Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 19:30

General

  • Target

    Snake.exe

  • Size

    3.7MB

  • MD5

    d659325ea3491708820a2beffe9362b8

  • SHA1

    6e7f725401c33332beb2383a6802a7e4b2db30a9

  • SHA256

    09133f97793186542546f439e518554a5bb17117689c83bc3978cc532ae2f138

  • SHA512

    958f4a72530703131be2f25dc906ab7fc8ee174e9cbd13f9c976af7e986593b56a768e0413e6a85d06f2bdc057ac7d9617f6c25cbf8f13cc2f8348bcf441eeb5

  • SSDEEP

    24576:9ypcVmmyK+Y8J0r1dpvZlGhiUTPQOMoezwFnKS1yb0zrs7HjeAzgeJENrud9qcju:ecV8Ytr1dhrwierOjeAzAruTqQt02+

Malware Config

Extracted

Path

C:\USERS\PUBLIC\DESKTOP\DECRYPT-YOUR-FILES.TXT

Ransom Note
-------------------------------------------- | What happened to your files? -------------------------------------------- We breached your corporate network and encrypted the data on your computers. The encrypted data includes documents, databases, photos and more - all were encrypted using a military grade encryption algorithms (AES-256 and RSA-2048). You cannot access those files right now. But dont worry! You can still get those files back and be up and running again in no time. --------------------------------------------- | How to contact us to get your files back? --------------------------------------------- The only way to restore your files is by purchasing a decryption tool loaded with a private key we created specifically for your network. Once run on an effected computer, the tool will decrypt all encrypted files - and you can resume day-to-day operations, preferably with better cyber security in mind. If you are interested in purchasing the decryption tool contact us at [email protected] ------------------------------------------------------- | How can you be certain we have the decryption tool? ------------------------------------------------------- In your mail to us attach up to 3 non critical files (up to 3MB, no databases or spreadsheets). We will send them back to you decrypted. ------------------------------------------------------- | What happens if you dont contact us within 48 hours or refuse payment? ------------------------------------------------------- We publish sensitve databases and documents we collected from your network. -------------------------------------------------------

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of FindShellTrayWindow 62 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Snake.exe
    "C:\Users\Admin\AppData\Local\Temp\Snake.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3204
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3020
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
    1⤵
    • Drops desktop.ini file(s)
    • Checks processor information in registry
    PID:3276
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4692
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2076
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
    1⤵
    • Checks processor information in registry
    • Modifies registry class
    PID:5808
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1132
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4636
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\Custom.propdesc

    Filesize

    1KB

    MD5

    45d89af1a2105d47b3a0bda7d06a8ab3

    SHA1

    6086efcd70aed3377d5484a29b67fafbdf19d96b

    SHA256

    de40befa3d9e84b15f0a6d053fff0428adacdee1d16bf91391025dd3011c1e5b

    SHA512

    0988ed07ab57b9ffb81ec72caeb6fdb759a1cc5ec6aa770fdccbcc29e443d9c18c76f341a0f04de0c487da9f20de51021096859d22423fd2f0f6fed454171077

  • C:\ProgramData\Microsoft\Windows\Caches\cversions.2.db

    Filesize

    16KB

    MD5

    541662f955ad5264b65a84b9e7053f78

    SHA1

    6d1d89154b1a5dec33e60539ca518c7f9f8ee01d

    SHA256

    41c34513b2e01e4926d647b2396e1c4c1ad8a0447f9071af4651c133c0dea7fe

    SHA512

    507dd5fc5b4e2fee31f1fe7257e63567981b8b1a526e5f66a8fc5c8bbbc5cb77b1eff12cba6ec4f2ae6534bba0d0e7cd4a0f0fb2f5b6fc6e8a91a0cc446e5fcf

  • C:\USERS\ADMIN\DESKTOP\APPROVEBLOCK.VSSXPPHKA

    Filesize

    348KB

    MD5

    3d5330ba1b20ddecfadaa86592ae48f8

    SHA1

    a79e2edd15cbd76b0f4c7637aa141a51c6d641d0

    SHA256

    57e978ebd3ba9474a6fdef29ac77839c3e84c68cf745ebc861425a710a88c307

    SHA512

    4705721817853fc30072fe2133d453857320ff4027094dc8ead0da3dd69040b5ac8283317d8763ed65e400cd5979aef057842aba9428c017b3a82bfec9c82477

  • C:\USERS\ADMIN\DESKTOP\CLOSEREAD.XLSXYAIHK

    Filesize

    10KB

    MD5

    e919180dddcbe5f318f44d7688ea0937

    SHA1

    59dfcaf1a701a6f70ee5ab91b3d20c37e2d0d658

    SHA256

    85f529727acdaacb242d2e93277ffd8a5eaae5cfccdb55b61f4ffef516d04562

    SHA512

    6779958480e6a702454b8790983241e5d2c5d9213c702295d9c2c3960a5387c4bb4b3649a24145ba61e447fb24d47a7f5919ce6169fbdd744831c87faa42b2b3

  • C:\USERS\ADMIN\DESKTOP\CLOSEUNINSTALL.REGMTXSF

    Filesize

    459KB

    MD5

    9672e2b09634aa55d8693d30bd604c5d

    SHA1

    6bc70c7c0547e84c944f225f78f4f7aedba23ff0

    SHA256

    9f31d21ce534ad2486e473e79fb709f26ee89c620321b043b050fb68c41ccb00

    SHA512

    d8d68eeaccbc4b778cec75e79643114b6d596a10200e0bd4d99afcc3d014f5ef9c8c2d42d26192d5327f610bc74785255161680db4abd5b743007f9369e7c3e9

  • C:\USERS\ADMIN\DESKTOP\COMPLETEPROTECT.EMFFCKMD

    Filesize

    515KB

    MD5

    3ca3f4041143180154b778b1e9d34896

    SHA1

    756e445756b4915b20f7bf3fc3d8dada5f411ab4

    SHA256

    25e3cc6b6c5af26aed98de7e6d359fd4200c91ca0a7292b9b15bc9e230d79ebc

    SHA512

    0b36d28d2f50cb347426ec4aff5687b1e769aadaa2d9dc39e23c885c3afae8e31fc8b288d0bfb62ed77bf0923c523fb3895904f70147e4718555d448be152809

  • C:\USERS\ADMIN\DESKTOP\COPYCONFIRM.PPSMLTIRY

    Filesize

    710KB

    MD5

    25ed4bbf48dde638ac605e3605d741a4

    SHA1

    d6049ddf9fdbf64e1ab4c1d24d54e94efbfdfcd7

    SHA256

    8c08178ee0408993719ac957df6e63c3e2b871eefae8889c3093eb088a39f3dd

    SHA512

    50383d341bbf6fd98c1946410a40fec4cca574c997f233faef51f081d5d0661e9ec79c2bc74e5f6c3afcf4608a455860fdd3caaba5eb167a23851e6d12d65851

  • C:\USERS\ADMIN\DESKTOP\COPYRESUME.ICOZWFEE

    Filesize

    682KB

    MD5

    d5657c6d1317b7c9eb140ae7a95d583b

    SHA1

    74c1bff3929e741aecefa2e2acfe0b7b89cb9230

    SHA256

    0e2ed3b1a42ecc36b0100fe885a345fc8a02ad4ffb2da3c8e63993248d1abc07

    SHA512

    3c41844016e3ca9753452e3dff6f8ccd32f6ae0cc36555876f7eb2d242f21362ec962917e88786e3050fcaab9ed13ff6afc022b814a9d824dc03d1e5fedf8cd5

  • C:\USERS\ADMIN\DESKTOP\DISABLESTOP.3GPPJYFRW

    Filesize

    877KB

    MD5

    7ace93eb8e3cf1b23a4da1cedefb30db

    SHA1

    b3bd177b008666c85bd2cd871f3e481058a61d75

    SHA256

    c626b936bc782f91e5ebc2e1fc3a7f06b50ffc610669e43f9b844835b30c42d3

    SHA512

    5e95a1a189124876b2d16e25fccdcbba2519bfe38220bdd59f5afb620a76b3a0767b09d4d451e65288b7a7c117200eddaee3b50d58ca2ed60a7372c90e51cbf3

  • C:\USERS\ADMIN\DESKTOP\EXPORTPUBLISH.RMITGGFH

    Filesize

    627KB

    MD5

    80ce9989b797c99c0e5873ab6bf3901d

    SHA1

    2494f19660ecfaf584024e7f51a33b89f47a355e

    SHA256

    65ae7a169aeda5d88694e17639935ab202865dc0d2b7969d09bcbfa25c068747

    SHA512

    cb7a6af9c4787dd953ee5c116988a304a5caab24a8f302013b1a86a670b792fefc6067d845c59c637a66546bbafbccb291fdd0521e44ce2e5362bbae1a91e953

  • C:\USERS\ADMIN\DESKTOP\GETSUBMIT.INIODKOM

    Filesize

    794KB

    MD5

    372bb5c7221469558a335bd4d4b0cc3d

    SHA1

    29a0126b3da63353a270bc691efacd14dfddcc81

    SHA256

    e543f007067a3868879c3952835b57fa732caf530e0f6f328f910c53354f48d3

    SHA512

    456aebb71d53595d9a02dd36fe085b23dbc05521733dd3d75908a2ad177dde26f086a5273f0655111c5a29d7e95c1869c1a6a865d744e1122d223c5d6cc275a6

  • C:\USERS\ADMIN\DESKTOP\GRANTADD.EPSTVXEY

    Filesize

    849KB

    MD5

    a8732d8badedf0dcb45dadfd5f10f08b

    SHA1

    194ae7d5ff6cabc60b046561625def6ba2f2c17e

    SHA256

    3bf111c749021f33248db6d7675527414fb67097577243ab551581bcc4e59233

    SHA512

    9a021459f3871f20e54f44397904f949fe44c051b1e6aec082bb906bfe3d5b008d35f7510f9e3019d6f2ac14c35a6cc58d9d18b8356d786159fa902995fb4556

  • C:\USERS\ADMIN\DESKTOP\GRANTTEST.DOCXXXRHC

    Filesize

    22KB

    MD5

    476eed496d8d766eb86c73977506b911

    SHA1

    dbc1617e6e158b4aa5923909c48927ec7169177b

    SHA256

    4e4975fdc885b467f9002d8928dde3aac985f6bdc5c790a61ce54dba175c947f

    SHA512

    1e5b34ae29035fdc9db3bc3a6546cd4cd425b3dae1b9b2055ce5cdd4751991eac95ca4b5d1bc1821207e5523b0668facbd43616a67bb8e914cb77485645a7642

  • C:\USERS\ADMIN\DESKTOP\INVOKEDISCONNECT.MP2APAHA

    Filesize

    1.3MB

    MD5

    59cf8bb570e468f218d2a2d7776ce741

    SHA1

    61b4b1012af22268547e7bad20b61dbd3c50f85e

    SHA256

    58ef49e77a447e58f10f2afa403d5dc3373c92ca69380f366d3a5d836081d441

    SHA512

    5f54bcf7ff3ad46eadf62b71ba8f82cca860314d82bddb356370c13788e1a99137feaa6da18aa273034648df6d07e79319c4c609581a98a33ed6f535f772863d

  • C:\USERS\ADMIN\DESKTOP\INVOKEINITIALIZE.DLLRINZV

    Filesize

    599KB

    MD5

    1bff49897db97b4a7430c73db73260b6

    SHA1

    8f44c3e36da9d12581c85c8f4dd5912fce3d55e7

    SHA256

    c536975151e707dc7b9ddc6f4013b329a15135ea3c5aee16b1e7a5c00ccd81da

    SHA512

    f531983733a271d4cb945babc30ddae1de399109c0200cab39762aa742fbfc15d0120c4b73c385cc52cf9b183395e9c10caa1f154ddfaf704cc101d1d7ad847c

  • C:\USERS\ADMIN\DESKTOP\MERGECOPY.MIDIVYSKW

    Filesize

    933KB

    MD5

    acb127399747d745481e658f5e2d025a

    SHA1

    38e9b6fdefb6866dca99a3e30b3505750af8b049

    SHA256

    e45e2aadfde617a696925fac5c4fc080628f7009bfab83ff98ff72471c096b9f

    SHA512

    6c14d6a29b90f33a93e89a16749611161be0600bfbf4bc0daa9564006f64217e137c86f83f9ffd33da9965a7ce4b680c6651943a82494cc795d03093d47372d8

  • C:\USERS\ADMIN\DESKTOP\MOUNTMEASURE.TEMPEMBUO

    Filesize

    654KB

    MD5

    0755d61c413d92e743821cfee6c17eaf

    SHA1

    91d08f917fb26f60e629d536e70814da02ddcb08

    SHA256

    3e9e0a5bff7f2936a502a6defa41af967a83db748d8bbb564458540f7cef8155

    SHA512

    ff419c7cd915f68b4b60ba95cc65d3ced6d33e55e73bbd1aeeb6500a9875f7598fd33fae8f07b7088bb1ad066461041e91fc4cbffc7742cd968f225ad5893bbd

  • C:\USERS\ADMIN\DESKTOP\OPENREAD.MP2OCUZF

    Filesize

    376KB

    MD5

    81834059cb3144462f2e34c535738f6b

    SHA1

    b5ed1a31d505588b9ddab753b017e0f20827a636

    SHA256

    d2a79983d9c0a1c6106e8ddd35733e95fb5e8a8796915139fb795b12765ced40

    SHA512

    343662f47b08cbffe2cafaaebb32c2c9f2b04d226c039f2a66c13873634c517f357020b337626291596bed14f7d16f769998ef575a49a22e4e77bb339d4046d0

  • C:\USERS\ADMIN\DESKTOP\OUTSYNC.AVIINELO

    Filesize

    961KB

    MD5

    8728a468fe84ab18b6b2fd9d8a8cfea4

    SHA1

    8c53365ec70ed410473086a92f50a806af8e05b6

    SHA256

    33f947d8ecddf4999716bcf9654742f56102f8d670da93c0b7a291cc0bfade11

    SHA512

    f6e4fefc78f587b42b26ea7f69c4d3bf055eb22803dbdae9fa7cacccb462170e76e6e5bc76a755b6edcf09f48f019842dedc4a614685f154ccf997e0765bbf3a

  • C:\USERS\ADMIN\DESKTOP\PINGGRANT.FONCQSIY

    Filesize

    738KB

    MD5

    fa7ce4eaf9b860476269f7032cf4dc13

    SHA1

    1eba1596677db2d81dcd9f0a9027c9bb5318883e

    SHA256

    07e8c51044827e969daceebe7c3ab04a855942eeeb63076a2a47d935d28ba13d

    SHA512

    85c8cb92a3079adb7f7bcaf75139d155562e111150a6777280a23b72072d9bdfa6e8fd9c99be57b97f2ae5d42d127c56ad36385b41a85a0edaaab9eb914ebf99

  • C:\USERS\ADMIN\DESKTOP\READSHOW.TEMPEZTXJ

    Filesize

    905KB

    MD5

    e5b498fd33623d309dc9f139608e192a

    SHA1

    fb1a46f5b23829282f8e09d07c9aa065ad3a6829

    SHA256

    ced97bde19bc6b4777e19c084e7d61d905517f8c3455095a4aeb730b0fc2d832

    SHA512

    2091d42b5f36a57737de451e34121504a87e81504dc6b88057f17be7701f154f4012cfd1a991a4ff33eb68f8144dfc62c57d5d49ae2e9a66f7bf93b656ded2e5

  • C:\USERS\ADMIN\DESKTOP\REGISTERPUBLISH.M4AULUED

    Filesize

    989KB

    MD5

    286be62359acaadf7dca7c53c56572fb

    SHA1

    f081ddc9eb63cf08e141f05d3f6d74b56c4bab08

    SHA256

    d28f0bb46b9d80a2ca89a53f64f51ce95b59e1d501bc28ee7070eef6921002b4

    SHA512

    62886e65ed0afe513fe86810a48a9f52b15ffb6b59e425a05bfc295bb0b7c01c8ecb197c47ac893582b022ed38acb8bad67e5d33708dcee8d985bf7c973a83ea

  • C:\USERS\ADMIN\DESKTOP\RESETCONVERTFROM.WVXUKRRZ

    Filesize

    432KB

    MD5

    8066045712ac811bf1f2ce9bb787eea4

    SHA1

    85ae6776510485c27ee918dfd55387179b136c42

    SHA256

    f56c5f0e178825b55a2a65266021b0d206b427871a09d3d7185395362e8bc493

    SHA512

    511ce4e15db14ba9860f2bd94f3382a9b99254fcc323abbc5af4a560f5115ae5354cdea1c0d7fb79016e6766fc6e2b2fa83adeddb7d3fb59c862eae87ba0bdfa

  • C:\USERS\ADMIN\DESKTOP\SPLITRESIZE.RTFJRNZG

    Filesize

    571KB

    MD5

    0494156385919e0b184768f2d8170327

    SHA1

    0167c35c0676827c125af6d3daf149c1fe43fed0

    SHA256

    b975b91b9417c1a989f8f4a946bcdd057849f684c98b94c2f1aae93a6b49e2d2

    SHA512

    7ad504bd961e99f2d5a3c333e498ee306c8b78a254b6a7cceb5a24af2981db4cbff5866942999a124dd549fb6a843216da70408200f6f33eca9b443f4df44342

  • C:\USERS\ADMIN\DESKTOP\STEPENTER.MPGQKUCC

    Filesize

    822KB

    MD5

    6439c932bd5c4c3f568435b6334826d4

    SHA1

    f0450f9224f7a988d005a350f5f737528b90f59f

    SHA256

    8df28ad7534de89436e75bec76020bc549e71ac4399a40b70a308c2ae1c4fbae

    SHA512

    0ee630488938b92374a4357b29816991551173651846570d3c397d4ab4835387c8659c8ca4be7516cd761bf1a57583f19ef84ba52f8ba5baeff92a70040f820b

  • C:\USERS\ADMIN\DESKTOP\STOPUNLOCK.JFIFZDRSG

    Filesize

    487KB

    MD5

    4c822fee2ea152527962561383417f62

    SHA1

    f984e601f0d63c9d61bf6d461f3734a6d0dd4156

    SHA256

    c85cbebeb56761dcad86a4b86551f7ff58c716e0472acfaedebab81b2f0404af

    SHA512

    e5f7dd69c9e4a11cbc8bfd230f4a07b3276998cedef464332059425c6c0da9a5cdc532d9066877316a36d01cb90d624d983b802c75afa1354152a83ba9335134

  • C:\USERS\ADMIN\DESKTOP\UNLOCKEXPAND.XLSXZNNRZ

    Filesize

    543KB

    MD5

    01a295f31b536aad56e925de038d663c

    SHA1

    5c10e745f5096c3c43120458869e1fd73d995022

    SHA256

    06f894495f50fff363d1228e10653d663582554c7e5c9844954d314afb7422d5

    SHA512

    a3cf37cae81b6c425347f64dcb6a596f9ae35a181eaa78bd83091deb3e656c6e3e8d409d5d55eb632d9ce183d379184c742d476b12340b0bf7dc6cd618c470e8

  • C:\USERS\ADMIN\DESKTOP\UNREGISTERSET.AIFFUEWUG

    Filesize

    766KB

    MD5

    e0006ea56b758eca387b48c852ec4a5e

    SHA1

    aeff89f05c95c24bd67f8b5de8f7378aff1aa43d

    SHA256

    640c4d7fa52762f695b7d999d0dd8bbd5181dfe20400a7a55e6cbcd5da233e60

    SHA512

    000883a8cb2f6b9433a67196d31af47d53f321d244437555a7f84ac1d8ed5c8b44212e746c1c353f33cbeec73bc21c34c1f59b47645f64c3ea1dc21a0c045f8d

  • C:\USERS\ADMIN\DESKTOP\WATCHRESIZE.PPTMDIQIA

    Filesize

    404KB

    MD5

    30c0199eb09cc6ce3a43df3a36e8fe34

    SHA1

    b50ca693ef88d8a812e2526581e860fa60655810

    SHA256

    0ae7aee9b2980fec0f985e7a203fc24c263b12a7fa01c61c3a3eff2828071a7b

    SHA512

    adf8e161f13309f3506ea50d712748ed56825e942ab168df083df9a41e65a983aa2ed73b09d75375cca189232c454e8fa2d5e89f6aa0d57450f9679e389b3c1e

  • C:\USERS\PUBLIC\DESKTOP\ACROBAT READER DC.LNKPWZPR

    Filesize

    2KB

    MD5

    f218f04e0f7794d8b74158cc5832887e

    SHA1

    8f86a46cf06427513717c87be6ddb259ff36c596

    SHA256

    7855ed37b6254ee3cd5d1a7e6bdaa5d192d11e58dff1ecb7377f1827f5c8b077

    SHA512

    d91a7869c6fea5fe4d0ded26ceb92607cc86d362c1d6623bf787f1b23a3dbb31fee0f2126f959c0a87828afdd537e2fb784e23de0b17d30f8d1bc0f44caedf24

  • C:\USERS\PUBLIC\DESKTOP\DECRYPT-YOUR-FILES.TXT

    Filesize

    1KB

    MD5

    5fc1ac37c51f54fa9e77c5343dfe3119

    SHA1

    03e96d277ee28872a63fdc36522b49d821f54e98

    SHA256

    22c5532151f9cdba790b94510a46f9e21182a528ef74be5e3e95274beb52fa78

    SHA512

    f0b829173cb327b2a17c20f4ba8f40b4640e2591485b331e1c4719c5b7093e3900d71ea5016f5973bc23fdbe08c771516304cb54559b2693b73f7d15a11e468e

  • C:\USERS\PUBLIC\DESKTOP\FIREFOX.LNKYUOLM

    Filesize

    1KB

    MD5

    025f2b0b4f6828409726375262e12a3d

    SHA1

    19cf6d20d47097567e61ff889630745c07f57d53

    SHA256

    673bb7ae78e00814962a59a2b89ed69a015497190d89ae13fc43e39135419f98

    SHA512

    f864263f4a3a9a0b45bf5105fd58934c654df57066c0f0cd5c1d6a1dc4f7b9f96091294430bf24716dc95646133a47a49e25a0343228a013f41f5f9b9852ba85

  • C:\USERS\PUBLIC\DESKTOP\GOOGLE CHROME.LNKZOCSS

    Filesize

    2KB

    MD5

    e7b0614a6a69d2d5019e7ae705ec8d6e

    SHA1

    83e80b84cfec12765d6ac959028219bd80029f57

    SHA256

    7176671bff47112fe57d3dc299bcde16450685d924fb006a28a3511ce07da9d5

    SHA512

    36f1b41a4bfe73e2a5b8c9078e9f8b072826a985ba0ecf509ae8f89b249aa826ceb62c7370663a8019b0d32140912e63b7ebcc6b44dad1f8b444a4fb675dbb18

  • C:\USERS\PUBLIC\DESKTOP\MICROSOFT EDGE.LNKITLPJ

    Filesize

    2KB

    MD5

    824420fdfd4f040c71f26e398e6deab2

    SHA1

    3d8a8bfadee5ea0cafcf2771cb641ee56e8be837

    SHA256

    c7adb1888c5424d19da32732bd8bf7e69353a9174ee8c1c12701c36b93a857a0

    SHA512

    f538e5293dbb379e58ee466cd9de7a2290f3860529adc920a402921fd1892b5ce776c45522a3e90cb145bde99655e571619ab4d4a1922c518f90c87c2637c5df

  • C:\USERS\PUBLIC\DESKTOP\VLC MEDIA PLAYER.LNKNGBFJ

    Filesize

    1KB

    MD5

    e29de28213954121929caae7185e74dd

    SHA1

    051bda8014c4b77b89e697e6b71add0c9a4919c6

    SHA256

    e7a9b76f94c49428e40477e4f3f867c35aea5969febbd68207b424b091e38af1

    SHA512

    b9b6a0d56d64f815f9bf516c9ea288dc1eb8745cdeb1ac7bda318844ce9f3672fdc6a1ba9112975ed2c14c366b7735e205e97dd3af5959d64ea5128da313177d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Caches\{03BA58C4-B905-4D30-88C9-B63C603DA134}.3.ver0x0000000000000001.dbmoinv

    Filesize

    414KB

    MD5

    8236658c51fb9aa3ed390a8a1c9d60da

    SHA1

    af08c65e1d9c12991d7f44e4be979c945b1ccc9e

    SHA256

    d9ef7bf6c7251c659a0165d660c758806643175e36ff8f47c51acc459b9ddbc7

    SHA512

    939965a96f936685a1de141cd02659b014e4075f9fd76962b8602f1b0951b85a21659a461cc01dba967ba552e794a3f6f68ba8142dd7ba41298fe153bf4bd8de

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_16.db

    Filesize

    1024KB

    MD5

    547266d0a8438f2453241938f32f3e52

    SHA1

    eeb11fc7e10af5903ceb1a760f8d5278095103d3

    SHA256

    4274e0668d0733682851186951bf3ac6827a891451b1e4490c25c2c5af83c545

    SHA512

    f78d2506b15a04b0fa4ccdee0f2bdffe1d5c6835edd656a3674bd551086d737dcbffc0f8d518bf15a7fe4b248de8855e972c9bedc1ed947c7e38af1ad6cbf699

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_48.db

    Filesize

    24B

    MD5

    ae6fbded57f9f7d048b95468ddee47ca

    SHA1

    c4473ea845be2fb5d28a61efd72f19d74d5fc82e

    SHA256

    d3c9d1ff7b54b653c6a1125cac49f52070338a2dd271817bba8853e99c0f33a9

    SHA512

    f119d5ad9162f0f5d376e03a9ea15e30658780e18dd86e81812dda8ddf59addd1daa0706b2f5486df8f17429c2c60aa05d4f041a2082fd2ec6ea8cc9469fade3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db

    Filesize

    7KB

    MD5

    1ecdf021b8f0cdb3d70560f9c981eaf0

    SHA1

    10a106c7ed76041de275372120589ba317a822f2

    SHA256

    de87028391bb34445561351d18dcb17a605bd5c689792b11e05a987700c160e3

    SHA512

    72b418cfd4672770709f832c51b1d7d7a980f83c6739ec110fded3deccaaffead8611e75c7f303a5df60283ee9fe7e6fcddc02fd00f886769799b17683d204f2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db

    Filesize

    14KB

    MD5

    677296144516b1d96a5af90069004243

    SHA1

    09b55eac6a092cc159d5e1c78fded7c9c8352c12

    SHA256

    8e5a612b35d8539cf7cf425821abd376134770b79eef8a8e5c4c401d7eb6ccb2

    SHA512

    c47f68a0b234ad29a179b5fd21185c62958c4d31a80a45ace3cf00cdfe9489dcd00bb9a88f26c2be7cee07eda2e202e03cd910c41e7fe21cb85822a3c00c9666

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\NOJFVGRR\microsoft.windows[1].xml

    Filesize

    97B

    MD5

    13c4e7fabe4ebc32da88f0d2be0fa032

    SHA1

    52a5ab7ae40574e1a53a47c10abb4fdf635726e9

    SHA256

    b8266f71f4d6db64f092d41379643189a2397db50986129b668b4d8b9645d7e3

    SHA512

    e7845ff1ce3940ef2072f16bf486909dbd1d6ce5e8d47124eacbe911fb4cf76917563288f84d71b23a63ce3f8c1069be5089c936542139f58706d0d02e41fca9

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\95d9a2a97a42f02325559b453ba7f8fe839baa18.tbres

    Filesize

    3KB

    MD5

    2d5838b770a1bd0d755e4536e7b233a0

    SHA1

    4cdeb7f41d6715ffd82135df057fcf64cde5d56d

    SHA256

    7217e8715995e42ba19cc44162c9a23d596a90c149ea61f710dfb01955054264

    SHA512

    1061e7f00b7f49ee126f834ebec326d6c45b7c97711df5d28232fdedec7dcc46957045883f3bbe3f1c840ec3d302530d314dff4afcc68706a2933b34acbde1c2

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\95d9a2a97a42f02325559b453ba7f8fe839baa18.tbres

    Filesize

    2KB

    MD5

    d3df8953ea7c24e30442edd2252ab531

    SHA1

    5a53c318fa5f57ca601018addc98c4942f451b49

    SHA256

    1c6fdf6fcb4ad8e5e9341bd72fbad8e314520b64e6232f0d925d0bf8750de1ef

    SHA512

    1710a33eefa885025148f8d92c707bfca1d7fa042af1467609078027f3c7c802c4b5940d25721af58238d92cabed8bb6fb8d2fcd81fe3fa3722ac9bbc1c082c0

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

    Filesize

    2KB

    MD5

    77c657b99319fe82da46ce60640d8d85

    SHA1

    a7d767bc9f09dc2bd4740f6336ccd4b11c73f4a9

    SHA256

    bc76f1e682f003fcc407b5c2f805a663a75b247d716fab590974ae78d756be2b

    SHA512

    1dc652432c5127b4f08b28c8df0b3e529c522c7ab7a2d67237a07501271e97c35bb762884ee578768eec545eaa8db2344dda38cc2507eda346a1aa9576ac3366

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

    Filesize

    2KB

    MD5

    acb93eb1807ce414c63624bebe618bb5

    SHA1

    66e5449ea140be0f7d26e01e4f99e2c86704120e

    SHA256

    99ada0663a945ddd5498f97cbae44c6f08ee0daf6271efb091a91afe667e0892

    SHA512

    2f33fb4a088f14f588da8fa315abf44422b9ef6c38292b3ad4d46c005fab8fa947542a5113a6278569da0c0242a21a21e05b54a9d01281365583e31281d6de91

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{A5E73466-E220-8EF4-B956-A582187356D9}

    Filesize

    36KB

    MD5

    8aaad0f4eb7d3c65f81c6e6b496ba889

    SHA1

    231237a501b9433c292991e4ec200b25c1589050

    SHA256

    813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1

    SHA512

    1a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_Explorer

    Filesize

    36KB

    MD5

    ab0262f72142aab53d5402e6d0cb5d24

    SHA1

    eaf95bb31ae1d4c0010f50e789bdc8b8e3116116

    SHA256

    20a108577209b2499cfdba77645477dd0d9771a77d42a53c6315156761efcfbb

    SHA512

    bf9580f3e5d1102cf758503e18a2cf98c799c4a252eedf9344f7c5626da3a1cf141353f01601a3b549234cc3f2978ad31f928068395b56f9f0885c07dbe81da1

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{4d2a1c5e-6178-4ebd-b713-4074a0ca664b}\Apps.schema

    Filesize

    683B

    MD5

    bc9dcb289e92b71674dfa49d95fec230

    SHA1

    1174c1b5ad9cbc1703b605a4fab621d841ef4fc8

    SHA256

    4af93e1d3c8c0d82d976efa9f351ef4d426448a9d3bead758359464f495b343b

    SHA512

    0197238a5c230f1d4d2d688b33bc42c6d2db252c7ac18bbbdb02c6af27b366041a6f6079d58301d5f4faf2dcebec6f142f97a4b21a7e6255d667305ae969f25a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{4d2a1c5e-6178-4ebd-b713-4074a0ca664b}\AppsGlobals.txt

    Filesize

    344KB

    MD5

    85df4c8e41fbba2739e186647a28b4fd

    SHA1

    2b2769503cf22cd57963a0a88f6ea70530fd8705

    SHA256

    0ff4121ae1a68491b18c61413501357264190514632aec4ab6872bd406686219

    SHA512

    6234d0dd0980d5d3714c813e3c579d83f3f6593c9780597d93fc755b6d26f13811f9fb6afe7d5e63d8546acba527a548a16444c8d9efefc66d7b4dbd0d9b2e4d

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{4d2a1c5e-6178-4ebd-b713-4074a0ca664b}\Appssynonyms.txt

    Filesize

    238KB

    MD5

    bf8ec0195911409f58123961c5b4d8f6

    SHA1

    b6d5f051a874aec7b3f46a0b70477cc113c2c9e1

    SHA256

    77757a9b3fdfdc49d012b6dbe056c95031628bfcc93c61c9559a4a57f921ea7d

    SHA512

    1e2559c5fff30d20ab69feaa8d38ef37322844d673badabb211abfb8ab82bab3c378968dee63e61c9714a3c9536f39ca6636882338834d2c522d6c510c77f4d5

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727682151631345.txt

    Filesize

    75KB

    MD5

    850cb30bcec31636939c9a80fb5282df

    SHA1

    6861507f465ebeb47c6f71100e43fc5ea66c95a2

    SHA256

    0a15883676dd5c900be1975c261067a5e3ab4124535ac2ba108a2fa62b506176

    SHA512

    60bbe251c00fb3e7807b86c221fa243dc146da78f0e129f14ab85a2d60d09e44e91a555b9d7164055051f36aff589df2cc3a0f4070dc5490abc52cb1096e300e

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133766046649502675.txt

    Filesize

    2KB

    MD5

    ecaea544af9da1114077b951d8cb520d

    SHA1

    5820b2d71e7b2543cf1804eb91716c4e9f732fde

    SHA256

    9117b26ab2c8fdbb8223fe1f2d1770c50a6cf0d9849a5849d6aebcbe90435be6

    SHA512

    dc7bedbc581818011aa2d313429f234b12e5e9cf320b02b8d7ceeaf9cdc1c921ffc51af7f4080b02740f2d2146fbb006ccbf37cdcba3e3a10009142daffdb919

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133766047051603840.txt

    Filesize

    71KB

    MD5

    443c0bdf9f0a49581598d0c05887e7f7

    SHA1

    de8009a75e93a7a78a609940b118c2e68cc2f563

    SHA256

    df80842c8721b2a9ef40f72319eb43d316cc3f5b3fa012115c1e797eab4c413c

    SHA512

    a139bb86e4454dc155679300be61196390eb0c0f05997fe329e5dc92379c7f3d8baf4996387b344fbd2e0b38bc484acd6e2a1f1ac250fbb13c5a8e744842ad04

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

    Filesize

    16KB

    MD5

    fffb15df7de074126d069749bee3cf8e

    SHA1

    db4741e7987b7928634b22c5ba72a0c36ee6b1db

    SHA256

    cb52e0204d2c6c7e126237bff9cac2387cd4fdfeca8d04b402b6de441cc3b69d

    SHA512

    a2075963adfb2671e4a52fed4d294b18f2b3b27ae151c571a3384a71be955952495bf7d4c5c1584a66b11cd3ec92ccbef3b7633b3c8bf47ed6c0052ea5325c2a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

    Filesize

    1KB

    MD5

    d5585a370a1c827485c26c591cf49d5c

    SHA1

    ebc614e11849b7c9a8bb6a8ead49872b7304a5ba

    SHA256

    a970651b6e8568c8946032a6987785a33b77a96869dbe5ee665bcbfea94db0a8

    SHA512

    881e919ca651e84f654de84e26c24e4a86fd812993a8ef0c26c8f6292f2d16202b79c56792f4494e58924fb0896e2f827666f3505df48424ad2f00168da445e6

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

    Filesize

    9KB

    MD5

    11a1bbedfc45a36536786e58b41218d1

    SHA1

    b4594fecb42afa8eadbe1af4d00ab4f17d3f0e98

    SHA256

    c2442601d689a704f49030ca61dc3345ac2305243b42572b3329878626902c08

    SHA512

    43f80cbf64a00a40a42beb55225c06b80687ecf2f04b56b898806cb5e58769452ac12ef391503f0b9ec8b6c7d5e9429acb33a1b8f6f1d0c378c8c9ced07abf24

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

    Filesize

    9KB

    MD5

    e91f3724df59809e0d64c51c9771bbda

    SHA1

    b96d75c6fd26a9b0d0639134ef640fe7777899c7

    SHA256

    d0fca0b57b8a335cbff51724a1f6d32df817ffcd6d1b7ddba4c0fc387a759264

    SHA512

    e337f6c13f838b8abc819c15e9c5f0d76c9efa9d6a3b4b5a25178a5a0fedf49047471cf052443db8e227896ea883df1087f200fe748357ee8c017178c43dce92

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

    Filesize

    1KB

    MD5

    92a3a372652fed71959b80d0956b8af5

    SHA1

    203898a33bfa3a8cc864e752af3b5de50dc354ec

    SHA256

    f2502b90cb55b78e27cb021ef13c324f562090371fefd19cfa624f0d6114a706

    SHA512

    535834936b6c0c082d1da560165bb1cd0cbfb7d36b366605a4b964c03772290d29b8334c66b5fadf258767bc91e6ee06b248db94110ebfe5ef118fe0174dfcb9

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat

    Filesize

    13KB

    MD5

    b6ffc3bedac6ee289c3eff6f36dc9b4e

    SHA1

    28f2a25ed4deb1865342616800c7a0c581c7e519

    SHA256

    9f5b0a94ed8d21617b1e857e688a5a16caa626ca1ae32b80739535fe737ed888

    SHA512

    f62df16d867daad1a79b8baaa858af1c5bc0f62918a5ff8c1ca7a660ed619cbd62570748d07b1f1a9ad72fbf2444f1ee19adc774525f41ece28e810e44cfe1f2

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat

    Filesize

    13KB

    MD5

    361300af4c0f03d544f9e68ed66f8abe

    SHA1

    9d4447fbe218daa7b025785708a96514c5973f49

    SHA256

    ed4fba4d4d5876023b6af71f28fa23c26927356809aff47f027d4c6847045dfa

    SHA512

    d3bc0704272848509830b426106244dfdba2355b06dff775e936897199a975303e9deecee2f9a2dab783c4d9cfbf8b10245bbbfce2778c28ffd68e5e449d6333

  • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\2C1DWAXK\microsoft.windows[1].xml

    Filesize

    97B

    MD5

    ca8bd975b54d79ae2b4c34e9238d15a4

    SHA1

    cb04ca04bd9e1a8ea442c25a33978700d00d0b1c

    SHA256

    71807bc935018eaba2911c27147e4fa1f9c618b47528e871bbc816bba4290430

    SHA512

    257f056c90787065d0899fe0c314d7e5fab13455b44ccc1cd7b4ff1ead6a567e804a2ee7908c4015c7ead7b2c2f0785541478855bc7168ecaa9f523de080ddf5

  • C:\Users\Admin\Videos\Captures\desktop.ini

    Filesize

    190B

    MD5

    b0d27eaec71f1cd73b015f5ceeb15f9d

    SHA1

    62264f8b5c2f5034a1e4143df6e8c787165fbc2f

    SHA256

    86d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2

    SHA512

    7b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c

  • memory/1132-16538-0x0000000003520000-0x0000000003521000-memory.dmp

    Filesize

    4KB

  • memory/2076-8152-0x0000021AEB150000-0x0000021AEB250000-memory.dmp

    Filesize

    1024KB

  • memory/2076-8157-0x0000021AEC180000-0x0000021AEC1A0000-memory.dmp

    Filesize

    128KB

  • memory/2076-8153-0x0000021AEB150000-0x0000021AEB250000-memory.dmp

    Filesize

    1024KB

  • memory/2076-8196-0x0000021AEC140000-0x0000021AEC160000-memory.dmp

    Filesize

    128KB

  • memory/2076-8197-0x0000021AEC790000-0x0000021AEC7B0000-memory.dmp

    Filesize

    128KB

  • memory/2596-16580-0x0000029208A80000-0x0000029208AA0000-memory.dmp

    Filesize

    128KB

  • memory/2596-16560-0x0000029208700000-0x0000029208720000-memory.dmp

    Filesize

    128KB

  • memory/2596-16545-0x0000029208740000-0x0000029208760000-memory.dmp

    Filesize

    128KB