c3d69bbdb5a0da347de625c55f11dc12e719c841d6aabbb7e0350170077a628b577aa1aa569b39b4764143cd0627e

      • C:\Users\Admin\AppData\Roaming\424 bl 3.ADO

        Filesize

        524B

        MD5

        4121e8d21f41488b3dde298a32bbea29

        SHA1

        0f712ecdd7d3668eacff50e3f762aeeb447dbe7b

        SHA256

        7a4a91cd7b014b48d0abdba2d135ae616dd8169c2e17c05d5fc9bd2319db2890

        SHA512

        06bfaf1df5e2e804721d9479b8534d49ac9f2621f63e8605da7e3522c8d28ee57b64dec682152f3fe54590f2135298c926d854f1db4feecbf43a5e380505bedd

      • C:\Users\Admin\AppData\Roaming\5.gif

        Filesize

        916B

        MD5

        57a1015fc0f2197730779325a0e5e018

        SHA1

        af8204e4614fb54cc190a3733df768e18dbd88f6

        SHA256

        1a0c9dfa249f991788ac49f385fe764d55f645836d5d9394489c0ec66d0cff61

        SHA512

        26bd5124f7a61353e4f2cb1644c2c9b3d71e2f43930d932e4737066b8a5ab6976de9ae7ea91aeeb4369689cfb722c7262423d63ec4443f2429481155017961c7

      • C:\Users\Admin\AppData\Roaming\5.gif

        Filesize

        1KB

        MD5

        a9df81eb92389517ce63777b7b9a3662

        SHA1

        7f7508ba5d439ee4a224c0a3887220ad1956443b

        SHA256

        e150a3fbe37e214e3b095a42720e9c91ddbce8ac1c19ad43b90011d20cafbd5d

        SHA512

        2482b8eb740489f428f5fb6ac8d8cd8b2ad22ed39950fc1b2c870c0afe3a9205108eb20d0cfc7ec50759aa435ead4dd617b3cfb9a61ee6afcebaa20b21968726

      • C:\Users\Admin\AppData\Roaming\500-16.htm

        Filesize

        1KB

        MD5

        d197ae42c2d6b6671966207673de5978

        SHA1

        6572b6bc1ce60218761e40a6fbc019f02ef0e655

        SHA256

        9967682b72536a8b3af2856b07b1a62a6e81903d10798ccd811eb1738578607e

        SHA512

        16ab22cdac7dcd593a749c3c4be2a889ec4605d9a99c9dc42f16023e0f9b778f08d3d07ec33fcd2333dc6063280f2016b92affbd26035e020697b6088ff6ad13

      • C:\Users\Admin\AppData\Roaming\6.png

        Filesize

        727B

        MD5

        0660ae4c005309abe25e7b6c3a021617

        SHA1

        a7cea542638dac21ff9c8834a9c7d6a3da18f323

        SHA256

        12dc18d7187464a428a871e99400390a27eeb3c4ce72bd1f2e92f04363c0224c

        SHA512

        1f8215a2c9961b7a0d4819b735bded8e9bdef0e70aae72c6e43f3cf318529c59cf6bf8e242ab04745320808ae44adfed66af250848a5ce2a25e98cc8b785f5e3

      • C:\Users\Admin\AppData\Roaming\6.png

        Filesize

        355B

        MD5

        f64cfcfac0c4219edebc96d6d043c84c

        SHA1

        4cb3f1439c17e8a276b93dae2026b0baa5547524

        SHA256

        50ee85e5bf9f7dd02ae5435ef0a024e9a8e3da48c645adb6b3fefa1e08f7d57e

        SHA512

        b6d2f1e612c1cc1b7b1c85704d6645b10cad9c417b2a4b1e56d62b768088827d25816cfe3c442ce370b669cae25ec3495312d09f1960fdbeabaf37af09762abc

      • C:\Users\Admin\AppData\Roaming\90msp-RKSJ-V

        Filesize

        4KB

        MD5

        2ffc46a244c8c828e352ff00ecd1998d

        SHA1

        027361be101f81885d640bdc37f1d570ae7641ae

        SHA256

        0bbdb01bac6545d87b2dc2fe5d198ff8120ef7c642a11b554a66bfe0a34e7a17

        SHA512

        d09fef8fcb254157faef211e2133184f8e6d1e4a33b0074b74fd762c8f4b1881ef1af2b839a1df9cb427c774a3be9f94f12faa7a8f25002d6b1c292f73e6657e

      • C:\Users\Admin\AppData\Roaming\Adak

        Filesize

        1KB

        MD5

        f87cdb72f8a2c9db4cfa4d46b68df843

        SHA1

        94fb29845e1aa22d72d93e99293b237bcbf176ad

        SHA256

        b4cd5fe34e86bd59710379115fc9a9b670f1f6a885f9f2c1d87f94ee90aae680

        SHA512

        0135ff0838bed406025d4b1ae9a95e5f196e06f95fffb0093afeee7b37af2a0cad2cda38033d3fe7d80c8a3b9142758b8fa43f74bd6f7bea5da09d8924e1b192

      • C:\Users\Admin\AppData\Roaming\Chamfron.e

        Filesize

        125KB

        MD5

        514647032a4e7c2dd7767bc17e2bf753

        SHA1

        5a6f0af0725a28d1698ad4499643e9621e6dc045

        SHA256

        aa7a5eb67942d2640114a23047836586a291373d2dbf6918e2739b067303179b

        SHA512

        f8f1afd76c60fe9ba850fdd41aa8fcb4252f44ed0e595fa575e115273b38de81e2676dc0f209ceb122bb4f49b9836039cb9a742603af8a34e09182f8e04f4249

      • C:\Users\Admin\AppData\Roaming\DAN.zdct

        Filesize

        1KB

        MD5

        bfc5c224f5c267bbb9a1ea11a4d8197a

        SHA1

        e032709043025dc40f4021c4f55ea39503bcfb21

        SHA256

        21b860d7220947839e49cccbce63b1c43fb02d1a2eacce0fbf389fab35ea128a

        SHA512

        d85523232f4a3107608cb8968f1590aec742500053a33b8afe4139ad535ffcbd215fd8f4633ac36ad172d687fcf5b1c9b1005c6c2f6c402ca810988459ac0aa6

      • C:\Users\Admin\AppData\Roaming\ExampleFO2PDFUsingSAXParser.java

        Filesize

        4KB

        MD5

        7f9e18fb070fbc43175fcdaacaa674bd

        SHA1

        455318deab797c8110dad52fd5940865fc70a548

        SHA256

        204e41af4678e3ccca8dd8e36c3812f80dccbab4185d121cd4b411cd0364bb8b

        SHA512

        05635cb8710feb946f60cf758d9e027729d4345e4287c98dc283eca2a7efbd24214fbf4952968def90163f67c89b97dd961b3f65f8b5fa3de7d625341b356ee5

      • C:\Users\Admin\AppData\Roaming\FRA.zdct

        Filesize

        1KB

        MD5

        9c691a3a9fb21b771929aae6aaf99b15

        SHA1

        2ab032406fe583c46b3c96bfd71415d9ebae9c86

        SHA256

        166422d5c106b2ebf780eab872379b2d0e69f3fe7471acec9c73226401885777

        SHA512

        076adb358fcd8394c94b8bc0ba939f6f568160c956857e73a7e585ef55e1cfbb05f4d780fcfa46a7683b99b3b00053844ef40de966ff899bc0cdd6daec58a96a

      • C:\Users\Admin\AppData\Roaming\GIF 32 No Dither.irs

        Filesize

        1KB

        MD5

        b37db354d10a73ba88288164bb13182c

        SHA1

        3649f45a56cf71a0cb551315372546700cd96a0d

        SHA256

        9840c3e72436433614eab701e18e61f0ce0ab924a9491629463c949186dace4b

        SHA512

        8afe3071ba61ed20c2034c7501d8953a5a7d313bf4acc1a69f50f369296ad4e34df895c039eadf97afd543b4c4dc27e2d0532705121158ceb2a186725ba76bca

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\UserAccountControlSettings.lnk

        Filesize

        1KB

        MD5

        34e573e8e99f1822e91e34b69afab524

        SHA1

        de191960d6f0c013939ea8d9f4437adc831e183a

        SHA256

        7588f51c4bc8483391579e3e7da0385924da1d828e75246d5fa020295adb1f8c

        SHA512

        b34e5be7a9fc0dd5244d3ce49b71f9b4cf959bb3b0f540d411801fea7124d55e7d4fd1e2489afd1accbe59b65468eeb68b231cac8413b0312f774ba2295a8991

      • C:\Users\Admin\AppData\Roaming\TuracoMaestoso.n

        Filesize

        2KB

        MD5

        6777f37b4b47394a3b0e3c61b9e82736

        SHA1

        1612fde4b33547c53aeffa10a22a7155f23bc789

        SHA256

        e85ae8f05a52e8f1ab828f201a682d5653845c72b9060a5b0ed89a1b06e4c15e

        SHA512

        9c8c417c77ccbeb9434cc1d85ff3464b5daf17683611e44cb1def10bb89aba8dd9d35b1058e423afb58517a1102c200f33907ad1d7f031826c94dac53f5a4b4a

      • C:\Users\Admin\AppData\Roaming\arbortext.extensions.xml

        Filesize

        1KB

        MD5

        b7a3d5891858ec987692f843d0da635e

        SHA1

        144dfcf7282b499e4b07b3b4ae10bbb5dc23e08c

        SHA256

        a021af7e7c49f2c338f12e715d4e2f853f4f53327dadb73b11d089fb43bf6a85

        SHA512

        c7bb9f9f0cec125ae61617bc2b6ce1b449b736d7bf5d776605d830a4a2e2e9b7957de4b1d146faa403e169052eb54af00f551e392bdc286c190e62df3df3f7f6

      • C:\Users\Admin\AppData\Roaming\arbortext.extensions.xml

        Filesize

        1KB

        MD5

        10444ab4bd31419fe88bf49830ae2b15

        SHA1

        ebbbd4497377f6650a00ed009cfca77eceb5a4c4

        SHA256

        5526566d827dde401ed86bc3fca3759616626edac46152556c7ebabc1abfb6d5

        SHA512

        d562ec53934be093c425bafb2b1fa3e17b2a8360d5903e6fba91f1708eecee5aa9db76abc8c1c8cfd8fe05d2eedd884cc8fb89df35b80b679e7f70ba213e07bd

      • C:\Users\Admin\AppData\Roaming\article.appendix.title.properties.xml

        Filesize

        1KB

        MD5

        adb1a285a2b926f98c062fbb74e1e992

        SHA1

        1f9799a61072673042a1a3da0fdf3fa93cf10f90

        SHA256

        4ba4637bffa741ba5619c3de97b6c209b5a9deb330385efc7a588492a98b7b45

        SHA512

        aa65628e34601645dfcdcb1f5f0347ae84555bd1a99432d4c25a50044dae932385bfa1f50551f6577d184de684f9264743facb53f4aa2e46bdfeff5c85bc6bd7

      • C:\Users\Admin\AppData\Roaming\article.appendix.title.properties.xml

        Filesize

        1KB

        MD5

        d9c90dbe1f927b0baf97f274ed950a82

        SHA1

        acbd1137e63a2b82dc4eb5cdc365e5891399af74

        SHA256

        142a6367e72d950b9901baa0ec939b093b47f8c2e14088ab6d2fb4803c3406b3

        SHA512

        ccd94af7f2e205a5599f6ae6fa96cc6bab7cfd1684eedaf0a36daf678e671b1f57174c82f585868b384bd1454e08bd0852719950d19dd28bdf4551d35a25ce3d

      • C:\Users\Admin\AppData\Roaming\axf.xsl

        Filesize

        3KB

        MD5

        3e6bfa45474395fcab8c295d63fe0ca1

        SHA1

        532af3f2b90b3b1cbc7fd7401777ae271aff5f74

        SHA256

        973a3d4fd3db35ef04dcd3b99176f9df936f4729b1880c189f39507e97ba8732

        SHA512

        058551c718aeff1749dbac4a6d02ff540a8e29c13a9b15ddaaae64afad0fc78b4a91805a69aa210b7c3f14df31ecf539b866fea276bad9dfb2a05a06c702c653

      • C:\Users\Admin\AppData\Roaming\bridgehead.in.toc.xml

        Filesize

        1KB

        MD5

        f83b03661f9ad653468b8ca830f7b594

        SHA1

        71b1d0c296466c9cc9f3c8d5d91fe353ae97de7d

        SHA256

        591720b1fa26e16ceb863bee7cb758f3f91183aaef26ffd15fc7a20b35ce8d45

        SHA512

        b3510966e4d4913257d3312a1943e47d408e467c003964ec7c818403f26a929449af56add595bd8d961453d71bfc7cc3329a7e9dd39be0e30447a60114e68525

      • C:\Users\Admin\AppData\Roaming\bridgehead.in.toc.xml

        Filesize

        1004B

        MD5

        c1cf25885988504b0f6f90f1cb545382

        SHA1

        5e1f1c88ab034e14dd6f3aeb9da857f5815b4c6e

        SHA256

        7808de9b4c36f737a88e309454101d3655597393323cafcf87d42e4411baa7b0

        SHA512

        7adf12507347a9dbc84c93bc38a14c3dd42ba1e2c2f0f937b0915066d437288103b831b33f5dd99ea252a9f2a0a1e6eaf6289cccb04090b8a20ae00cd652660a

      • C:\Users\Admin\AppData\Roaming\bt_unselected.png

        Filesize

        2KB

        MD5

        4693d1d384d0fd3d7f6b0ccb7ac9157c

        SHA1

        fe9c9a0f48615d75ebe3ab0743b23f7dbd08b323

        SHA256

        e520e2b3ba4d8280678f73602ee4221b51782aad62ab25db1eac991de31a609a

        SHA512

        f7290000696d12b1c0f19b907a9d5f15545ee96d8936689427f84ec8a03c1af7aa0eab829badcbb0c6644ed3847e686b7dfcf3513bb3eb6dc27bf0378315c0d5

      • C:\Users\Admin\AppData\Roaming\caution.tif

        Filesize

        1KB

        MD5

        c758bc300dbae3b2ba2ffb06b62d11de

        SHA1

        db8ceb49d310d2d91f50adead7c4b17e9f90cb6a

        SHA256

        4b2978dfb4662e49ef227bd1bac21edc4daacc373c421868d2a0f0b882cc47fc

        SHA512

        40bb4ddbb57fc743e9569b85a06a7c82328d7719efdfc2ccd891160a6d4e2ea7a4c36c67c50244435948faa79ce1c212d8c7eb490e8633815841d137d74fd5f9

      • C:\Users\Admin\AppData\Roaming\chunker.output.doctype-system.xml

        Filesize

        1KB

        MD5

        e930bf24883de57b28a31a733d618645

        SHA1

        416f7f4e017f619d1ac89a34c1e34a5baad73c56

        SHA256

        2f3ce5515bead08015d327ba391060bd70614aea8b8c4325470723f824d51a21

        SHA512

        cfe4c11334a627ba2a5a022bf669a78df88ef9e641596bd7cac6fc590da62490e90f9ff3b1f06a169684820406e452f12be420b13de1b093ff1dd73abaee6b3a

      • C:\Users\Admin\AppData\Roaming\circle_yellow.png

        Filesize

        3KB

        MD5

        b27438aa347f1bc4c68d91bdf2f25a94

        SHA1

        781bfcf9cc215a641fc3d93b686c37770c2eba15

        SHA256

        0a2cc44a45e3057335b421f7b0b80bdbbd1578cf38229f43fe56ae1f4d8d6e15

        SHA512

        e95b5974a5d09e49835a6ffb2733d6a72e8ba06ea4e28aab53c60b00b423133d2b31e645104708b35c049be04d0b7cc9b60435c1ceac83791d6fd153c4524674

      • C:\Users\Admin\AppData\Roaming\circle_yellow.png

        Filesize

        4KB

        MD5

        609ece8785bfb00bcdbfef246b7932db

        SHA1

        d987409ffc5f1f00ed8adff58d9405e8a4dce658

        SHA256

        980e6cf2e4deeb6a5a80c0872125b2f42f5dcb9d0a649a0513681d610a7ba694

        SHA512

        39a5ae8da1dfcc8306011804ee298ad047ee42e5439ac4e76dd53cde8045c2e2193dc6358ba6ef67dced0019778dccaf52a532822becf6a0c5ff6d70b89b59e7

      • C:\Users\Admin\AppData\Roaming\close_button.png

        Filesize

        3KB

        MD5

        f7175f00793a0b7ceb2ed58c4a746c3a

        SHA1

        28afdb7e48f93395c0a5d8859ef0b93e2469188e

        SHA256

        a7b5202a960ef8de6573cb10f0e8e365e1c3ecef63b02037a8fb754d3fcd93b0

        SHA512

        ad8fa912135b027c7ae52ab1d2a9f7a15dd146cee87e4fe7c1868e17b0a2d82a4d01bcf796a8aad8f76c98191630af02b30776ef71c0cf999f1af836c683ff34

      • C:\Users\Admin\AppData\Roaming\completeTest.png

        Filesize

        4KB

        MD5

        79925c43e010b7f773242b65c66296fc

        SHA1

        677ec09693b2071537aba4c4eb4c14b7504b0c06

        SHA256

        dac58e21fdfa2e80b413338245985103899adb9f337c602fc77d15fcea550c52

        SHA512

        cd3aadfc1375d5a54f8bdb3caa68128d22ab66726450fb4eb9ba73e1098d29d0179d6256cde168391e9ca32e44abc4e3e1470bfb2f6139ce5182480defafd91d

      • C:\Users\Admin\AppData\Roaming\css.stylesheet.dir.xml

        Filesize

        1KB

        MD5

        c29954f6f6a53c37aeb7ad23e37ff73b

        SHA1

        068a87dbd5d5277f0508845838644bd5cb933e9b

        SHA256

        045323cff6bd1afd75cd8fdb8c7f65569370fcbf6dcbbbc0e24f4c6d5754c45b

        SHA512

        1760bf9610ae6433b395f2345cf56a06617c64002e3883531e6854b468b2026982883a1a89b33907be3befbb8353aca650a6fbfb42bb543d0c24f2a9416bce35

      • C:\Users\Admin\AppData\Roaming\css.stylesheet.dir.xml

        Filesize

        1KB

        MD5

        2d917ec5e7f78d9682acad79e3bcab6f

        SHA1

        3ec65e465ff81dfb2383d2e8343a2c971f644b33

        SHA256

        b28c92e934023af34acf714bdd4c00acc0c9f252b4bad8e914516ff930011d58

        SHA512

        04b621b7fda48c92e52b3a1877d87a43902278f4ca190322f9a802c65a1c8e593e1f7f7b4295b8192119701e60392210798cec47961bf172c9dae75577d7f565

      • C:\Users\Admin\AppData\Roaming\cze.fca

        Filesize

        736B

        MD5

        88d6f04b392d967599688ee82f343789

        SHA1

        91818d228042915f86ac8fd846f24a807dbf54d9

        SHA256

        210e911f0bf21a4edd3cff6e5d3c27bd225621efaf9015ed6d82c8b6fca1c18a

        SHA512

        a43e762de9c9514d9f3253e1d15d563382c7c39cd61a9c45611288cc53c72b7611976a836e546e26ffbfd891361ac87a787b273a526df12b649dbbd6d65d193f

      • C:\Users\Admin\AppData\Roaming\diagnostics_pass.png

        Filesize

        1KB

        MD5

        50fbb1df4735fde6da6e5c34160da040

        SHA1

        fb6fc004d59888aaeaa46ab2998c44e8ce02bfb0

        SHA256

        22600b806af90198ef67933873413cca2d37a724535f04550d862564fd3f5e2c

        SHA512

        7bacca1e1545d0191da0f9c4e062ce4d83b10c3ff5658bc07631b44c6b2686e8c719bb072dd48d95f328e67cab25d96388e2e414fef1d5205b36d151b6aa2d83

      • C:\Users\Admin\AppData\Roaming\divide.js

        Filesize

        167B

        MD5

        13194de77e275fe71787174454c05075

        SHA1

        93b61619180fff398e48e352f5731cb71bf88eeb

        SHA256

        027981c44bb087ccdd6d77f49fc930ca697dae46ed13b39b2a76d67ab8e09b62

        SHA512

        69ecabf405511caca1e54a3fabc024abdb0be0dfbbf25d817bc539fb65cfc298466c033c2362db811e2272ffb48e68f720c056524a9713407fbf873841175b92

      • C:\Users\Admin\AppData\Roaming\dotted.js

        Filesize

        457B

        MD5

        f06efba39e83f2a70a0328784e1fab8e

        SHA1

        eac0d7b5a5b790aaa612e0424b72abfda6f1d70e

        SHA256

        2414dacd7ad46180e10eff934be18688069461be00f83cb9e6fdb84f677d7984

        SHA512

        943530b778ed16287a65c5f67e183b23b0ab7d9be04dddd693756999182bf9a2f36944e3c9ba0e7ec58ebf668adbe39ca399c688dab2fa20437de0ffa298a115

      • C:\Users\Admin\AppData\Roaming\down_arrow.gif

        Filesize

        865B

        MD5

        8ecfebfbb98d6839606185ab43b12e46

        SHA1

        f146f2c17599cf17b98eebead3d7207c3de6c02b

        SHA256

        b40705c3a3a6b1ec1fd376811e31c6eceec3028ee2bd8e8d9b793c9ad6dafcb9

        SHA512

        f3f1deedb32a51263dd42a54e9d7be2b1af4c18a647d4a9b12409fe695d3388628d55d13af60c2ad602f7af473e1c909214229cf1c18277eac46ec178cc1391f

      • C:\Users\Admin\AppData\Roaming\download_3.ico

        Filesize

        2KB

        MD5

        78174a09c800b5fa05ced6cc5e2c5e24

        SHA1

        f52253b99e621d66aaae55e3a54bf12b4dd2f612

        SHA256

        d0473db04aabf9a77f7f5a7937f2ab66356621a73448d2f88aa3415dbeb62b6c

        SHA512

        d51fbbc9c0cecc520128c632f1685f05ee6aba77a7db3ffd9ef3faea68d519a06883a293f4806efcb5a96af126710ed738bd52194a03aba22c211d7d1b093484

      • C:\Users\Admin\AppData\Roaming\eamonm.inf

        Filesize

        2KB

        MD5

        e8d4282400a1c4709ecb37b933269a98

        SHA1

        dc9febbb99924c761c77bf69286241efaa803f38

        SHA256

        cb1765e39a9bfde57e60683657257cdae7c84c88d55be43524168a4010be701e

        SHA512

        f51e18f1705fa4bcb5bd7f072095ee4f9c37ed1503b038854a4a147344f08deda036e000ac4bcfbbe4d688bc238434d18dea75db645c7648ca63e8c00a6b11ec

      • C:\Users\Admin\AppData\Roaming\eventViewer.png

        Filesize

        1KB

        MD5

        748a5a7a333b6d7391c8424ec2ba7179

        SHA1

        58ced520776c3c168eff998279262acbea2060a4

        SHA256

        3d13aee8c13d1f3a1fe13311ee046bc95658aed8408a04004de290c9c351fc94

        SHA512

        b1273da7adeeeba9e8d992d690411b89eecde98521c62e91e1c2628c0c11d777ff1ae82fd6f9174cf27b6699893b29e72eb33856171034ec2015125e1ed99612

      • C:\Users\Admin\AppData\Roaming\flash.icon2.ico

        Filesize

        2KB

        MD5

        6995fc85569b51656600bafe2d328769

        SHA1

        f723b92c6ad790ef993afa40c9f4289e7b4c5291

        SHA256

        34845298147e26a7cdd09f98a895b27a082b4340b1980a9a23a1a858e89c4ce8

        SHA512

        de5f358bb1bb42e3ad6d691bfe0451268cb972872499c4abdd00b2a8728e73ad9e6500e47d92328d8ce05acb2d1f6a5a80ea65e9020145a301aa08bf2d6819d3

      • C:\Users\Admin\AppData\Roaming\folder.png

        Filesize

        3KB

        MD5

        537b6afacada7212e1fe3a2a18e6fc8a

        SHA1

        444e48a91d3203d54d2e80c39275430ea90600b4

        SHA256

        a1a288b69d74311b4ac05e091211233dc801781a8dfa4c6e2f7dae20d513287f

        SHA512

        41a1c4a96ffa32c0426b107874788c81a9513ff83f42290598a6e04d18d8333f0b8b3c5975e6835a7c1dffa37e8a97e7200c1cf90bf73dff1f38b2779684dda4

      • C:\Users\Admin\AppData\Roaming\g3_4 x 6 in 300 dpi.IMZ

        Filesize

        46B

        MD5

        cd1189f6747a3d39a55c8161d9d5359e

        SHA1

        f8591dfaa1f090d94b925a59bec4dbc5ea13eba7

        SHA256

        91236620f96688bec91ed6d98f2372ffea9038007e7ae42089970b87b637f5a1

        SHA512

        6baaedffb6ff818b59259871181e058604d2d576d5fdf39243952503a0fb08fca1fa47ba3a73163c5b2ecb76be80cadfe8cb2d5510a5e1ccf76f86d921276c06

      • C:\Users\Admin\AppData\Roaming\generate.section.toc.level.xml

        Filesize

        1KB

        MD5

        53d3ecb0cd2596cd97a49d498225b9eb

        SHA1

        bdb84142b64b2ef9454a08ffb8207b2d2098234c

        SHA256

        aebbf7076b60c077fdca77deb28a6ffb8524b8fedcae93d3b155f54dee9289d2

        SHA512

        9904015f0c9bf8e38294eb4a8c40e9ff867bfdd28980c95e164fb179b69a326dc6378d9a5cdd5efc6e58b966db7263775a31cac64f93979c71aca8c912fffe50

      • C:\Users\Admin\AppData\Roaming\getDocumentInfo.jsx

        Filesize

        1KB

        MD5

        b9c8db5dd26818a63fb9e031739f8fab

        SHA1

        0237909e0b39d6826bada9b63a811925719ddf51

        SHA256

        98cf791cd08a24c5ca85b59be971caf7776af6d31ac812e3bb949a20f7332ef8

        SHA512

        c02cb2275c8e0dba6e997fd04405d84aaeb65a3ea3be89d2632cf0a979fe888fee8d85f0068b807b017b1a52eeadd2dba6dc8fec36f95ee3078d5a2c1a8a3fe6

      • C:\Users\Admin\AppData\Roaming\glib.txt

        Filesize

        1KB

        MD5

        b36dea9e37a35611148b84e339b6ec42

        SHA1

        6fedb260507565077492a2c9bfc3843f08a3231e

        SHA256

        2ff797880e22505e09ddaa4d205ab5ce700c8d22631e80cc48434d56dc3cff70

        SHA512

        53ccc4827269d947a385dd27397934b3f33453df60288b03864c486463e1fd69f8a83c2bb3b917f1df1acaab8f0b1cdb959c8e4687835ebf903423e26c4583a8

      • C:\Users\Admin\AppData\Roaming\goURL_lr_photoshop_kr.csv

        Filesize

        315B

        MD5

        e7b835efd565a6bd02237591a64416fa

        SHA1

        7ea8027ff98e318758a48907a1f69b1b35f63c72

        SHA256

        67ca7823ea8b02127ea8e4c198585e8442530e7e803b2832666257c4050ad605

        SHA512

        911bd83c92eaa36464bcb00c45102bc1b5eacfc83cd8d7ccebf920874fd5156a975d1c0bcfe0d96ca0461ddb287f43c2c8204722d93c6f0ea8663d8f75e14f81

      • \Users\Admin\AppData\Local\Temp\nsjBB75.tmp\System.dll

        Filesize

        11KB

        MD5

        ca332bb753b0775d5e806e236ddcec55

        SHA1

        f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f

        SHA256

        df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d

        SHA512

        2de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00

      • \Users\Admin\AppData\Roaming\SFhelper.dll

        Filesize

        70KB

        MD5

        d9fb0839c496f06e824e3a5c41572462

        SHA1

        7978f5ac7ec69d8e33751f8009b37279db50e455

        SHA256

        55d7dac32b8533e26549f776bd3ca7c87b359fa7de9bfeee1222dec381a8d98c

        SHA512

        038c604625d6e08922b9befb412f0922de15c0e9cb5118b91419c03b10f727e91c06a0149a80e5acc5f3b976c3f807264d1e5bdfe5fe947962623d0256d731e4

      • \Users\Admin\AppData\Roaming\{DD459DAE-5E5E-3671-9AE2-982F791F22E2}\UserAccountControlSettings.exe

        Filesize

        280KB

        MD5

        541364a81cb365be420373fce3d1f19b

        SHA1

        fffb124ed79715769e61f793cd3b47458ab74293

        SHA256

        2a8285f324c9ad8dc54f190aa3627ac9bebd546173ed89d5ecd1ea7b65641c75

        SHA512

        c19e4d702ea3656b1f73ff263574459fc572f955dd7b492efe7f360659d93739334d669edaeeb15a0589490d67092087f7349bb964d426bc86ee412480a08732

      • memory/2172-194-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2172-359-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2172-187-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2172-697-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2172-191-0x0000000001EC0000-0x0000000001EC1000-memory.dmp

        Filesize

        4KB

      • memory/2172-197-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2172-195-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2172-196-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2172-193-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2172-189-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2172-188-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2316-47-0x0000000000370000-0x000000000038D000-memory.dmp

        Filesize

        116KB

      • memory/2316-62-0x0000000000370000-0x000000000038D000-memory.dmp

        Filesize

        116KB

      • memory/2776-67-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2776-68-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2776-65-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2776-80-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2776-49-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2776-51-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2776-55-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2776-57-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2776-59-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2776-61-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2776-53-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/2812-184-0x0000000000330000-0x000000000034D000-memory.dmp

        Filesize

        116KB

      • memory/2812-170-0x0000000000330000-0x000000000034D000-memory.dmp

        Filesize

        116KB