Analysis

  • max time kernel
    300s
  • max time network
    304s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/11/2024, 18:02

General

  • Target

    RNSM00292.7z

  • Size

    5.4MB

  • MD5

    8a83f8f4b158a2523ad52c6425c8935b

  • SHA1

    994680ba0dfb3f6bc0bfc86bbd4de6873709c039

  • SHA256

    f0edaec536b41abae2eae5fb2c351a69ea4a54cc9dc6f61901b3549da7e45e32

  • SHA512

    92df71a3c67d292de5eda51ce33b567cadbda73adb1615c9231b494bebc25d85fab05b3c9a86595f7222dd46bbc1b119dd2a5cee464c2bc38160fdf8e1918b66

  • SSDEEP

    98304:jW7HRUmHm9uEa3p2CAdsO2zJYlWxXnK49Rv+SeWS4Eav1pjE7p/:eR1F/VssO2Ntx649K2EEjE7p/

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+rihou.txt

Ransom Note
----- NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://ytrest84y5i456hghadefdsd.pontogrot.com/964CFB991126D7F6 2. http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/964CFB991126D7F6 3. http://5rport45vcdef345adfkksawe.bematvocal.at/964CFB991126D7F6 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/964CFB991126D7F6 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://ytrest84y5i456hghadefdsd.pontogrot.com/964CFB991126D7F6 http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/964CFB991126D7F6 http://5rport45vcdef345adfkksawe.bematvocal.at/964CFB991126D7F6 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/964CFB991126D7F6
URLs

http://ytrest84y5i456hghadefdsd.pontogrot.com/964CFB991126D7F6

http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/964CFB991126D7F6

http://5rport45vcdef345adfkksawe.bematvocal.at/964CFB991126D7F6

http://xlowfznrg4wf7dli.onion/964CFB991126D7F6

http://xlowfznrg4wf7dli.ONION/964CFB991126D7F6

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+cbvax.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F584B6F3B95E785D 2 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/F584B6F3B95E785D 3 - http://yyre45dbvn2nhbefbmh.begumvelic.at/F584B6F3B95E785D If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/F584B6F3B95E785D 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F584B6F3B95E785D http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/F584B6F3B95E785D http://yyre45dbvn2nhbefbmh.begumvelic.at/F584B6F3B95E785D Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/F584B6F3B95E785D
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F584B6F3B95E785D

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/F584B6F3B95E785D

http://yyre45dbvn2nhbefbmh.begumvelic.at/F584B6F3B95E785D

http://xlowfznrg4wf7dli.ONION/F584B6F3B95E785D

Extracted

Path

C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #CerberRansomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Ransomware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.azlto5.win/32F6-1C0F-6CE1-0063-7EDD | | 2. http://cerberhhyed5frqa.xzcfr4.win/32F6-1C0F-6CE1-0063-7EDD | | 3. http://cerberhhyed5frqa.asxce4.win/32F6-1C0F-6CE1-0063-7EDD | | 4. http://cerberhhyed5frqa.45kgok.win/32F6-1C0F-6CE1-0063-7EDD | | 5. http://cerberhhyed5frqa.ad34ft.win/32F6-1C0F-6CE1-0063-7EDD |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.azlto5.win/32F6-1C0F-6CE1-0063-7EDD); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.azlto5.win/32F6-1C0F-6CE1-0063-7EDD appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.azlto5.win/32F6-1C0F-6CE1-0063-7EDD); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/32F6-1C0F-6CE1-0063-7EDD | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.azlto5.win/32F6-1C0F-6CE1-0063-7EDD

http://cerberhhyed5frqa.xzcfr4.win/32F6-1C0F-6CE1-0063-7EDD

http://cerberhhyed5frqa.asxce4.win/32F6-1C0F-6CE1-0063-7EDD

http://cerberhhyed5frqa.45kgok.win/32F6-1C0F-6CE1-0063-7EDD

http://cerberhhyed5frqa.ad34ft.win/32F6-1C0F-6CE1-0063-7EDD

http://cerberhhyed5frqa.onion/32F6-1C0F-6CE1-0063-7EDD

Extracted

Path

C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber Ransomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #CerberRansomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Ransomware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.azlto5.win/32F6-1C0F-6CE1-0063-7EDD" target="_blank">http://cerberhhyed5frqa.azlto5.win/32F6-1C0F-6CE1-0063-7EDD</a></li> <li><a href="http://cerberhhyed5frqa.xzcfr4.win/32F6-1C0F-6CE1-0063-7EDD" target="_blank">http://cerberhhyed5frqa.xzcfr4.win/32F6-1C0F-6CE1-0063-7EDD</a></li> <li><a href="http://cerberhhyed5frqa.asxce4.win/32F6-1C0F-6CE1-0063-7EDD" target="_blank">http://cerberhhyed5frqa.asxce4.win/32F6-1C0F-6CE1-0063-7EDD</a></li> <li><a href="http://cerberhhyed5frqa.45kgok.win/32F6-1C0F-6CE1-0063-7EDD" target="_blank">http://cerberhhyed5frqa.45kgok.win/32F6-1C0F-6CE1-0063-7EDD</a></li> <li><a href="http://cerberhhyed5frqa.ad34ft.win/32F6-1C0F-6CE1-0063-7EDD" target="_blank">http://cerberhhyed5frqa.ad34ft.win/32F6-1C0F-6CE1-0063-7EDD</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.azlto5.win/32F6-1C0F-6CE1-0063-7EDD" target="_blank">http://cerberhhyed5frqa.azlto5.win/32F6-1C0F-6CE1-0063-7EDD</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.azlto5.win/32F6-1C0F-6CE1-0063-7EDD" target="_blank">http://cerberhhyed5frqa.azlto5.win/32F6-1C0F-6CE1-0063-7EDD</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.azlto5.win/32F6-1C0F-6CE1-0063-7EDD" target="_blank">http://cerberhhyed5frqa.azlto5.win/32F6-1C0F-6CE1-0063-7EDD</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/32F6-1C0F-6CE1-0063-7EDD</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Betabot family
  • Cerber 11 IoCs

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Cerber family
  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Locky family
  • Modifies firewall policy service 3 TTPs 4 IoCs
  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Contacts a large (17511) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • Renames multiple (4066) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Renames multiple (469) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Adds policy Run key to start application 2 TTPs 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Drops file in Drivers directory 5 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
  • Looks for VMWare services registry key. 1 TTPs 11 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 12 IoCs
  • Executes dropped EXE 62 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 16 IoCs
  • Checks whether UAC is enabled 1 TTPs 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Indicator Removal: Clear Persistence 1 TTPs 1 IoCs

    remove IFEO.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 22 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 64 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 61 IoCs
  • Suspicious use of SetThreadContext 18 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 11 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 7 IoCs
  • Modifies Control Panel 8 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • NTFS ADS 2 IoCs
  • Opens file in notepad (likely ransom note) 3 IoCs
  • Runs ping.exe 1 TTPs 5 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 25 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 34 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Suspicious use of UnmapMainImage 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1044
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1080
        • C:\Program Files\7-Zip\7zFM.exe
          "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00292.7z"
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:2080
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:576
          • C:\Users\Admin\Desktop\00292\HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe
            HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe
            3⤵
            • Cerber
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Sets desktop wallpaper using registry
            • Drops file in Windows directory
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious use of AdjustPrivilegeToken
            PID:2976
            • C:\Windows\SysWOW64\netsh.exe
              C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
              4⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              PID:2664
            • C:\Windows\SysWOW64\netsh.exe
              C:\Windows\system32\netsh.exe advfirewall reset
              4⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              PID:2052
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___KM4CCOT_.hta"
              4⤵
              • Blocklisted process makes network request
              • Modifies Internet Explorer settings
              PID:1684
            • C:\Windows\SysWOW64\NOTEPAD.EXE
              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___LIZZ_.txt
              4⤵
              • System Location Discovery: System Language Discovery
              • Opens file in notepad (likely ransom note)
              PID:1924
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe"
              4⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:2500
              • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe
                "C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2032
                • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe
                  "C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"
                  6⤵
                  • Cerber
                  • Adds policy Run key to start application
                  • Drops startup file
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Checks whether UAC is enabled
                  • Sets desktop wallpaper using registry
                  • System Location Discovery: System Language Discovery
                  • Modifies Control Panel
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3936
                  • C:\Windows\system32\vssadmin.exe
                    "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
                    7⤵
                    • Interacts with shadow copies
                    PID:4000
                  • C:\Windows\system32\wbem\wmic.exe
                    "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
                    7⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2488
                  • C:\Windows\System32\bcdedit.exe
                    "C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:3096
                  • C:\Windows\System32\bcdedit.exe
                    "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2524
                  • C:\Windows\system32\NOTEPAD.EXE
                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
                    7⤵
                      PID:1288
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
                      7⤵
                        PID:1744
                      • C:\Windows\system32\cmd.exe
                        /d /c taskkill /t /f /im "instnm.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe" > NUL
                        7⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        PID:3112
                        • C:\Windows\system32\taskkill.exe
                          taskkill /t /f /im "instnm.exe"
                          8⤵
                          • Kills process with taskkill
                          PID:3564
                        • C:\Windows\system32\PING.EXE
                          ping -n 1 127.0.0.1
                          8⤵
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Runs ping.exe
                          PID:1296
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im "HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:536
                  • C:\Windows\SysWOW64\PING.EXE
                    ping -n 1 127.0.0.1
                    5⤵
                    • System Location Discovery: System Language Discovery
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Runs ping.exe
                    PID:2360
              • C:\Users\Admin\Desktop\00292\HEUR-Trojan-Ransom.Win32.Zerber.pef-2debd47f853fd25ad7c286e19266d6e0d711d1d41b47b53978c18557e291251b.exe
                HEUR-Trojan-Ransom.Win32.Zerber.pef-2debd47f853fd25ad7c286e19266d6e0d711d1d41b47b53978c18557e291251b.exe
                3⤵
                • Cerber
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Enumerates system info in registry
                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                PID:1968
              • C:\Users\Admin\Desktop\00292\HEUR-Trojan-Ransom.Win32.Zerber.vho-13b17fb9ff6962f04ff6a5fc713c1e0b5b3a3d338f7d22552e45e0482d753eac.exe
                HEUR-Trojan-Ransom.Win32.Zerber.vho-13b17fb9ff6962f04ff6a5fc713c1e0b5b3a3d338f7d22552e45e0482d753eac.exe
                3⤵
                • Cerber
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                PID:1772
              • C:\Users\Admin\Desktop\00292\Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe
                Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                PID:2004
                • C:\Users\Admin\Desktop\00292\Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe
                  Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe
                  4⤵
                  • Cerber
                  • Drops startup file
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2624
                  • C:\Windows\SysWOW64\cmd.exe
                    /d /c taskkill /t /f /im "Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00292\Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe" > NUL
                    5⤵
                    • System Location Discovery: System Language Discovery
                    • System Network Configuration Discovery: Internet Connection Discovery
                    PID:1360
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /t /f /im "Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2636
              • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe
                Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe
                3⤵
                • Executes dropped EXE
                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                • Suspicious behavior: EnumeratesProcesses
                PID:2020
                • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe
                  C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\delph1.dat"
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Enumerates connected drives
                  • System Location Discovery: System Language Discovery
                  PID:1544
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /C echo. > "C:\Users\Admin\AppData\Roaming\win.exe":Zone.Identifier
                    5⤵
                    • Subvert Trust Controls: Mark-of-the-Web Bypass
                    • System Location Discovery: System Language Discovery
                    • NTFS ADS
                    PID:2128
                    • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe
                      "C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe"
                      6⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of UnmapMainImage
                      PID:1580
                  • C:\Users\Admin\AppData\Roaming\win.exe
                    C:\Users\Admin\AppData\Roaming\win.exe
                    5⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2212
                    • C:\Users\Admin\AppData\Roaming\win.exe
                      C:\Users\Admin\AppData\Roaming\win.exe /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\delph1.dat"
                      6⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Enumerates connected drives
                      • System Location Discovery: System Language Discovery
                      • NTFS ADS
                      • Suspicious behavior: EnumeratesProcesses
                      PID:408
              • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exe
                Trojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exe
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                • Suspicious use of SetWindowsHookEx
                PID:912
                • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exe
                  Trojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exe
                  4⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1920
                  • C:\Windows\oleecardpfod.exe
                    C:\Windows\oleecardpfod.exe
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:2612
                    • C:\Windows\oleecardpfod.exe
                      C:\Windows\oleecardpfod.exe
                      6⤵
                      • Drops startup file
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Drops file in Program Files directory
                      • System policy modification
                      PID:3264
                      • C:\Windows\System32\wbem\WMIC.exe
                        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
                        7⤵
                          PID:2424
                        • C:\Windows\SysWOW64\NOTEPAD.EXE
                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
                          7⤵
                          • System Location Discovery: System Language Discovery
                          • Opens file in notepad (likely ransom note)
                          PID:3440
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
                          7⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of SetWindowsHookEx
                          PID:2452
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:2
                            8⤵
                            • Looks for VMWare services registry key.
                            • Maps connected drives based on registry
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Modifies Internet Explorer settings
                            • Suspicious use of SetWindowsHookEx
                            PID:3884
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:209933 /prefetch:2
                            8⤵
                            • Looks for VMWare services registry key.
                            • Maps connected drives based on registry
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Modifies Internet Explorer settings
                            • Suspicious use of SetWindowsHookEx
                            PID:3872
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:472072 /prefetch:2
                            8⤵
                            • Looks for VMWare services registry key.
                            • Maps connected drives based on registry
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Modifies Internet Explorer settings
                            • Suspicious use of SetWindowsHookEx
                            PID:3284
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:6042630 /prefetch:2
                            8⤵
                            • Looks for VMWare services registry key.
                            • Maps connected drives based on registry
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Modifies Internet Explorer settings
                            • Suspicious use of SetWindowsHookEx
                            PID:3340
                        • C:\Windows\System32\wbem\WMIC.exe
                          "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
                          7⤵
                            PID:3724
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\OLEECA~1.EXE
                            7⤵
                              PID:3872
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00292\TR15D4~1.EXE
                          5⤵
                          • Loads dropped DLL
                          PID:2692
                          • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe
                            "C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"
                            6⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:2856
                            • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe
                              "C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3568
                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exe
                      Trojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exe
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                      • Suspicious use of SetWindowsHookEx
                      PID:1792
                      • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exe
                        Trojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exe
                        4⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2388
                        • C:\Windows\oleecardpfod.exe
                          C:\Windows\oleecardpfod.exe
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious use of SetWindowsHookEx
                          PID:2620
                          • C:\Windows\oleecardpfod.exe
                            C:\Windows\oleecardpfod.exe
                            6⤵
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • System Location Discovery: System Language Discovery
                            • System policy modification
                            PID:3524
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00292\TRA4A5~1.EXE
                          5⤵
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          PID:1548
                          • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe
                            "C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"
                            6⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:1580
                            • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe
                              "C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2876
                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exe
                      Trojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exe
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                      PID:1540
                      • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exe
                        Trojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exe
                        4⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1544
                        • C:\Windows\jrjyidguupnj.exe
                          C:\Windows\jrjyidguupnj.exe
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:3528
                          • C:\Windows\jrjyidguupnj.exe
                            C:\Windows\jrjyidguupnj.exe
                            6⤵
                            • Drops startup file
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • Drops file in Program Files directory
                            • System policy modification
                            PID:2456
                            • C:\Windows\System32\wbem\WMIC.exe
                              "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                              7⤵
                                PID:2832
                              • C:\Windows\SysWOW64\NOTEPAD.EXE
                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
                                7⤵
                                • Opens file in notepad (likely ransom note)
                                PID:3892
                              • C:\Windows\System32\wbem\WMIC.exe
                                "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                7⤵
                                  PID:380
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\JRJYID~1.EXE
                                  7⤵
                                    PID:2084
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00292\TR1C27~1.EXE
                                5⤵
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:3604
                                • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe
                                  "C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:3668
                                  • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe
                                    "C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"
                                    7⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1888
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe
                            Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe
                            3⤵
                            • Drops startup file
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Adds Run key to start application
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:2340
                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
                              4⤵
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2536
                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" /stext C:\ProgramData\Mails.txt
                                5⤵
                                • Accesses Microsoft Outlook accounts
                                • System Location Discovery: System Language Discovery
                                PID:1612
                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" /stext C:\ProgramData\Browsers.txt
                                5⤵
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1484
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe
                            Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            PID:1856
                            • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe
                              "C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe"
                              4⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              PID:1432
                              • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe
                                "C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe"
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                PID:1408
                                • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe
                                  "C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:3188
                                  • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe
                                    "C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe"
                                    7⤵
                                    • Event Triggered Execution: Image File Execution Options Injection
                                    • Executes dropped EXE
                                    • Checks whether UAC is enabled
                                    • Indicator Removal: Clear Persistence
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Checks processor information in registry
                                    • Suspicious behavior: MapViewOfSection
                                    PID:3028
                                    • C:\Windows\SysWOW64\explorer.exe
                                      C:\Windows\SysWOW64\explorer.exe
                                      8⤵
                                      • Modifies firewall policy service
                                      • Event Triggered Execution: Image File Execution Options Injection
                                      • Checks BIOS information in registry
                                      • Adds Run key to start application
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Checks processor information in registry
                                      • Enumerates system info in registry
                                      • Modifies Internet Explorer Protected Mode
                                      • Modifies Internet Explorer Protected Mode Banner
                                      • Modifies Internet Explorer settings
                                      • Suspicious behavior: MapViewOfSection
                                      PID:1692
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe
                            Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe
                            3⤵
                            • Drops file in Drivers directory
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Sets desktop wallpaper using registry
                            • Drops file in Program Files directory
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            • Modifies Internet Explorer settings
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            • Suspicious behavior: RenamesItself
                            PID:1840
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd.exe /C del /Q /F "C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe"
                              4⤵
                              • Loads dropped DLL
                              PID:4088
                              • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe
                                "C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"
                                5⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of SetWindowsHookEx
                                PID:1872
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe
                            Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            PID:2444
                            • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe
                              "C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe"
                              4⤵
                              • Looks for VMWare services registry key.
                              • Executes dropped EXE
                              • Checks whether UAC is enabled
                              • Maps connected drives based on registry
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              PID:1528
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.bil-90f1e63fb40eebaca98ae542ad1a3cf59d6a2e13fd192173c401ec686869001e.exe
                            Trojan-Ransom.Win32.Locky.bil-90f1e63fb40eebaca98ae542ad1a3cf59d6a2e13fd192173c401ec686869001e.exe
                            3⤵
                            • Executes dropped EXE
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            PID:1724
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe
                            Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe
                            3⤵
                            • Looks for VMWare services registry key.
                            • Executes dropped EXE
                            • Checks whether UAC is enabled
                            • Maps connected drives based on registry
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Modifies system certificate store
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            PID:2764
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe
                            Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe
                            3⤵
                            • Looks for VMWare services registry key.
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • Checks whether UAC is enabled
                            • Maps connected drives based on registry
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            PID:2740
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe
                            Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            • Suspicious behavior: MapViewOfSection
                            PID:2808
                            • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe
                              Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe
                              4⤵
                              • Looks for VMWare services registry key.
                              • Executes dropped EXE
                              • Checks whether UAC is enabled
                              • Maps connected drives based on registry
                              • Sets desktop wallpaper using registry
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Modifies Control Panel
                              • Suspicious behavior: MapViewOfSection
                              PID:708
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysEC81.tmp"
                                5⤵
                                • Looks for VMWare services registry key.
                                • Checks whether UAC is enabled
                                • Maps connected drives based on registry
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                PID:288
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.eaok-ed7b8675080db9821dcb531824e70c7ec4fbec965810a04fa2b3511c3c1726fb.exe
                            Trojan-Ransom.Win32.Zerber.eaok-ed7b8675080db9821dcb531824e70c7ec4fbec965810a04fa2b3511c3c1726fb.exe
                            3⤵
                            • Executes dropped EXE
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            PID:1924
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.eeet-de3e697abf272172c5ebcbaeb500c6944d307693f3755250c0bb953a36961a0f.exe
                            Trojan-Ransom.Win32.Zerber.eeet-de3e697abf272172c5ebcbaeb500c6944d307693f3755250c0bb953a36961a0f.exe
                            3⤵
                            • Cerber
                            • Executes dropped EXE
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            PID:712
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.eeki-468f076437db73e8b6e07784029e76067a408b262913a9b3258756dbbc2125f2.exe
                            Trojan-Ransom.Win32.Zerber.eeki-468f076437db73e8b6e07784029e76067a408b262913a9b3258756dbbc2125f2.exe
                            3⤵
                            • Executes dropped EXE
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            PID:396
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.erie-6cfd956f242e0a146747752474690ca1c94a9b8992648e19bb53f383a80aa232.exe
                            Trojan-Ransom.Win32.Zerber.erie-6cfd956f242e0a146747752474690ca1c94a9b8992648e19bb53f383a80aa232.exe
                            3⤵
                            • Executes dropped EXE
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            PID:1588
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.fpkd-655b716315904da7ff7851ec2bc5a46da4fef21ff331c114fd6bba4d36d8806e.exe
                            Trojan-Ransom.Win32.Zerber.fpkd-655b716315904da7ff7851ec2bc5a46da4fef21ff331c114fd6bba4d36d8806e.exe
                            3⤵
                            • Executes dropped EXE
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            PID:236
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe
                            Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            • Suspicious use of SetWindowsHookEx
                            PID:1752
                            • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe
                              Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe
                              4⤵
                              • Cerber
                              • Adds policy Run key to start application
                              • Drops startup file
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • System Location Discovery: System Language Discovery
                              • Modifies Control Panel
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1692
                              • C:\Windows\SysWOW64\cmd.exe
                                /d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe" > NUL
                                5⤵
                                • System Location Discovery: System Language Discovery
                                • System Network Configuration Discovery: Internet Connection Discovery
                                PID:2300
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe"
                                  6⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2700
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe
                            Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe
                            3⤵
                            • Cerber
                            • Adds policy Run key to start application
                            • Drops startup file
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Adds Run key to start application
                            • System Location Discovery: System Language Discovery
                            • Modifies Control Panel
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of UnmapMainImage
                            PID:2352
                            • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe
                              "C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe"
                              4⤵
                              • Cerber
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of UnmapMainImage
                              PID:1692
                            • C:\Windows\SysWOW64\cmd.exe
                              /d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe" > NUL
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • System Network Configuration Discovery: Internet Connection Discovery
                              PID:2612
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe"
                                5⤵
                                • System Location Discovery: System Language Discovery
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2512
                              • C:\Windows\SysWOW64\PING.EXE
                                ping -n 1 127.0.0.1
                                5⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:2696
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exe
                            Trojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exe
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            • Suspicious behavior: MapViewOfSection
                            PID:2072
                            • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exe
                              Trojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exe
                              4⤵
                              • Cerber
                              • Executes dropped EXE
                              PID:2112
                          • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe
                            Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            • Suspicious behavior: MapViewOfSection
                            PID:2556
                            • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe
                              Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe
                              4⤵
                              • Cerber
                              • Executes dropped EXE
                              PID:2472
                        • C:\Windows\system32\taskmgr.exe
                          "C:\Windows\system32\taskmgr.exe" /4
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:996
                      • C:\Windows\system32\DllHost.exe
                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                        1⤵
                          PID:1176
                        • C:\Windows\system32\DllHost.exe
                          C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                          1⤵
                            PID:1628
                          • C:\Windows\system32\DllHost.exe
                            C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                            1⤵
                              PID:2300
                            • C:\Windows\system32\vssvc.exe
                              C:\Windows\system32\vssvc.exe
                              1⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2576
                            • C:\Windows\system32\taskeng.exe
                              taskeng.exe {C9905746-5505-49D6-8B41-4B921D3E0759} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]
                              1⤵
                                PID:2008
                                • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe
                                  C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of UnmapMainImage
                                  PID:2292
                                • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe
                                  C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of UnmapMainImage
                                  PID:3292
                                • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe
                                  C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of UnmapMainImage
                                  PID:3772
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /d /c taskkill /t /f /im "" > NUL & ping -n 1 127.0.0.1 > NUL & del "" > NUL
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    PID:2616
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /t /f /im ""
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      PID:2464
                                    • C:\Windows\SysWOW64\PING.EXE
                                      ping -n 1 127.0.0.1
                                      4⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:3728
                                • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe
                                  C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of UnmapMainImage
                                  PID:3484
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /d /c taskkill /t /f /im "" > NUL & ping -n 1 127.0.0.1 > NUL & del "" > NUL
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    PID:1256
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /t /f /im ""
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      PID:3792
                                    • C:\Windows\SysWOW64\PING.EXE
                                      ping -n 1 127.0.0.1
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:1632
                              • C:\Windows\SysWOW64\DllHost.exe
                                C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
                                1⤵
                                • Looks for VMWare services registry key.
                                • Maps connected drives based on registry
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:3600
                              • C:\Windows\SysWOW64\DllHost.exe
                                C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
                                1⤵
                                • Looks for VMWare services registry key.
                                • Adds Run key to start application
                                • Maps connected drives based on registry
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:2876
                              • C:\Windows\system32\AUDIODG.EXE
                                C:\Windows\system32\AUDIODG.EXE 0xc0
                                1⤵
                                  PID:628
                                • C:\Windows\system32\conhost.exe
                                  \??\C:\Windows\system32\conhost.exe "18579336744731117219650543981942813216-1998233078-368492015-651191836-1473456413"
                                  1⤵
                                    PID:3700
                                  • C:\Windows\system32\conhost.exe
                                    \??\C:\Windows\system32\conhost.exe "1409157295574511187-1500515187618108376-1913471434584013360-112741654474481855"
                                    1⤵
                                      PID:892

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\!!!!README_FOR_SAVE FILES.txt

                                      Filesize

                                      1KB

                                      MD5

                                      1a03ae66cfa248b0880d9db0326e420d

                                      SHA1

                                      3a4efcefcb55790731b389fdb091d2beb0bb26a3

                                      SHA256

                                      7bf0502aa002b25dd493d786e865bd49c306fdc19990383f08ac089ec5678d2d

                                      SHA512

                                      12a18977db01cfb35dbc587f4c2b6fec0ae42efd9dc3beeb956dce68d149f1c6d60f8df3e9e359195ce017a245b1f7d1c209eb82c885394377a66574bca333b8

                                    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+rihou.html

                                      Filesize

                                      7KB

                                      MD5

                                      e4fcbddb4af9f720d77ebe9c9c36ea57

                                      SHA1

                                      8cc8b88f9ca9e4b7bcaacb0d779ac3e056030823

                                      SHA256

                                      aa4e081d1820976a74f8671dd197e69da65f3a56728d7a3212211656832d261e

                                      SHA512

                                      36d622c08ba523d5161763ce7915e0cac41dcf3c7d1addb797ab9d19f010f08695896cc11ddc3deb6bb64d17dc0131ff63a638b8072a5c0b228a074d9370fa09

                                    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+rihou.png

                                      Filesize

                                      65KB

                                      MD5

                                      a95ffe0f4f0a1f4b3503fc6eb46a9572

                                      SHA1

                                      34edddadf8d5844218f61b449b07f43a33a82a90

                                      SHA256

                                      d53e075921465056945b1cc05a0dea9b07b0e30b538b604ddf94029f06dfd5ac

                                      SHA512

                                      873a5b6076b60045d502464d6e045423f20690ec2e1d4db6fa96ffba055130b6a1d3992b1da5676e5c2a054363d55a59ae99043c4cdb8e40a6877ce66282be79

                                    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+rihou.txt

                                      Filesize

                                      1KB

                                      MD5

                                      a849bbcf40e9aeb5b2490e53b528e4fa

                                      SHA1

                                      65406f37a4a466c2fee46025578c7ede38f14b9b

                                      SHA256

                                      f4770dde64112ac804b8c6772b770ef13d031beb524f4e018ab488592913e2fc

                                      SHA512

                                      5c7a2e1150000b88522b945786e19cfbd4d6633e856217d72c0b6615c14461867d8a678cec721520a35d9a22ac4fc820fb08b25984a8c476d9cbfafa93cc57e6

                                    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+cbvax.html

                                      Filesize

                                      12KB

                                      MD5

                                      4e92920fb52861014c1295124ab2e17d

                                      SHA1

                                      864022a907e4eb7344769a684e8d2058ccf32937

                                      SHA256

                                      bf565185f239a5b709eee71648fcc5cb4c1b9077b613a227dbf3a4d5f21f2b24

                                      SHA512

                                      b2927e0b445f1ef265b26c653a1cb6fad17e10c02fb7b7ad564fab39159c721b258e21d2e05b26f6526baeb227810a3d8445eef06e439405dab7b84570812020

                                    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+cbvax.png

                                      Filesize

                                      64KB

                                      MD5

                                      5eceb425740c53503edb5df38120face

                                      SHA1

                                      8d621b30238713f9d4f74bdd6d4fe3eff3bc665e

                                      SHA256

                                      f1f94c0a5ca1ed086159e1f7744a2a3642ed81dc88672d9b4eed7bc1e069e8d8

                                      SHA512

                                      52b213d3d1b0c382843dc99870344215fef224c69683b4a3f6f3d3ff660f2eb1b452c29c607634e78f63cac475899e47fde2d94e4f54c60cc02bd64c072e7204

                                    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+cbvax.txt

                                      Filesize

                                      1KB

                                      MD5

                                      f6ddc74fa452ab08dec743eb61900fd5

                                      SHA1

                                      c9563cdf930b975000131d1d48d8d2c72c9ecf21

                                      SHA256

                                      11ab5e0ececc032837de7d948b43db7329eabc155f99945c31dcd3fd10c69dcf

                                      SHA512

                                      d5acd52b66ed0fb9f78922dfd5e31843bdb05eff6c8e45a40b10affc0f326a7af83e6b5a5db80bbbb6c7b7795fcd9eb3ca0716370095c907c24ef56075f221d3

                                    • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

                                      Filesize

                                      12KB

                                      MD5

                                      467cf35479f4ccd6d0ab713e5b37378e

                                      SHA1

                                      b5976f5fbb6d13154c51fb1d114bab628fe882ed

                                      SHA256

                                      28be20fe7213cbffd4e99fca59a7b122db375dbb104b6bf97f42646989f13435

                                      SHA512

                                      9826d603d212ca871772ee2ac908bdf9e75d799e12b5cc998f6805ae513797ea5031fd7d3bbecadb6f3c2b0ca24c5e1e65f26d1ec870da04291fa88d4fa0d681

                                    • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

                                      Filesize

                                      10KB

                                      MD5

                                      d462f5955a8fb2a2f414cc4df2c80ccf

                                      SHA1

                                      a1a1da3b6e8bdd15f524d039c6210d8b1ec6ebaa

                                      SHA256

                                      ae6c0ae29bd9cdd353ddbef8b433e3af624442bb10e7b8d1354a50fb7a257a79

                                      SHA512

                                      9f47fbd09f48361e356306a8f498161d7c4085df3d9f3e892e4e0999daa22ccad880e0d2c707617854d3e4da7efc49f8669ca4f2784da4053ac9e832e2dcee95

                                    • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.url

                                      Filesize

                                      85B

                                      MD5

                                      2f9c7712e05616ebde2788fa8a097e00

                                      SHA1

                                      87a4367fd5f32a99c640d8b427f0eda8142ed349

                                      SHA256

                                      f2b08cff11788baf0b70452d3d8e358b066ac390a4457120b325a8fcda016a8d

                                      SHA512

                                      24daf65f6fc1dbfc7e0217f0e2c05afdc217e6d968cb82b8a154e19179aab5d1cb169f2c20ca7b35d7bda8f4019b0e616bb4e304cc25e685da6aa7ff5a531d0c

                                    • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.vbs

                                      Filesize

                                      216B

                                      MD5

                                      48ac29422570636cae371b68c858b988

                                      SHA1

                                      ff86dea198c93a8ae49ee52c6eb919fcbd259aab

                                      SHA256

                                      3926b08f205999c2f1a24121117ecfeed31557bf6f0529416f3432321292c6b0

                                      SHA512

                                      75019e6fd4b53528aab1af668149540e1bc372e58e4786eda1da75e7c9718dbc274cbf3f37cd38fbe7e618ea9c1b24c2534d18aecfcc3264ec55f83f206faaa3

                                    • C:\Program Files (x86)\Internet Explorer\en-US\!!!!README_FOR_SAVE FILES.txt

                                      Filesize

                                      784B

                                      MD5

                                      2fcd4c919128bb1bd7f83fbca422f380

                                      SHA1

                                      7ae4d5cd092816cb998bc45f8b1c23f175cfd275

                                      SHA256

                                      ca6cc13db11ac024e38ceef6975bf0cfcaeebffed320378f53d19de5ff6ee4fb

                                      SHA512

                                      8d04df2211fb5398d260a473cb9e64ce60f2dce993251c248b3f45fd968d74b728fdef224b46d796c713a8122597fb83fd1dc7fc2f1681139ebc0e4b0254457b

                                    • C:\Program Files (x86)\Internet Explorer\en-US\!!!SAVE YOUR FILES.bmp

                                      Filesize

                                      3.5MB

                                      MD5

                                      3cee5765afc0092d779f83dd8ffac47a

                                      SHA1

                                      16b9f49472b71dd7e05d12735407f7b2356f9ef2

                                      SHA256

                                      0a15eeec75479d478d846368e6c6f5ed9cf7a07bd9cd9401845f33a6a7db9b46

                                      SHA512

                                      70006c779626b0f52bf29dc870b46585eec853c24ea2a51e1ccd18f9116d727b6a10740e3d8d1b1eccf463eef0989dfce6b5d335a5968e00611bd9f91c0faa47

                                    • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\TAB_OFF.GIF.sVn

                                      Filesize

                                      617B

                                      MD5

                                      1ce68fc34afcb128b1ede58896de3cb8

                                      SHA1

                                      5268bc35031ab0eefc9d8fb97a66772d863593a1

                                      SHA256

                                      b58d5f8a2945e2b76f672924bae97cda5b241d2c8c7c3bd8f3dc87ee2e2e7913

                                      SHA512

                                      dc6b4cf5900a22e5fade0ee5396f419b1b21934983265fe67423038a62c359e7270b6960502638426d1c3b4d17a9ab30f7523b31a4ceff614bca6e3d46b0be8a

                                    • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\TAB_ON.GIF.sVn

                                      Filesize

                                      489B

                                      MD5

                                      ec963fc0dab111b8876296eab5b74ab7

                                      SHA1

                                      b87a80f96234fd60bfe77bd9ff8b3276c390168d

                                      SHA256

                                      a9271b93dd4b109e6f8e2160f5d88bc86bb623340f1805b17b29029a930b8465

                                      SHA512

                                      812c4d4c1aa35debb9a75da6c6f01197bb01e094bb94ce81cad90b0cf6ab6d1dd9715a8d934878a6e73f1fc51c53acd38d7d7ec307fd11167ab1782105d2da9b

                                    • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\BUTTON.GIF.sVn

                                      Filesize

                                      457B

                                      MD5

                                      0127662b44df0505d6838656c2c0dde5

                                      SHA1

                                      d08d21d98857cca41cf6949bbeb1f902e95c8764

                                      SHA256

                                      2d175c848d81986b63daf4eacaad2d9d88a9eca2563c52610bcd91e8011067a2

                                      SHA512

                                      9f2a5158ea94dfef8b6ce0a21897f3ee21c34c8a147311b974eeb58a1e07cddaf4df70e50dd369a54d76a113edd23d350b214482851abf5ad2d21bfa9b90889a

                                    • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.sVn

                                      Filesize

                                      777B

                                      MD5

                                      722afa805fac458f6b3d7773cd891d51

                                      SHA1

                                      5512b3a3c3e190fdf412aec9d3e9e94aaa29cafb

                                      SHA256

                                      07b8f1b3ab6e693cc4fc95ce0d597893b93672bbc8cceafd00236e6f1866edd5

                                      SHA512

                                      3f33613f55d0031caae450093990a607c4d56e385050e4e2f912b5c945f984f43d0347b4d8d3476ba0546231091de9ef9d78df7d30456fd9103799ba5fac7b4a

                                    • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.sVn

                                      Filesize

                                      1KB

                                      MD5

                                      3efb437b05cf9a4b56b334ece7f0f808

                                      SHA1

                                      3ad6986d39b869d7711ee69261e2a4a7917f1d9a

                                      SHA256

                                      fbe1e237ab4112c2f8865d551631aec06f15d6d6d0e611dbbdd62fdd0d95697a

                                      SHA512

                                      73b1c046378b3bee72305ca40a97cdd27174cf0298f5028cc31d47d846fc7a73598f94178bf4065ff5300204ff617dfeaa5473db5ceda7e4d0a70901b4524eb2

                                    • C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.PL.XML.sVn

                                      Filesize

                                      1KB

                                      MD5

                                      2e396f1b61fbb64031867836c2b1bf28

                                      SHA1

                                      67c6617c384958afded47eb57f75c726a6dc2b0c

                                      SHA256

                                      4a15c8a15157f84f3d7e9752f04b7c14eb83d54046f32ba193c7b65759107431

                                      SHA512

                                      4ff03b962700aef400a2966966fb49d3541cc57a4d92599baa915816968d5e4b6c55014f904a3016af9c30158786e5ef68524571e13cea9327a6a736f945904a

                                    • C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\invalid32x32.gif.sVn

                                      Filesize

                                      425B

                                      MD5

                                      11be87410f108ccd7e29f5676369ff19

                                      SHA1

                                      11c96012840d5eb3d76a6bfc6f30382f9bb7fbf6

                                      SHA256

                                      ef77c274cfaa34c0e990f74f7a6c85776029791e1cea6b35587374e504361373

                                      SHA512

                                      53cf9d965d2db8a9863a34cb2bb5bb6d1fb14af745627eb0554b7895efcee0de192296c2cc9a92a6eac76dce5b9ff7d911e9e6392a182f8f427b1be7dd3f1835

                                    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\epl-v10.html.sVn

                                      Filesize

                                      12KB

                                      MD5

                                      b5156e9413ad22d0ecb0cc87ac5acd4d

                                      SHA1

                                      a9c22db665040c1cd41e8857953526d6f82e715b

                                      SHA256

                                      6940a84c88fb4b59d7790d79a261129a060b3a3b92cb526fc86c3b6a2dae07f2

                                      SHA512

                                      3d3ba24dacf44663265fabb37fc563fc46aa9bcdc5b8081676adcdfd565e8ca57d0487e02b48400b13a84489822c15787d26911063769a95bb6fc1f7dd19dc60

                                    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\license.html.sVn

                                      Filesize

                                      9KB

                                      MD5

                                      67eb2e9ec313b1d91834d822508d99f5

                                      SHA1

                                      8f785a9313ae25564ede0ec6dc77197b85097819

                                      SHA256

                                      95810d8767688c14cd83edd90191af6c9930fd00a327441bbadc7d0bc80dc767

                                      SHA512

                                      888ffc00cc7ca8a08543e62f1d3a97a4149585d561abcef0933158f03033c85af5b914e891bd9be4234c4a5972195eb11c24e47ad6526d8754dcb5e4cda988f0

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

                                      Filesize

                                      914B

                                      MD5

                                      e4a68ac854ac5242460afd72481b2a44

                                      SHA1

                                      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

                                      SHA256

                                      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

                                      SHA512

                                      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DD9752E64417835F0915BD2DA0D091B

                                      Filesize

                                      5B

                                      MD5

                                      5bfa51f3a417b98e7443eca90fc94703

                                      SHA1

                                      8c015d80b8a23f780bdd215dc842b0f5551f63bd

                                      SHA256

                                      bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

                                      SHA512

                                      4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                      Filesize

                                      1KB

                                      MD5

                                      a266bb7dcc38a562631361bbf61dd11b

                                      SHA1

                                      3b1efd3a66ea28b16697394703a72ca340a05bd5

                                      SHA256

                                      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                      SHA512

                                      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

                                      Filesize

                                      252B

                                      MD5

                                      77e9247ccb20b3a2fdccc3dbf3421b5b

                                      SHA1

                                      29d3549f979ecccba0f00780b28c8fe3b952429f

                                      SHA256

                                      d2aabc9db53788c7b490c06277444da94bddb06cb56c8a63444eafe69c0bd183

                                      SHA512

                                      5c209e7377aac11a5376fd2ab6d44e64e59fd1a523b63a8e9de4cb41ebb8c01e43d0366bc612ea99259003bb5520b18e68640c59fca60bfa6c27a3bef91b24ec

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      83a0bf5f754a046419a9e44b69fa0e08

                                      SHA1

                                      23f4c5ff138e49eecc95bd91660ef4d033b6eebf

                                      SHA256

                                      8c42586e43703cac75dfbe725028d392e2481ab75d6e23c32510181aa2116971

                                      SHA512

                                      3d9b8c7d56e897f945b29f74cfadc1e6439b20f5532a0c25e06bcc7dff591534e2bfaf210d96dead69882a80f9ef8fbf29c0479e158a17dfc496da083f234407

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      9edd0c4ed00e58aae7c0658d18974e10

                                      SHA1

                                      f5b25e77a2bfa5f6440d8e7671e01f0546661763

                                      SHA256

                                      b4c84bf30f2ea7fab0cfc48c6e5d3d815b82829f8123c8d5ee33b66b6b332d0b

                                      SHA512

                                      a6482132195adf8bf3298d91897899ed23473af7475b8a0b148113e7a9336903c4443201ef69d692cbe66237f205cf1f1273cbe3965316a505a7f9fec9f70708

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      a5e104dc53a705daf5126ef85d115461

                                      SHA1

                                      4b1aedb94fecc6a2bc282febc8b1a3ccca6aa8bd

                                      SHA256

                                      866834770abaacb518e815c0b6b9dccfa7630207415668e48f4997999969292d

                                      SHA512

                                      5cb4a98a0eddff7bac55eab3efc35c0ee52c2fca4fdd2f6089f188fdc303af611dd29f8deb354567fec041eb67b2a48d6b55caa1dfa1053c1646f4ced149d762

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      412d56dda2cf6e3d71cb92c2f719b330

                                      SHA1

                                      ebf5b169c3cae1552a4b2a6028749c07b19d9dd8

                                      SHA256

                                      cce1482e99c69cd84466569da45cb56c56eaf05ca13fd50988d47deed4bdd789

                                      SHA512

                                      2abfd90cffbb76b689510dd26d03b9ca4ae234f0212f5846ea2afb6c575fd2110701da1896f68d1ff189bdc54e9180fe49c5ba3e29898f1457244f4bc1b2e099

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      6db2f80f68367f33371e7db75ccf9265

                                      SHA1

                                      7aabc483307255327c3425c461c210705a62ecf5

                                      SHA256

                                      4998ff495c2fc8db4971d66fa41de7941cdf41e2dd02bac981d8ccfba103ccb2

                                      SHA512

                                      10a8a6b88b8c8553c58b2b1fb36edc146a947f4314096306c610e013d6a143f96468c55254aee088cc82e27065542708b52e4f27e0a9aad6d4df4e8fbf7708f4

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      6a8af73f3dbca4086462e5ba6605dbf2

                                      SHA1

                                      49b01e1acc8d8cc527bc9a63163b8cf6aca66b7e

                                      SHA256

                                      3c07764999f3136d56d7aa9cf42435914cea4756a37b8c0f599e372155bc9a11

                                      SHA512

                                      47f2279a3ad7827e39aa908dbe9d3dcd2016e622b99e33df7e5b207db2d3babad982707ea3e0b9c65813d60a0c758dfb05677f81ed4bb881f15bdc2a684089cd

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      3149738445574bb1ea3be35e5a0af346

                                      SHA1

                                      e1f513f3223212e2d4c40df0481303d578ea1e29

                                      SHA256

                                      fbc4a9e60dd1917ae8f476a9f2501ebd6a7ffcdb0c2e63101d6f4b8b561a33a2

                                      SHA512

                                      72e8dbfd623b41f789dcae2923424a33016779127b76c32d423ef826ed0d89bea27241ddb48d58761f60dce68e5d4be778e7b7d542918dae6510d1a7b35bf5bd

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      11d7632a33c224d2606cf07464e4ff48

                                      SHA1

                                      7c84558a644174893a09f94449ed5804ec928012

                                      SHA256

                                      c4d8e3bfb6ae804122531ebcc025291e55cd021129bd5454d8321919030f76e5

                                      SHA512

                                      29096810922a819975eae91c69dfa7b0c4a2593d13f2025568db99bfb9a4ca36bd9dbc12357c20a9e5b16acd719ef0036557fd6e5e46284d5f0795e96f1bc07c

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      765ccccafdb7c27670918cbdb963ee92

                                      SHA1

                                      d554c1e7cef3fbb2c742b3ba34d1201ef3ed4f55

                                      SHA256

                                      0a6ad823003426dc7558643fbdbab60b7cf116cdafc49c03ba71b0d5041f073d

                                      SHA512

                                      8c33fdd903eb289dc6a87e280d38558a7803c36012355d1b499bb95a1e948bf7d4b51c90ce5ae639e560f75c5a549bc192ec4d88ecffb43c068c41292790f747

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      1f09d1e4aef79723687c6609fd0328c7

                                      SHA1

                                      ae113560e133b6e49897ff48652ed462c252d73d

                                      SHA256

                                      e9aa39694a9dc96b973adc8ddf52694023e39d30210f6364210d607a177a5036

                                      SHA512

                                      9e580c84299b211c4a204bb0d206e639820407fb43f5415de8aa8633f273231eb082a51633efc29e8ec7aefe9c507071357e94859ac040560e5f9618651d34d0

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      85d58f91d77f41c826e320c796ad18b9

                                      SHA1

                                      b6ba253442bb00ff95eb8bd30e9c217fd517ad6d

                                      SHA256

                                      de40aa1c06be5051cf3ee24a8829e523bec88a2e28c1a684042c2690522fdd8a

                                      SHA512

                                      37730084e6e255400d32a0bb6ec3f2f1360df3257613c1345eabca8a8a9af81a9318ca9112069d99627453bb98b34a64ac6c59d028af23afee422ef1426c7fd1

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      56d3ee11ae2f87bae4da7d91963117eb

                                      SHA1

                                      97c428d38415f3a75cc305c74f123c6047fdaf4e

                                      SHA256

                                      57a4fe8e7d7475a9188972177663b91f95d56b82a4164c7942853a723a0ba648

                                      SHA512

                                      9629d6abf0ec98ccec46e58a18d5dc7aa1d8e17bfdd5d238492303ebdb4f09e69933119040abd419deb220a545b0ff4902abc7553fce84b3cc291b6c2f06cabe

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      1a4592c0538bcd407dfa4b302836b9e2

                                      SHA1

                                      24cded541e6c2e6f244ff23a42f965fd852db968

                                      SHA256

                                      e934bc238bbcecf5064f65c8b3e4bb5423ef0ff88924cb5673caac6b76462ac6

                                      SHA512

                                      69823b1ba7097953d9b949effd61f0f1cf10054a128ff493611031372d33a8f9ee4aed288993b4cfba2399df8f508a5da6bacf06586a321de8c2ef4488771f47

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      2a7800dc728ed86d00ac1e86744fd807

                                      SHA1

                                      2e19dd7f6e51ad73633f42725a08bc03f60862c3

                                      SHA256

                                      e0590279d4353c598e849f3f8634928bfdbcb5409034e396b8bafe126bce9519

                                      SHA512

                                      b06197d5373b9646331c798b7b903ed354a4774e27d13122062d50496d2206cdd3d605d746f0947d281bc0a1f5e45bf3d17a568b01421df1d13fd8b46337d2b3

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      0733c2710b1a56ca335267e04755a938

                                      SHA1

                                      841c400c274a5c18e8be35e90ea0f10f2fe32748

                                      SHA256

                                      3e9b9b006a86187497100e355e503352a396bde6bcf61360abaf54fe7e49beef

                                      SHA512

                                      5fc39009daa8cc0b49d41c8cf42bdd717665d587e2348ac03a279c659543629f0d7ea96c5566edea3ac47adbb4b7572994baa4cc962fe11b676d56ac3fad7b0a

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      0e83104d6bdcd8c33bb6a00f9947b209

                                      SHA1

                                      a721e475b371cef7535dcbc139746da74485a65c

                                      SHA256

                                      5b40cca563a39d1c988b76095ae8619dd1c73567f34138cb8a700e7ab5fe2a7f

                                      SHA512

                                      63dc069b0574000479a37abaee2ed7b6b2c0570bd6193c0be21641b52e2ae5619b954c0fd3086fc6c01a697138220920dfd02a286d1e502e9668b821deebb15c

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      58d8ef7d74ebdf41a3a7b8b86228bafc

                                      SHA1

                                      d9eca5833647dde0a28d994916f04c9e97e1adae

                                      SHA256

                                      7def8e0ebd144b5b571fcea7a5eac84e39b60ee88c3f5edc5f541626334abb82

                                      SHA512

                                      1c58779a58b2ccc25506efd6d5c794af4376209d1a6eecb14d846332578cd2bc7917a007b3398e1f2a1afabdbf7c4069f34dc2bca14e8226737a7c4de4a78506

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      0fd5329e9f8eef428618bb2efb50be41

                                      SHA1

                                      61f9021307cdeb231b1bf6ba9bad77c5acf6026e

                                      SHA256

                                      ac27827519a5699a85956b8ef5e5466925f69543eb9cc1f681a6099ecce2ce75

                                      SHA512

                                      b068991706f3010e4f502ab7aee21ba668e9debf3a92845797b0800015d7fd0c046514682f788cddf72c2aa09731ce260a8c6a81ea3aeee07bdc9df1fa262c27

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      6dcdf49202de902afafd34959976a52e

                                      SHA1

                                      02a923e93134d464e8833fa46a1e8749d96ddac6

                                      SHA256

                                      342ccdfd98d8a7a3ada1e33a8ee97507c8a910d76ee0626f88f094c88e19ccd0

                                      SHA512

                                      cc6e868b95042f19765f14a1b6af26b7d83706a0f52d01a129c7c2a9e6a3d0a09dcbaf7d82ba786cc5e1e999f5d14b7541e1442b867551e52bdc7d27aac4a744

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                      Filesize

                                      242B

                                      MD5

                                      29e71faaa41fa5cf82e84fff4e536feb

                                      SHA1

                                      e3d87d56ebaa606fc10cc1879c75cbcb2ef81ab2

                                      SHA256

                                      bd832c427bf0060253448df4dd97ead75e6d2b89f057299584992dc038303a78

                                      SHA512

                                      02eb175e864fa996519760de631983db09044f9613d5288f80e668ef65c1b73f1e5c6236c396609604b744b14564e88ed1b1f22541ec58b44d2823c6193539b4

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_1024.db

                                      Filesize

                                      24B

                                      MD5

                                      b623140136560adaf3786e262c01676f

                                      SHA1

                                      7143c103e1d52c99eeaa3b11beb9f02d2c50ca3d

                                      SHA256

                                      ee3e1212dbd47e058e30b119a92f853d3962558065fa3065ad5c1d47654c4140

                                      SHA512

                                      68528a7eb0efd59bed8e77edbee80ec654ec3b8f58a82b1c8ce594dcd3aba07af28268aa83f161837f63ff4278068238aa294e0b5649a688db5a483314df6700

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_256.db

                                      Filesize

                                      24B

                                      MD5

                                      40208d46ccb89b1749c419e751697a83

                                      SHA1

                                      31a7984cd78857ea28c0b4d535490ec0b03c5b1a

                                      SHA256

                                      8b02755694ee6cebcb756398c714467e70bef2f3ec300b1f5db0bdf3bf179ded

                                      SHA512

                                      d7643090980ec02668f3bb5ae9f341178220d5e655078c55f7dc19598c6e4d75dc4eb5bc7d16ffa24aa191a31b5ac148843d22a454bdad6756cab7da677e624f

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_32.db

                                      Filesize

                                      24B

                                      MD5

                                      ae08a2f7fbf44ad3cb6cbc529df8b1dd

                                      SHA1

                                      bb2665ee5cd1821d48cca1cb07cdfde9ed6081a6

                                      SHA256

                                      8429d5c6eb134eb64d8b0f3ecce83ab4d4d16e73c2d76993163372692b65ea8f

                                      SHA512

                                      4ba54d565403b82b8c293acc2da5a4c6bbbe5278ea9449720b18901f58a68c3e91c494d763a3de4f3c295bad5685156552c2979453a8765e0b994c28f378f089

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_96.db

                                      Filesize

                                      24B

                                      MD5

                                      3e9c4eaba2c54dfe525197d54dc10532

                                      SHA1

                                      4b71d8970e657835ebceee5ec79faea2c1422fbe

                                      SHA256

                                      05da3daa836dc6ed72144dff35f8d90396b4d524dc35ef8d8cd01d86855be858

                                      SHA512

                                      d6c71d6d749ee3599216208ae7bb0dbb45153cec956c447756c826b06dee139df0903e18400cc73d143164a6e766e29ac7e6f6aed9b2f865b5bcf55caf2f5177

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db

                                      Filesize

                                      3KB

                                      MD5

                                      d19d2dbcf116a4cb9f5fedbcad9c9f33

                                      SHA1

                                      2984d9a292290213a7598863bf9619d0915a7079

                                      SHA256

                                      723ffbee70bccf84084457b6c1374f9b484a6a7282f8b12fcb2805751ab0fe59

                                      SHA512

                                      d70f594d1a94a80c11d166f705e302793b767644e7db9b4b7eb4351c41a863b62d3579caac6a1287bfedcb9cf8287d3d0fa1c5958985c32d1cf0dd533dc26388

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_sr.db

                                      Filesize

                                      24B

                                      MD5

                                      2034995f0bbaa16db835b462eb78152a

                                      SHA1

                                      ce19b1a236f95307067d4979f8dd96c70d69c18a

                                      SHA256

                                      62ce260f5e10fc17bf63faafa39912febf61d20fad51cc11606a295801743799

                                      SHA512

                                      3427f74d944eaaf5a3e1dd22dc566c718be58e4ceb53ba414c72bca974136cac2f1cd8d0a2a0377ce3918c3f83b2480fffbd9088be135fe0fe48c5a499fa6759

                                    • C:\Users\Admin\AppData\Local\Temp\Cab6867.tmp

                                      Filesize

                                      70KB

                                      MD5

                                      49aebf8cbd62d92ac215b2923fb1b9f5

                                      SHA1

                                      1723be06719828dda65ad804298d0431f6aff976

                                      SHA256

                                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                      SHA512

                                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                    • C:\Users\Admin\AppData\Local\Temp\Tar6868.tmp

                                      Filesize

                                      181KB

                                      MD5

                                      4ea6026cf93ec6338144661bf1202cd1

                                      SHA1

                                      a1dec9044f750ad887935a01430bf49322fbdcb7

                                      SHA256

                                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                      SHA512

                                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                    • C:\Users\Admin\AppData\Local\Temp\delph1.bin

                                      Filesize

                                      31KB

                                      MD5

                                      2ec7c43bdcdfbea9369c0187dcdb7776

                                      SHA1

                                      5ae0eb06dbe7f272d111e662694a3232837fcf99

                                      SHA256

                                      a792eceb554d10d76f29071a6e202682a872a20a384b50428ab88cbbbae29103

                                      SHA512

                                      a0c601effb48a3ee1c50ba2d1e478e9f9945f9c63cd68ded922b0876102e73a7dc1582aaeb1f62f3c9f5550d4cd5340e1dbb4322aa3129bb6e70186e933f79cd

                                    • C:\Users\Admin\AppData\Local\Temp\delph1.dat

                                      Filesize

                                      31KB

                                      MD5

                                      04979db956d28f674929fcb76cad8d00

                                      SHA1

                                      ed063500babbb7e0661b0e1eed0de8b3b9f15ba3

                                      SHA256

                                      12587ba985f95d58acd65039709a5820b1608b33866d023370afa9b46daed6e7

                                      SHA512

                                      fb4421e5d5e39e2c8c097d04f9509b17e2db4118ebfe783e2664fc1ea1fcb2dc6236bb3040d7ca6e85b32919645aa1e47bb5585faed16edf8fb208c5f58b59d9

                                    • C:\Users\Admin\AppData\Local\Temp\pd4ta.bin

                                      Filesize

                                      1KB

                                      MD5

                                      c9765b1c82ff2465ec8fd6508b97bc42

                                      SHA1

                                      6d27dba107aad6fee6d33b87c769e491d4e1c680

                                      SHA256

                                      359fb3c511b6c27fd1b888c4bd72f53d80ec367a7a0b8397475930ca6e96a6c5

                                      SHA512

                                      63500af5a86c47124bebe407623537bd67425bb3525e2cd481129b8f08f0a2fa95aff46893423e9820d2ddaad24a56f7e33a819a55820749db635626b14839ac

                                    • C:\Users\Admin\AppData\Local\Temp\pd4ta.dat

                                      Filesize

                                      51B

                                      MD5

                                      317b90694697ae7102ddd3e478697427

                                      SHA1

                                      cab27862e7d96bf5ff730f11aa87e4ee339e2695

                                      SHA256

                                      f0f8aecb3fcf1a8e209fdb0e6b4d3e8b64fcd00c3c74a1e9d3ac8eaa83ce9083

                                      SHA512

                                      e1b2841fd21b96201a0426ae7335b046ee5b2a9976ab1397b0eee0d983281e4cf93bffdca79320d0b1e8fc1d26be1ddbb9d0002021e93e5e9abc7c3ddca00fd7

                                    • C:\Users\Admin\AppData\Roaming\C89CCC1BDC83CD5E3FC5A6BF14BE093F

                                      Filesize

                                      57B

                                      MD5

                                      dcaee34a2c60147f888044df74233596

                                      SHA1

                                      ce1871c507daa5a21e6cc76a523ebff1eb488c8e

                                      SHA256

                                      58f7d9781f4329ffd086ef41567100491f097131850d07227fc52f8090628593

                                      SHA512

                                      7401783e2a434330d988b371d301c6b955ef84828c3701493f175745e984e411d0bbc5de9701071af26c4a87777fa69e81d5a2388a7f36036b638af6d55c4b90

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.sVn

                                      Filesize

                                      48KB

                                      MD5

                                      e1c16e0948bec97dbfe69108d944b355

                                      SHA1

                                      211ebcf6b3804c33936473fbfec8dd0fac074429

                                      SHA256

                                      7356d6ba1e842c9a5037b3de546f7b86777b0e0d6698047aeeb27633e4045121

                                      SHA512

                                      0305dc820c9b79b522c373647b8737770dd786fbe8a9f8f125fa5780d224254bd9ea4e5552752e110f35a1adc80852a1cc01cf653972bd5b2b6da49a14b5b741

                                    • C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe

                                      Filesize

                                      270KB

                                      MD5

                                      d871366edeebd2bb78560ca5709c8737

                                      SHA1

                                      071f3791bb9d93f6626456894c6d99c5ca790e21

                                      SHA256

                                      88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc

                                      SHA512

                                      f4b38977ce4f8cd9443262cada150b2c9e398767fc697636917d8065bfe4045fa101430435d0a08ed7eea17baea96cd20e612c65b308ca130775a520910d727a

                                    • C:\Users\Admin\Desktop\00292\HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe

                                      Filesize

                                      234KB

                                      MD5

                                      c388cea820926cb0cb78ec7ff2ea837e

                                      SHA1

                                      b2f6c5112739dd6c3d4f87ca9d8d94c7db3ed8f0

                                      SHA256

                                      6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e

                                      SHA512

                                      f2276d09aee661346a8e0eeaeeab58ff07d0d1dec529eb91df8954b1296b568bbcbad7f0bcc46f5b0feae8efa13d5ec3f3ba56eae5810477beed24648f01f730

                                    • C:\Users\Admin\Desktop\00292\HEUR-Trojan-Ransom.Win32.Zerber.pef-2debd47f853fd25ad7c286e19266d6e0d711d1d41b47b53978c18557e291251b.exe

                                      Filesize

                                      284KB

                                      MD5

                                      75f0808760bfd840b1bf0c0f346c254f

                                      SHA1

                                      b417a5578d708155429ac741b6a71ae558d60041

                                      SHA256

                                      2debd47f853fd25ad7c286e19266d6e0d711d1d41b47b53978c18557e291251b

                                      SHA512

                                      eafde297aec772a94e0ae833b5de25e6497bef2c508b63d0be822fd68c8d7296ea0fb64e8bb7f6d63e310ea8ecf8e2ee82c6e7baeb26851978b62f3d8c8aa801

                                    • C:\Users\Admin\Desktop\00292\HEUR-Trojan-Ransom.Win32.Zerber.vho-13b17fb9ff6962f04ff6a5fc713c1e0b5b3a3d338f7d22552e45e0482d753eac.exe

                                      Filesize

                                      257KB

                                      MD5

                                      d92f77c319e62e28febd92607bb3d92d

                                      SHA1

                                      a306234bab0d0bcbe798a0fd4d1c829224f1a9ed

                                      SHA256

                                      13b17fb9ff6962f04ff6a5fc713c1e0b5b3a3d338f7d22552e45e0482d753eac

                                      SHA512

                                      6135a66b4beee0596d2b6512a82b830d8bdcd7dd1d64d701c9193f15a0d0b1c7e8384e192b7e994b717437bc7162f26942861826b93397afb1186d15050f18d0

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe

                                      Filesize

                                      280KB

                                      MD5

                                      02cd7d4617673631f46e9763f62cd462

                                      SHA1

                                      0774d7a2116f4b2a0974500849af6697e1d9f142

                                      SHA256

                                      1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b

                                      SHA512

                                      aa3f9fb2c2a951d8a0ea07f986ae6249563d15f7c6abc2f0e1b57f104d3dd9ec0fc9b07349004e6baab7404c518dce7305dccd0ab191547554749933ca791fea

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe

                                      Filesize

                                      546KB

                                      MD5

                                      3fae0c593de7d8a407e8ffcaafdd52d9

                                      SHA1

                                      78820cd3a877d15f96a2eb8485b78c4bf9f989b2

                                      SHA256

                                      c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3

                                      SHA512

                                      f315332167c8dd2da9da4fca6202ee7d9d83de0ef817332b175a3dbac137c23389cf0af1a2e0ce4c8067ddfdd4d5fe426f0a23a438c7952cfc406d7110d89052

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exe

                                      Filesize

                                      376KB

                                      MD5

                                      8a6bd20006a7b2e38001d82cfe3b0e24

                                      SHA1

                                      1f96ac722a2479efb8a38bdc99ac0e4d6cde740d

                                      SHA256

                                      e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e

                                      SHA512

                                      71787641272428dea13c225d37220f26123376d1e4fa193da6adec9c7fc92a7bdee9c61b6546f4d3c0aaec4e0ad0bd92f38a7e3ee40901b54cde7df7ecc7cdd6

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exe

                                      Filesize

                                      372KB

                                      MD5

                                      226368e6a217253de966c97d7657adf3

                                      SHA1

                                      03524721575ae7bbf58cf93849835e38a9ba3c3b

                                      SHA256

                                      1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47

                                      SHA512

                                      24d65267eb08d234b5df94c3fcc0701f3fecfb945f675279113c22e6e32f538d5006bd5f87020aa6992e8b2bfc679f3a744b0e6d0c206cc0ad5011c5888a0913

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exe

                                      Filesize

                                      425KB

                                      MD5

                                      09fbbf57249db6d997eec58ca1c81bb1

                                      SHA1

                                      ba0a980f079d84a6314c060995844455832f16d0

                                      SHA256

                                      f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c

                                      SHA512

                                      81b5afdb2ab680f67f5f1718984d1f10ee21e1194ade2175af1a8b0f4d8c601b5c6d278efbcd19f140a2613335d46b3475b987875b16a47e4730c1f42c8452c9

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe

                                      Filesize

                                      1.7MB

                                      MD5

                                      37bf7e84a2581440e51c23a0c16eed6d

                                      SHA1

                                      7d624a0f5303d4ab2ef2b70707dc31e2dda21ec3

                                      SHA256

                                      02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6

                                      SHA512

                                      ac8e3e9166fefd667321f951c84e28b4bb04eab02daa51244289e3d4e69fd7390bad5189aad376b1915fe450802ed4026e72d0918e9cab5f6ed0275f94cc2e6c

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe

                                      Filesize

                                      390KB

                                      MD5

                                      b3e7fe7896dcef7b810d33870fa5a98d

                                      SHA1

                                      c544c88de43d1bdc1c84b9388c17a001b26aa9b7

                                      SHA256

                                      e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f

                                      SHA512

                                      d7bad6d534731670255d471251c0ea81d1c0103ad7fa8ccbec2bd4d62ca61b047acb2a05935801a2263e1b4c64e4b901414c0c7afa54f9e6b4703137c85980c9

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe

                                      Filesize

                                      82KB

                                      MD5

                                      d349764bd5e16ee0e202b1e9dc057318

                                      SHA1

                                      2c6861b942341e193b633cf01755ad6660e117e0

                                      SHA256

                                      dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d

                                      SHA512

                                      d1c46c00f51f537680dceec8b7fe596f5a5633065cabe06e5204d5c8632288bdc2fa62536105925f01125805c77a44d46730834eab3f7a080cff31e6eafbce27

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe

                                      Filesize

                                      253KB

                                      MD5

                                      6c33700b12efaae1d87191068e2d9936

                                      SHA1

                                      0555391ac7dc88601d8642150a752db042d21b24

                                      SHA256

                                      2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7

                                      SHA512

                                      381e493a5cde885d90e9c97488c0ff7a2a3cd564a0217643a0ee3e01ea397aadc8d6bdf49e81f2197ea3b7b7cdf24df0551e94a8a131b2c999c18d55039b36cc

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.bil-90f1e63fb40eebaca98ae542ad1a3cf59d6a2e13fd192173c401ec686869001e.exe

                                      Filesize

                                      244KB

                                      MD5

                                      b55da351f741d4a1b4ca78ea7e24bd28

                                      SHA1

                                      59a47ac1e30432b1acee820ad7e7236e9f3bab0a

                                      SHA256

                                      90f1e63fb40eebaca98ae542ad1a3cf59d6a2e13fd192173c401ec686869001e

                                      SHA512

                                      604039d1a01cf6eb3e24d2f7362dd4bcc91a662dc548be8a1c310d1a741f40bad9ed08a7ad0b43fdc1260a5617c4fcb8a492cc8d7db2113bd2ec23034655feb5

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe

                                      Filesize

                                      221KB

                                      MD5

                                      8da4cdc3e2ee16021f237ea7a043da8e

                                      SHA1

                                      1106b06137a826e0987836e1f9e251006cb9a4a0

                                      SHA256

                                      4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e

                                      SHA512

                                      76a9efce55fed3e524e2cf4d7971eaac50cdfdff014f688d1a3c74f4f25e8b527ea2d9ae5460d52fb98a1ac26340ac9b498c3c57c42f65f4b1afd9f5bcdf2f12

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe

                                      Filesize

                                      133KB

                                      MD5

                                      f307579cb7b724a796ea7e7507e632d2

                                      SHA1

                                      e2ce8d0d21d79a366c0f4ac7620ee39e8a8ae0c1

                                      SHA256

                                      70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa

                                      SHA512

                                      19e3bc0aa77e098ca482da05f8193e3f2e60eda13ac44401e537c8d4e7ed53b8aef437ee8e75ed172660ca58713a6ce2e462834c423ecef09a0050daa2339c63

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe

                                      Filesize

                                      186KB

                                      MD5

                                      e9f18559b915158f3fe449b1ed8a6f98

                                      SHA1

                                      c8ed7e75f8cce9d6ff6f2f871f74634b2e713072

                                      SHA256

                                      0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36

                                      SHA512

                                      025e0f1d4c83cb29b53463cb2b04a626d18f8b6cea895de2590ac3b630fdd9e3db11350e6e4dbd7282b29e271a3bafc7dead0692e1640f00bbbe8fde7c16917a

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.eaok-ed7b8675080db9821dcb531824e70c7ec4fbec965810a04fa2b3511c3c1726fb.exe

                                      Filesize

                                      540KB

                                      MD5

                                      17acfc6e57ec12dd1df509ab10ec29da

                                      SHA1

                                      ca8c4bfd81b7c72510c924fd95f530e280bb25b9

                                      SHA256

                                      ed7b8675080db9821dcb531824e70c7ec4fbec965810a04fa2b3511c3c1726fb

                                      SHA512

                                      3f9ffb2e9a619827a2bce24f495ac7912428fe39301d56b1ba8814745aac774a7bb2f486e3ea793dc79268b62b5115902d6d4e985d07482fe77b80fdf949c5fa

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.eeet-de3e697abf272172c5ebcbaeb500c6944d307693f3755250c0bb953a36961a0f.exe

                                      Filesize

                                      256KB

                                      MD5

                                      ad6bb84b14fb496b49ccb4769fd81684

                                      SHA1

                                      c436af870d16c244ada7061aeda99414b0d5b4a4

                                      SHA256

                                      de3e697abf272172c5ebcbaeb500c6944d307693f3755250c0bb953a36961a0f

                                      SHA512

                                      e0696c6819d469391ddbe5e38d651a35ef190df282057b1b60d8e9b0d6c4966cee97de1ad60db4df5fcfcd9a4a1cca7781fceddcde4532479715f05da534537d

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.eeki-468f076437db73e8b6e07784029e76067a408b262913a9b3258756dbbc2125f2.exe

                                      Filesize

                                      306KB

                                      MD5

                                      953564a8047a2002ff53244ef68f286d

                                      SHA1

                                      599f6d40e5acaebea02ea53a04d85a13a7ddf940

                                      SHA256

                                      468f076437db73e8b6e07784029e76067a408b262913a9b3258756dbbc2125f2

                                      SHA512

                                      bf1fc622b95014e05c6fe630874d7f937dde07281147b57c307dd820a782a2fdfa42f63e97834cd94d0406b11257d79f233b58e84df0a1a684c884b0156a9f2f

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.erie-6cfd956f242e0a146747752474690ca1c94a9b8992648e19bb53f383a80aa232.exe

                                      Filesize

                                      342KB

                                      MD5

                                      94a3bccf14fa5a602c61f80ec6b47963

                                      SHA1

                                      4b6f442c1c9b453dac1668fecaacdb992664cffa

                                      SHA256

                                      6cfd956f242e0a146747752474690ca1c94a9b8992648e19bb53f383a80aa232

                                      SHA512

                                      08f1ddf05771a01828e5140c5e0daf9189559a38f26671a147024a629790755f38ab8180810e632d101db846131dee294f875db3568ec496f9e65bc5856b74bb

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.fpkd-655b716315904da7ff7851ec2bc5a46da4fef21ff331c114fd6bba4d36d8806e.exe

                                      Filesize

                                      496KB

                                      MD5

                                      b58c0e7522fe5b27c067c406b563b8b4

                                      SHA1

                                      c3baa0c077300e3073d6f5ca34706ee2b88ed7d2

                                      SHA256

                                      655b716315904da7ff7851ec2bc5a46da4fef21ff331c114fd6bba4d36d8806e

                                      SHA512

                                      27ae489a202da4d4a60f438ae8f0bfb7b6d94fe2b7968b0e15a20e9795fef623a86a50fee18f7e777b0a92b739b1e70dd61635d8780fcc49a481c04207f581a4

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe

                                      Filesize

                                      284KB

                                      MD5

                                      43e23845e7a4646bf6cbb592ddbb43dc

                                      SHA1

                                      d16528be86a8e82955d21db32ddc665333282cac

                                      SHA256

                                      fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46

                                      SHA512

                                      4f28e46b483f713c4396bc48afbfd6d209efd7d7b933ba6aecfcfa73e549e1d17448ecac3f6540d3df8495af1751f6deceb89eb8f38f9d4a4a5c0114ade3b9ee

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exe

                                      Filesize

                                      287KB

                                      MD5

                                      b407825b6f7cf039a583e633e21c3849

                                      SHA1

                                      260ea2c5a3ff1e93e42fd95806b5b0bc378ec2e4

                                      SHA256

                                      81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef

                                      SHA512

                                      60ef4efe9072fdebfbb4e46fca688902c1284e6e3c6b3d39d29029710bceb3ffe6123bc20b1f8d11cb7c9aa6877a96f8ea9c228d9888f1fc4caf3b40b9d0df75

                                    • C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe

                                      Filesize

                                      261KB

                                      MD5

                                      e552907368298cc71a4213911821066f

                                      SHA1

                                      f62e8c07f230fd4f4ae58618946d42ff319bbba3

                                      SHA256

                                      a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9

                                      SHA512

                                      7b998084669175e76a993e79ac29f529db6de379548c82415ecc4c580e3b69dd7eb0a093c3602b612fbb4c705abf2f0fcdef32ce4f2285c070adba33e1298cc7

                                    • C:\Windows\Logs\DPX\setuperr.log.sVn

                                      Filesize

                                      281B

                                      MD5

                                      f8092c6669cc326349bb22cdac55509b

                                      SHA1

                                      6f5638d888789c69b9450c5d1decdd9b3a12ba08

                                      SHA256

                                      4eeb557ebaab62f1e3d2c59c0e0113a676bfbdac627d48fc3118d8acfe7088e5

                                      SHA512

                                      0babf301991e90b0aa7a9022f0bf3c12f66b13c552a1f820c49b2fbc0b1f87bcbe88bf44200a9d7ba930114d9f97873df9b1c2e39ca347e1427e61b7f7af7bd6

                                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ieexec.exe.config.sVn

                                      Filesize

                                      457B

                                      MD5

                                      d16cde742042e6dd1afd34b6dfe95739

                                      SHA1

                                      a5bcf4e8f51d0c050009cfc0fc1f92500f8b6083

                                      SHA256

                                      ad8cec1b8c6753e0b9eeb2d49b98875f9a2c82de68a3f725952486fde1ab6c94

                                      SHA512

                                      e968f326bb6b4c2afd601dac335a890f25fd3071fd91dbf437ab4422c5a89b56a20877cc7e2e53c30c3a4771accaac90ea0b5a2bcbb74a3bd7e138f23e2c77c0

                                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe.config.sVn

                                      Filesize

                                      489B

                                      MD5

                                      e085b872d49eddaaec12b8ea38ca7ee0

                                      SHA1

                                      c82a46eb5c3f71196c8f4c1f5e097843177568a7

                                      SHA256

                                      ffdc77b1cafe493cfdf862947bfb3bc0f67c122ca76145bdefa52d0657204a9c

                                      SHA512

                                      657bcff07d86eb97a81f64c1d513936f51f8de8cb8ed7220c23d0ba9f083b812d20816d057abef7f27605b7ecc9f0b54fb24092dafaf3a1296c17f2555d660a1

                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\selectedTab_leftCorner.gif.sVn

                                      Filesize

                                      345B

                                      MD5

                                      45514df2672acf4549e41d68f923b501

                                      SHA1

                                      24dd719b833bb21b0c95a299f675a417c1f2e473

                                      SHA256

                                      8641274fbf37940a30373d13e8ceb843a08aca1895829cc9e2cd8a567cf882a1

                                      SHA512

                                      52d13f0f60707d73855c2334ab8f4fe02f7605e537bf06f6fa6e9d27d1a91d87db38bacd104f026c450ced8eb181c330f23770ce8b4bc404c7bf4d3888ecaa99

                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\selectedTab_rightCorner.gif.sVn

                                      Filesize

                                      345B

                                      MD5

                                      805cf7befebe682fb728a572d55709f3

                                      SHA1

                                      f2c4ad8f2b921bd18272a431ac2f9671ba94a0fc

                                      SHA256

                                      f96c2db0edb1cf664abe67b9a1c041f7336de23599e1979e7585800a9831bbda

                                      SHA512

                                      ff28161c248cc04a99dc4db3f6870dec26d7a8351762096b6f91a504abdb26dab89012b9e14355dc54008e8920d634c3aeea2a25d4865b960dc55508819b9c4e

                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe.config.sVn

                                      Filesize

                                      441B

                                      MD5

                                      fa63021f234a4dec32fb1b50a87dee63

                                      SHA1

                                      82e6f67a2ec3faefac87d0b02cfcabb3db59ea7a

                                      SHA256

                                      c1cee376ded86f64f35aeed9345fe8666ccdc0cbbbda675a433e9e54c0466514

                                      SHA512

                                      c95795ede3bb41c11d747a693d9fb66672c726b07cf6f1b752525ee3f787e5fca1e7225099eeac66217ebaeaa6c39ce914850eedf7db567b2a3bd4cb456384f2

                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe.config.sVn

                                      Filesize

                                      553B

                                      MD5

                                      de186202cbe3e6becc2466761c668dee

                                      SHA1

                                      55d31eb68c846319380135fec5d8244ca270f03c

                                      SHA256

                                      29b9e3923924d32e89dd09f41182fc00d4679023afcd13f464a9f355cfdd7b81

                                      SHA512

                                      a848bd87bdae4d5e0369f42046d74119e877bfb32bc691fbfb438f6c024226af6fc837aa74188f6eff75f2c520d7f974e9a1030212df12d5aae71b25cf6d8bb6

                                    • C:\Windows\Microsoft.NET\Framework\v3.5\SQL\ja\DropSqlPersistenceProviderLogic.sql.sVn

                                      Filesize

                                      2KB

                                      MD5

                                      7b46528b61e3efda1385d447723acc64

                                      SHA1

                                      34a0c22e1fecdd75144cc57271c05ce9bc468ded

                                      SHA256

                                      f891a5af25e43737a6ab06ea9e23f501789cb7f58a81623ac88b6f019ba46570

                                      SHA512

                                      4959f374771e0bb24a5372c50581100312385dd5f9871cc678c8d791b278ddda54cc0763497405ed628db0e049a72d0a97ea6323d3d5fd83c955a94fc3c1337d

                                    • C:\Windows\Microsoft.NET\Framework\v3.5\SQL\ja\SqlPersistenceProviderLogic.sql.sVn

                                      Filesize

                                      13KB

                                      MD5

                                      820f2d05d32b5cb6b3079338632ee6ed

                                      SHA1

                                      a5b418b0765c03e16fded1c99753f424dd1594a3

                                      SHA256

                                      2751acd7e987943ae34f5d582857f503a4cc0d88dcf9a967a7fba83ed22f592b

                                      SHA512

                                      c9d5b51d1dc8eda41e2e270d679cd7d077c30b70654d10b9484a88b679753f62d3f5d1eb1bc4b7c0c7b58ee1edc702c3c5a52647fcbebba27c0de222212c7249

                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Images\selectedTab_1x1.gif.sVn

                                      Filesize

                                      329B

                                      MD5

                                      9759cd6ec262159b22e6e1e21c151cb1

                                      SHA1

                                      692ef3630a9d01e3086ac8561b95ebbc7b4752e7

                                      SHA256

                                      2aee3303c339dbcc9aa1b5b1709632e1366efb8aea76008cba214cd2cae8dce9

                                      SHA512

                                      f467e3f9f612df364f987c69c3f9313c589bdddde16bc377157fc8b8e0b27bfd85c1dc8745570c735406be844cd43cc81adefce88f240c617f830cf024b16592

                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\DataSvcUtil.exe.config.sVn

                                      Filesize

                                      425B

                                      MD5

                                      1377bff14eb8e4a1c23d40cb184a8108

                                      SHA1

                                      fc95f59ea27c1b3bb0a138c1cc371dcc5aa25b39

                                      SHA256

                                      55119a64af8ace7a4250cfd9d980ee330c4ba663e69c6fa9e91154108935507f

                                      SHA512

                                      9873d589161d4702fb418a500d7d264950debe99dfee509e5936ea2f3db3028443e642b1fd84e8c6469b93811476d8240ef23a4b239b2a0f8353197e7d581dae

                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe.config.sVn

                                      Filesize

                                      457B

                                      MD5

                                      95c9894ff2e9fe46fae08de70fe45f30

                                      SHA1

                                      7fd59c1f3a1d292cf006a87942269f4e2a03db9d

                                      SHA256

                                      c10ee36e7d2096841ff0d08c6ee32401ce4b182b94390caadd688cf38b35e6fa

                                      SHA512

                                      af4641116428bf750a3c7b8bfe15ffd55d473f333ce79f62936e3e1f07bd620638d54e0f561dc0fc74c5b4f4d01037e3f682257d2eb57c6542f32760bb7767c1

                                    • C:\Windows\SysWOW64\en-US\!!!SAVE YOUR FILES.bmp.sVn

                                      Filesize

                                      3.5MB

                                      MD5

                                      c0853654ecfb702ba39496a93a05d48d

                                      SHA1

                                      3d0ff9b37a0874908b679da6e1686a6b8f0ab8e4

                                      SHA256

                                      1180ed1d20b5150e051965470e7ed1c0625231587980da9b758ec0102038e9e7

                                      SHA512

                                      fbb3fa6419ba19b39937494bf72327680d79e50a649161c96da4cdc032f4b62941d330fc07aa814047827526f6f244c6f523ab5532efa63c63971f749bbd94cd

                                    • C:\Windows\SysWOW64\es-ES\!!!!README_FOR_SAVE FILES.txt.sVn

                                      Filesize

                                      1KB

                                      MD5

                                      71a69fc2cd671e929c63eb7548b75523

                                      SHA1

                                      d3cd0ca7759f1d08f8a86c2f02f4254810d9d99c

                                      SHA256

                                      a92b2dcf7644b08b4f418e4150a8ceb635aefebc84e9073c015a864369673f88

                                      SHA512

                                      01c95cfedb5244115e35e60a7c32b59d0ebb3b1d9b9b7544104748bab98916f06e0ae10900984250e7439da3f1e7545d91a7e323a4f9784b8b713e98ee13bbf3

                                    • C:\Windows\inf\PERFLIB\0409\perfd.dat.sVn

                                      Filesize

                                      31KB

                                      MD5

                                      f51df0fb81edd044237e15cb8cf9f737

                                      SHA1

                                      d1afed748fb0921d547558f97b1b23e11490c96e

                                      SHA256

                                      c67226eda3b2f4229e2bcb61de9eb9e704c721340fcdc15acef5e86ca1dfbd2b

                                      SHA512

                                      543291c0a71e73f5434b0940f74421dd8a1deabe92c19f6ff6c53e4ef60ab936f4a4410539fd77841dc50357351fabdb0b4b5319a71eebd4ec9b40a55f2f403a

                                    • C:\_R_E_A_D___T_H_I_S___838UWZY_.txt

                                      Filesize

                                      1KB

                                      MD5

                                      fd6c1a9cac8803621d9f4b47474be096

                                      SHA1

                                      68ab12660f4de370c4979fdac8470dbb82e06627

                                      SHA256

                                      79c336a9548b239e7588e3a37dd8e0d743c96ba77b531d06a8727bbb91060483

                                      SHA512

                                      44e9ce17fcc95d813de03ca3f10e5cb3b9eb9c87d10d9f434d8fee9d04c4ca10e16cc54ac7677edc1d1bcb4635975f9d6d24dc59eca6ae1b7c7c7a97774c5b4f

                                    • \Users\Admin\AppData\Local\Temp\nsdD5D7.tmp\System.dll

                                      Filesize

                                      11KB

                                      MD5

                                      3e6bf00b3ac976122f982ae2aadb1c51

                                      SHA1

                                      caab188f7fdc84d3fdcb2922edeeb5ed576bd31d

                                      SHA256

                                      4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe

                                      SHA512

                                      1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706

                                    • \Users\Admin\AppData\Local\Temp\nsyD51C.tmp\System.dll

                                      Filesize

                                      11KB

                                      MD5

                                      ca332bb753b0775d5e806e236ddcec55

                                      SHA1

                                      f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f

                                      SHA256

                                      df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d

                                      SHA512

                                      2de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00

                                    • memory/236-99-0x0000000000400000-0x000000000049A000-memory.dmp

                                      Filesize

                                      616KB

                                    • memory/396-97-0x0000000000400000-0x0000000000418000-memory.dmp

                                      Filesize

                                      96KB

                                    • memory/408-1409-0x0000000000920000-0x0000000000A5E000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/708-254-0x00000000001C0000-0x00000000001E7000-memory.dmp

                                      Filesize

                                      156KB

                                    • memory/708-255-0x00000000001C0000-0x00000000001E7000-memory.dmp

                                      Filesize

                                      156KB

                                    • memory/708-252-0x00000000001C0000-0x00000000001E7000-memory.dmp

                                      Filesize

                                      156KB

                                    • memory/712-227-0x0000000000400000-0x0000000000492000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/712-228-0x0000000000400000-0x0000000000492000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/712-226-0x0000000000400000-0x0000000000492000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/996-50-0x0000000140000000-0x00000001405E8000-memory.dmp

                                      Filesize

                                      5.9MB

                                    • memory/996-51-0x0000000140000000-0x00000001405E8000-memory.dmp

                                      Filesize

                                      5.9MB

                                    • memory/996-52-0x0000000140000000-0x00000001405E8000-memory.dmp

                                      Filesize

                                      5.9MB

                                    • memory/1408-17590-0x00000000010B0000-0x0000000001128000-memory.dmp

                                      Filesize

                                      480KB

                                    • memory/1408-9155-0x00000000010B0000-0x0000000001128000-memory.dmp

                                      Filesize

                                      480KB

                                    • memory/1432-4017-0x00000000010B0000-0x0000000001128000-memory.dmp

                                      Filesize

                                      480KB

                                    • memory/1432-9154-0x00000000010B0000-0x0000000001128000-memory.dmp

                                      Filesize

                                      480KB

                                    • memory/1544-294-0x0000000003EB0000-0x0000000003FEE000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1544-296-0x00000000011F0000-0x000000000132E000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1544-277-0x00000000011F0000-0x000000000132E000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1544-278-0x00000000011F0000-0x000000000132E000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1580-290-0x0000000000400000-0x000000000042B000-memory.dmp

                                      Filesize

                                      172KB

                                    • memory/1588-111-0x0000000000400000-0x000000000041C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/1612-258-0x0000000000400000-0x000000000041B000-memory.dmp

                                      Filesize

                                      108KB

                                    • memory/1612-262-0x0000000000400000-0x000000000041B000-memory.dmp

                                      Filesize

                                      108KB

                                    • memory/1612-270-0x0000000000400000-0x000000000041B000-memory.dmp

                                      Filesize

                                      108KB

                                    • memory/1612-268-0x0000000000400000-0x000000000041B000-memory.dmp

                                      Filesize

                                      108KB

                                    • memory/1612-267-0x0000000000400000-0x000000000041B000-memory.dmp

                                      Filesize

                                      108KB

                                    • memory/1612-256-0x0000000000400000-0x000000000041B000-memory.dmp

                                      Filesize

                                      108KB

                                    • memory/1612-264-0x0000000000400000-0x000000000041B000-memory.dmp

                                      Filesize

                                      108KB

                                    • memory/1612-260-0x0000000000400000-0x000000000041B000-memory.dmp

                                      Filesize

                                      108KB

                                    • memory/1692-185-0x0000000000400000-0x000000000042B000-memory.dmp

                                      Filesize

                                      172KB

                                    • memory/1724-183-0x0000000000CB0000-0x0000000000CEF000-memory.dmp

                                      Filesize

                                      252KB

                                    • memory/1772-217-0x0000000000400000-0x0000000000492000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/1772-218-0x0000000000400000-0x0000000000492000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/1772-216-0x0000000000400000-0x0000000000492000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/1840-273-0x0000000000400000-0x0000000000417000-memory.dmp

                                      Filesize

                                      92KB

                                    • memory/1840-102-0x0000000000400000-0x0000000000417000-memory.dmp

                                      Filesize

                                      92KB

                                    • memory/1840-6690-0x0000000000400000-0x0000000000417000-memory.dmp

                                      Filesize

                                      92KB

                                    • memory/1840-221-0x0000000000400000-0x0000000000417000-memory.dmp

                                      Filesize

                                      92KB

                                    • memory/1856-106-0x00000000010B0000-0x0000000001128000-memory.dmp

                                      Filesize

                                      480KB

                                    • memory/1856-4016-0x00000000010B0000-0x0000000001128000-memory.dmp

                                      Filesize

                                      480KB

                                    • memory/1924-101-0x0000000000400000-0x0000000000495000-memory.dmp

                                      Filesize

                                      596KB

                                    • memory/1968-76-0x0000000000400000-0x0000000000447000-memory.dmp

                                      Filesize

                                      284KB

                                    • memory/1968-235-0x0000000000400000-0x0000000000447000-memory.dmp

                                      Filesize

                                      284KB

                                    • memory/1968-232-0x0000000000400000-0x0000000000447000-memory.dmp

                                      Filesize

                                      284KB

                                    • memory/1968-233-0x0000000000400000-0x0000000000447000-memory.dmp

                                      Filesize

                                      284KB

                                    • memory/2020-82-0x00000000011F0000-0x000000000132E000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2020-298-0x00000000011F0000-0x000000000132E000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2020-230-0x00000000011F0000-0x000000000132E000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2212-1322-0x0000000000920000-0x0000000000A5E000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2352-219-0x0000000000400000-0x000000000042B000-memory.dmp

                                      Filesize

                                      172KB

                                    • memory/2352-113-0x0000000000400000-0x000000000042B000-memory.dmp

                                      Filesize

                                      172KB

                                    • memory/2472-238-0x0000000000400000-0x0000000000431000-memory.dmp

                                      Filesize

                                      196KB

                                    • memory/2472-288-0x0000000000400000-0x0000000000431000-memory.dmp

                                      Filesize

                                      196KB

                                    • memory/2472-236-0x0000000000400000-0x0000000000431000-memory.dmp

                                      Filesize

                                      196KB

                                    • memory/2536-241-0x0000000000400000-0x000000000047E000-memory.dmp

                                      Filesize

                                      504KB

                                    • memory/2536-247-0x0000000000400000-0x000000000047E000-memory.dmp

                                      Filesize

                                      504KB

                                    • memory/2536-245-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2536-248-0x0000000000400000-0x000000000047E000-memory.dmp

                                      Filesize

                                      504KB

                                    • memory/2536-239-0x0000000000400000-0x000000000047E000-memory.dmp

                                      Filesize

                                      504KB

                                    • memory/2740-211-0x0000000000BE0000-0x0000000000C13000-memory.dmp

                                      Filesize

                                      204KB

                                    • memory/2740-275-0x0000000000BE0000-0x0000000000C13000-memory.dmp

                                      Filesize

                                      204KB

                                    • memory/2764-249-0x0000000000400000-0x000000000044C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/2764-274-0x0000000000400000-0x000000000044C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/2976-56-0x0000000000400000-0x000000000043D000-memory.dmp

                                      Filesize

                                      244KB

                                    • memory/2976-2814-0x00000000039E0000-0x00000000039F0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/2976-215-0x0000000000400000-0x000000000043D000-memory.dmp

                                      Filesize

                                      244KB

                                    • memory/2976-214-0x0000000000400000-0x000000000043D000-memory.dmp

                                      Filesize

                                      244KB

                                    • memory/2976-271-0x0000000000400000-0x000000000043D000-memory.dmp

                                      Filesize

                                      244KB

                                    • memory/2976-2841-0x0000000000400000-0x000000000043D000-memory.dmp

                                      Filesize

                                      244KB

                                    • memory/3188-18847-0x00000000010B0000-0x0000000001128000-memory.dmp

                                      Filesize

                                      480KB

                                    • memory/3188-19113-0x00000000010B0000-0x0000000001128000-memory.dmp

                                      Filesize

                                      480KB

                                    • memory/3188-17586-0x00000000010B0000-0x0000000001128000-memory.dmp

                                      Filesize

                                      480KB