Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250211-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2025 03:45

General

  • Target

    2d89f1c873f9c04f773f309eb3b6a8ed32881868bfab3f4273f7e9c2db322fc1.exe

  • Size

    244KB

  • MD5

    0c8d0933037436b674f2b8478ec5baba

  • SHA1

    e8a7034c43d84b18fb93dc02e8a0b818a645ece1

  • SHA256

    2d89f1c873f9c04f773f309eb3b6a8ed32881868bfab3f4273f7e9c2db322fc1

  • SHA512

    305050c391f443007e3f6e2e4ec60997da69db406b6d85efd19ed9f71683dbc9697280307867237b24034ebe9d99e8f249fc5fc75cb5bfe55721c283261ab144

  • SSDEEP

    6144:Cy9v17kwzsoL9M7df4cqT/4rrUVkg0cDuolN0Ytb4Ra:z97kDo2ffxcP7Dlvs4

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #Cerber_Ransomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Rans0mware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.wewiso.win/8EBA-0ECC-FE83-0072-8E1C | | 2. http://cerberhhyed5frqa.m5gid4.win/8EBA-0ECC-FE83-0072-8E1C | | 3. http://cerberhhyed5frqa.we34re.top/8EBA-0ECC-FE83-0072-8E1C | | 4. http://cerberhhyed5frqa.cneo59.win/8EBA-0ECC-FE83-0072-8E1C | | 5. http://cerberhhyed5frqa.sdfiso.win/8EBA-0ECC-FE83-0072-8E1C |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.wewiso.win/8EBA-0ECC-FE83-0072-8E1C); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.wewiso.win/8EBA-0ECC-FE83-0072-8E1C appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.wewiso.win/8EBA-0ECC-FE83-0072-8E1C); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/8EBA-0ECC-FE83-0072-8E1C | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.wewiso.win/8EBA-0ECC-FE83-0072-8E1C

http://cerberhhyed5frqa.m5gid4.win/8EBA-0ECC-FE83-0072-8E1C

http://cerberhhyed5frqa.we34re.top/8EBA-0ECC-FE83-0072-8E1C

http://cerberhhyed5frqa.cneo59.win/8EBA-0ECC-FE83-0072-8E1C

http://cerberhhyed5frqa.sdfiso.win/8EBA-0ECC-FE83-0072-8E1C

http://cerberhhyed5frqa.onion/8EBA-0ECC-FE83-0072-8E1C

Extracted

Path

C:\Users\Admin\Downloads\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber &#082;ansomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #Cerber_Ransomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Rans0mware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.wewiso.win/8EBA-0ECC-FE83-0072-8E1C" target="_blank">http://cerberhhyed5frqa.wewiso.win/8EBA-0ECC-FE83-0072-8E1C</a></li> <li><a href="http://cerberhhyed5frqa.m5gid4.win/8EBA-0ECC-FE83-0072-8E1C" target="_blank">http://cerberhhyed5frqa.m5gid4.win/8EBA-0ECC-FE83-0072-8E1C</a></li> <li><a href="http://cerberhhyed5frqa.we34re.top/8EBA-0ECC-FE83-0072-8E1C" target="_blank">http://cerberhhyed5frqa.we34re.top/8EBA-0ECC-FE83-0072-8E1C</a></li> <li><a href="http://cerberhhyed5frqa.cneo59.win/8EBA-0ECC-FE83-0072-8E1C" target="_blank">http://cerberhhyed5frqa.cneo59.win/8EBA-0ECC-FE83-0072-8E1C</a></li> <li><a href="http://cerberhhyed5frqa.sdfiso.win/8EBA-0ECC-FE83-0072-8E1C" target="_blank">http://cerberhhyed5frqa.sdfiso.win/8EBA-0ECC-FE83-0072-8E1C</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.wewiso.win/8EBA-0ECC-FE83-0072-8E1C" target="_blank">http://cerberhhyed5frqa.wewiso.win/8EBA-0ECC-FE83-0072-8E1C</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.wewiso.win/8EBA-0ECC-FE83-0072-8E1C" target="_blank">http://cerberhhyed5frqa.wewiso.win/8EBA-0ECC-FE83-0072-8E1C</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.wewiso.win/8EBA-0ECC-FE83-0072-8E1C" target="_blank">http://cerberhhyed5frqa.wewiso.win/8EBA-0ECC-FE83-0072-8E1C</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/8EBA-0ECC-FE83-0072-8E1C</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Cerber family
  • Contacts a large (2066) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d89f1c873f9c04f773f309eb3b6a8ed32881868bfab3f4273f7e9c2db322fc1.exe
    "C:\Users\Admin\AppData\Local\Temp\2d89f1c873f9c04f773f309eb3b6a8ed32881868bfab3f4273f7e9c2db322fc1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4008
    • C:\Users\Admin\AppData\Local\Temp\2d89f1c873f9c04f773f309eb3b6a8ed32881868bfab3f4273f7e9c2db322fc1.exe
      "C:\Users\Admin\AppData\Local\Temp\2d89f1c873f9c04f773f309eb3b6a8ed32881868bfab3f4273f7e9c2db322fc1.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Users\Admin\AppData\Roaming\{C861201E-33A0-5580-075B-8D71AEE1E70D}\eudcedit.exe
        "C:\Users\Admin\AppData\Roaming\{C861201E-33A0-5580-075B-8D71AEE1E70D}\eudcedit.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2348
        • C:\Users\Admin\AppData\Roaming\{C861201E-33A0-5580-075B-8D71AEE1E70D}\eudcedit.exe
          "C:\Users\Admin\AppData\Roaming\{C861201E-33A0-5580-075B-8D71AEE1E70D}\eudcedit.exe"
          4⤵
          • Adds policy Run key to start application
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Sets desktop wallpaper using registry
          • System Location Discovery: System Language Discovery
          • Modifies Control Panel
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2084
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3348
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd33b446f8,0x7ffd33b44708,0x7ffd33b44718
              6⤵
                PID:388
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,13522154841925027869,2798144556725117480,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:2
                6⤵
                  PID:3912
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,13522154841925027869,2798144556725117480,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:3
                  6⤵
                    PID:4420
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,13522154841925027869,2798144556725117480,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:8
                    6⤵
                      PID:4872
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,13522154841925027869,2798144556725117480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:1
                      6⤵
                        PID:1288
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,13522154841925027869,2798144556725117480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:1
                        6⤵
                          PID:2440
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,13522154841925027869,2798144556725117480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:1
                          6⤵
                            PID:212
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,13522154841925027869,2798144556725117480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4316 /prefetch:1
                            6⤵
                              PID:4796
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,13522154841925027869,2798144556725117480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:1
                              6⤵
                                PID:4304
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,13522154841925027869,2798144556725117480,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4356 /prefetch:8
                                6⤵
                                  PID:2920
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,13522154841925027869,2798144556725117480,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4356 /prefetch:8
                                  6⤵
                                    PID:5232
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,13522154841925027869,2798144556725117480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:1
                                    6⤵
                                      PID:5248
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,13522154841925027869,2798144556725117480,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:1
                                      6⤵
                                        PID:5256
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,13522154841925027869,2798144556725117480,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:1
                                        6⤵
                                          PID:5532
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,13522154841925027869,2798144556725117480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
                                          6⤵
                                            PID:5648
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,13522154841925027869,2798144556725117480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3064 /prefetch:1
                                            6⤵
                                              PID:5164
                                          • C:\Windows\system32\NOTEPAD.EXE
                                            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
                                            5⤵
                                              PID:2868
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.wewiso.win/8EBA-0ECC-FE83-0072-8E1C?auto
                                              5⤵
                                                PID:4656
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd33b446f8,0x7ffd33b44708,0x7ffd33b44718
                                                  6⤵
                                                    PID:64
                                                • C:\Windows\System32\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
                                                  5⤵
                                                    PID:460
                                                  • C:\Windows\system32\cmd.exe
                                                    /d /c taskkill /t /f /im "eudcedit.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{C861201E-33A0-5580-075B-8D71AEE1E70D}\eudcedit.exe" > NUL
                                                    5⤵
                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                    PID:5752
                                                    • C:\Windows\system32\taskkill.exe
                                                      taskkill /t /f /im "eudcedit.exe"
                                                      6⤵
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5808
                                                    • C:\Windows\system32\PING.EXE
                                                      ping -n 1 127.0.0.1
                                                      6⤵
                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                      • Runs ping.exe
                                                      PID:5852
                                              • C:\Windows\SysWOW64\cmd.exe
                                                /d /c taskkill /t /f /im "2d89f1c873f9c04f773f309eb3b6a8ed32881868bfab3f4273f7e9c2db322fc1.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\2d89f1c873f9c04f773f309eb3b6a8ed32881868bfab3f4273f7e9c2db322fc1.exe" > NUL
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                • Suspicious use of WriteProcessMemory
                                                PID:324
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /t /f /im "2d89f1c873f9c04f773f309eb3b6a8ed32881868bfab3f4273f7e9c2db322fc1.exe"
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2312
                                                • C:\Windows\SysWOW64\PING.EXE
                                                  ping -n 1 127.0.0.1
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  • Runs ping.exe
                                                  PID:4180
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDcyODA5NzUzIi8-PC9hcHA-PC9yZXF1ZXN0Pg
                                            1⤵
                                            • System Location Discovery: System Language Discovery
                                            • System Network Configuration Discovery: Internet Connection Discovery
                                            PID:3676
                                          • C:\Users\Admin\AppData\Roaming\{C861201E-33A0-5580-075B-8D71AEE1E70D}\eudcedit.exe
                                            C:\Users\Admin\AppData\Roaming\{C861201E-33A0-5580-075B-8D71AEE1E70D}\eudcedit.exe
                                            1⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetThreadContext
                                            • Drops file in Windows directory
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of WriteProcessMemory
                                            PID:1968
                                            • C:\Users\Admin\AppData\Roaming\{C861201E-33A0-5580-075B-8D71AEE1E70D}\eudcedit.exe
                                              C:\Users\Admin\AppData\Roaming\{C861201E-33A0-5580-075B-8D71AEE1E70D}\eudcedit.exe
                                              2⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2120
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:1404
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:5084
                                              • C:\Windows\system32\AUDIODG.EXE
                                                C:\Windows\system32\AUDIODG.EXE 0x520 0x514
                                                1⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2664

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                19a7f42782b4e728bb12731ff9a460f6

                                                SHA1

                                                495d51f1a8fa8b55063f307f919f3bc6d67af241

                                                SHA256

                                                126eee474c67271293ded1ff06e56bab87c21c0884d22a419fb40e4bc87cacba

                                                SHA512

                                                50f21223f1b013c727b26327976f74faa11ec830f6d540eee02d728d9d7b9b617e0b48b63c7b9ebf248d818e5c65bd6e4007e2352f9f59e182c4625a28b28f0f

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                08edd5c04b02f0b7175bcda703fd0f38

                                                SHA1

                                                d4f1968dd481ea01a4023b1ad333e16115cb0e18

                                                SHA256

                                                afbae8fd296e93092ced684ac3683e56b28a3e809fe952fab4c9116995dfec09

                                                SHA512

                                                474dbd8d089b549cb68585a2657486f35b8aff0b644bceca10714077c4149b84e5d910d4fda400beca016ac83620d8627d2b0ce7cac292fda7c45f3abaea1379

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                9d5a5967f483f4f844f4d68981e0f961

                                                SHA1

                                                8969ba7b26d3c76aecc535214c27c10759679f61

                                                SHA256

                                                34384afe8e49b042296ea3043d11e3b83a2ca7314576319534ad164e5a40d00b

                                                SHA512

                                                2e07d7acd79c80deae7befdb1b0732120b0b72fd9a403b6b90dcbebbd0e4a3361c87491e7a6b6d599badcdc94e1c649f5c1caa36c0aa2cb0e2e5a08c34f3c802

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                84821a73497d55de3265f504689ce64a

                                                SHA1

                                                6eee1266fa551cd3aea1a889a799f7771e51bece

                                                SHA256

                                                e45c90c0aa8fd05cf9120e16cbd8dc025bdc447e2d6bd19520999aeddd910bae

                                                SHA512

                                                fa6697c348997072a66389d72e85b041b46fe58816865e1fc06d86f55baff4a5465801fc2b4e25b37fdef29404a5cf07c073bd9035a65ae698154f521176acfc

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                6752a1d65b201c13b62ea44016eb221f

                                                SHA1

                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                SHA256

                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                SHA512

                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                a241169991788aedb0f6b46fb7be65ee

                                                SHA1

                                                d1d6cad1d8ec2544a5b698777975bae9460f80a9

                                                SHA256

                                                bbcbd0daa8bd01c608376e910832ff1fdce894108c35d8afce1b8ef5a6e7ba99

                                                SHA512

                                                54438271cb3cab3d4840ab20cb69d4c0e882c9c978aaaf2df41f88012447024c3497d01ee83120c54feb044f61803184dc617d238ea2d11516ffd4ae43f32113

                                              • C:\Users\Admin\AppData\Local\Temp\nsb61A4.tmp\System.dll

                                                Filesize

                                                11KB

                                                MD5

                                                ca332bb753b0775d5e806e236ddcec55

                                                SHA1

                                                f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f

                                                SHA256

                                                df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d

                                                SHA512

                                                2de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00

                                              • C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.txt

                                                Filesize

                                                10KB

                                                MD5

                                                ff3a21e91a62a5301eebc946ba7c64b7

                                                SHA1

                                                8c1aa80cb6cc02e133d5621791875003bcc731a0

                                                SHA256

                                                e0d0fd1f37bc726ec9093def8f9fdf8e513d8faef48bdc07dfc266ebd94cf40f

                                                SHA512

                                                85e20c95d7c6adea9a0a22376c63454a2927e50bc5cf48ba5dae5ec57af66870a37f2aa391b99b89e395e13f678e41d098a9390f11daba1eaeebcdf4ed6c73ec

                                              • C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.url

                                                Filesize

                                                90B

                                                MD5

                                                efbcd20915477ec71504758ac2b89ef4

                                                SHA1

                                                b808a6093333e754e5bd64116b4e57184bb2a6f4

                                                SHA256

                                                c169c011effd53250f952506b06cbde514ffe0b0eb05ba8ba8487b8f9f8d6c9e

                                                SHA512

                                                c2b54f00390227d5420120ac7d965f528252d4f314d5943ce47d3ae4487172c283b2312749536f7e5367442119aadac767bbd527af33002ae131029632603e2a

                                              • C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.vbs

                                                Filesize

                                                231B

                                                MD5

                                                9d8c4bfbd009c4d6001e2125abaa8b02

                                                SHA1

                                                cd040558172b5fca5b200447a281843956243741

                                                SHA256

                                                a652297987f14317100f8c5f7eb26d1bc67eb8a64f0b39b72b5fd5046a9f29b0

                                                SHA512

                                                c4c84f43642b805a105acce9ebc9f01aa0e6ef553ea32be3f8b890fc7440f0b7d3ddf99b9336bce20ce7a3d9b9f6434a704651a8af425ffc8407ba39d5de735f

                                              • C:\Users\Admin\AppData\Roaming\24.svg

                                                Filesize

                                                1KB

                                                MD5

                                                c971329597cf88d8b5e87cf5557067d4

                                                SHA1

                                                7fc2be6bf2920d5d34c3bd7318288c4aa12c6c88

                                                SHA256

                                                e1fda58d0d4eeb62eb790f7e23594eac460db03a2d2373bfd13e94860dcf38b7

                                                SHA512

                                                045b48c780d3482bee79cecb372f36cb1e705eeda37c6130dd12dbd432bce1fcf04a9b3c68618a9c9995c29c7f93314cd8d2fc6f6c6d44ac150c556926307577

                                              • C:\Users\Admin\AppData\Roaming\3BSYBS1-DCSA_Alerts_05242015040017.xml

                                                Filesize

                                                922B

                                                MD5

                                                b327f714f4ca746733f335129136f01e

                                                SHA1

                                                9e73ebaf229d43dba61da0fba7392039d99cde0b

                                                SHA256

                                                e1fa52366cfb7518c1269a6d52de74b567a0c352a141725a7f35abca022dee1b

                                                SHA512

                                                86cd7acd2e692ddd4f07073b973b4ff18cc4d31faff54d320a8421eeb265059279f7c28a22112e23cee03e1d2cb37b9a1a329a2b21df7d89acfe9a842c320d69

                                              • C:\Users\Admin\AppData\Roaming\90msp-RKSJ-V

                                                Filesize

                                                4KB

                                                MD5

                                                2ffc46a244c8c828e352ff00ecd1998d

                                                SHA1

                                                027361be101f81885d640bdc37f1d570ae7641ae

                                                SHA256

                                                0bbdb01bac6545d87b2dc2fe5d198ff8120ef7c642a11b554a66bfe0a34e7a17

                                                SHA512

                                                d09fef8fcb254157faef211e2133184f8e6d1e4a33b0074b74fd762c8f4b1881ef1af2b839a1df9cb427c774a3be9f94f12faa7a8f25002d6b1c292f73e6657e

                                              • C:\Users\Admin\AppData\Roaming\Adobe-Japan1-1

                                                Filesize

                                                3KB

                                                MD5

                                                781ccb2bc5b2617ee1b745cfaed84147

                                                SHA1

                                                afdcb2f84a6333341615a0f4ad3a0b6b093d12ab

                                                SHA256

                                                8e5cb4e664b24787bc83420da55594088bb080a4461ae818a5ab5727d5f678bb

                                                SHA512

                                                87722978ab8fd9c26ea6cd79b177a402a73ae74fd46bf670dd324ac7b8f1ef1899017b9822eadec991958cba5a197acdf25bdfe2348157bd47a73b6b97b471ae

                                              • C:\Users\Admin\AppData\Roaming\Athens

                                                Filesize

                                                1KB

                                                MD5

                                                ad50b0f6ed4782e60822c8d1abba7363

                                                SHA1

                                                a167ba44366dd1cfd7b532a686885ec9ea1ce18c

                                                SHA256

                                                12050432abe192ad58ab204a8da8026a67c51f1d10f3cc8806751b9126873836

                                                SHA512

                                                d2a16e875126da763d4e2e5dda4a62dc4e6388f48778359726fa30976d8dd4ba9fc124f9753f8c166b304fa0d426ed8bc9c308a8fda6bdfc95674dfbfedf8d28

                                              • C:\Users\Admin\AppData\Roaming\Bangkok

                                                Filesize

                                                65B

                                                MD5

                                                e3c4113fe252d3c46dbaa35eef7f02f4

                                                SHA1

                                                265bd42d836078f774b7a6f58fb965935b78c578

                                                SHA256

                                                59ef2c2a894a1dbf1114e63e99edac386a023ae32c6ec9588951ddbe8debd676

                                                SHA512

                                                b3e54a6af4471de2ff59c2c4295e3681b13e1418017e14ed152c791e4aafe7cbb18a608b7c9a6b485d3a063bf9eb64a9b74248733e9286a83c869a12d3d17482

                                              • C:\Users\Admin\AppData\Roaming\Bangui

                                                Filesize

                                                65B

                                                MD5

                                                6dfc97c20597bdd8f62955bf1ed3a6ed

                                                SHA1

                                                137177304be17a23b467db93935347a0b9996ab8

                                                SHA256

                                                885dec56791f6ddd711930b61b2ed390066ea3b676e26a7f42681cf52277660d

                                                SHA512

                                                8c82f0bd3a69a80131f5ab0cd4b6a7d2a3698687f1d34a04ad7615be8ec990911b23749d54c039d4dfebeb2880c05f1122e6fb43adcf33d9955926c23b58560a

                                              • C:\Users\Admin\AppData\Roaming\CabDLL.dll

                                                Filesize

                                                22KB

                                                MD5

                                                abf22a87e1a591a9c3a868bd68b90c25

                                                SHA1

                                                c4554798997aa1762a7606d6ec8c8449acac6a6d

                                                SHA256

                                                c27579fc470d0e6ddd80dc010df6efb4f269d07d8881e8286717fd6b5eb5fafc

                                                SHA512

                                                781a7893bd7ae9521024e40793e31c67bb132d9b66e3de230a593be200a14d2f307e28ee684d537b74ae58c403808f099ff25a4d84b24936f01a881890d0e110

                                              • C:\Users\Admin\AppData\Roaming\Cyanotype.ahu

                                                Filesize

                                                100B

                                                MD5

                                                48d5dff58272563763841b8331e1f3a9

                                                SHA1

                                                4744d508450a84cdb940e382a849d595c93bbe60

                                                SHA256

                                                d700cdbaca0f987fae58df3a380f8d7aa54eb7241fb0ec66e98d2d5dd2a1ac2d

                                                SHA512

                                                22550cedea6c85b509df4636785e8644f88a235dd1e84df4665364d47af55cfeedb2872e3d58adde73513f9cf86520ec7c27694922b3a65bc37bc29b8965fc87

                                              • C:\Users\Admin\AppData\Roaming\EmbeddingExampleObj2PDF.png

                                                Filesize

                                                2KB

                                                MD5

                                                19a74bea22187f281d461ec524873074

                                                SHA1

                                                d1659d5793f093ea36d15567b04a19ce831b4a99

                                                SHA256

                                                b644fab6da0fcf708d0d9961eaca2a71ae485474037bb697e098f91659c43db1

                                                SHA512

                                                0584e5822d2543d2227b31f9a1bbbd18d74f80202f2d7a438f4980c93f0316abe4de4a16298e00f13646d3698705dbd74d897a1f064ee91afe2868ec22dfe2a6

                                              • C:\Users\Admin\AppData\Roaming\Fortaleza

                                                Filesize

                                                377B

                                                MD5

                                                b6e775115b2708ec3df5686e5569b0e5

                                                SHA1

                                                2b346e081509c77a44be5b8c513b401fe4462249

                                                SHA256

                                                710bca1ee537bb94ce42502053561946cbbde7bb0eee46b4939cfd771cbbdc1c

                                                SHA512

                                                29c6cd9ac77c00d0e71e3d7ac21bda53ae07921cda92d3c94c8dd72dbd987c69df3b162efa85959fb5626840f4b213ebc5ae9079951e51ce0c4ddfd113e94d96

                                              • C:\Users\Admin\AppData\Roaming\GIF 128 No Dither.irs

                                                Filesize

                                                1KB

                                                MD5

                                                1cce87ca891f858873df3581d53080db

                                                SHA1

                                                bb1f732f8dc8dcfe5674f583b76adb1acba26cd1

                                                SHA256

                                                8415d196c71520811cf5245e00fa5e94ebdec10345ec38ba5a4070f3b0d76105

                                                SHA512

                                                226923f64dcbcecb13240bdb9898bdea0f6ecc33b73c7b79fa8324c6cbe09957bca4f945765753d9017da126a974217bd6e0de1ed8c38b955800c2425f941ff7

                                              • C:\Users\Admin\AppData\Roaming\GallonBalmoral.a2C

                                                Filesize

                                                3KB

                                                MD5

                                                3208a159b7bfb1182051612c4b7ba741

                                                SHA1

                                                71fb6f812050cc9bf4a69dec19299c230cf7dc34

                                                SHA256

                                                53bf82856ce97e30b156b964b6345c62e383a4f20bc84ddaff1e4396824bcb10

                                                SHA512

                                                a2924fcf2a341cb754e7d9a85e9a8ed6e7030634a894fe84c0eb43d121fb5f4bf0540b541bc50261de008c5b7c4dcfb78fd0be2c4de3ad8f078ff75088f5cf87

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\eudcedit.lnk

                                                Filesize

                                                1KB

                                                MD5

                                                714b5ba5556a3a378f1301370f55e7b1

                                                SHA1

                                                16565507a0babb3bc2a2523354f3a991698fb6f4

                                                SHA256

                                                cc330351fa93222e3f8b1d8db800a724586388448da10b61e82d12954055d27a

                                                SHA512

                                                4409d5f45a492c115025fbba64edacfa6f80fe4e2a71045975c5ba0b350c48b581a19b141ef685b08a59cdd53eced08c25859ae954c17b24e3ea6a35cfe7e64b

                                              • C:\Users\Admin\AppData\Roaming\WearHop.9

                                                Filesize

                                                129KB

                                                MD5

                                                f580b0eaf84d48c12bd41bd69f4f9afc

                                                SHA1

                                                668af376385b795ac186f678f0bb4ed8dc26df68

                                                SHA256

                                                a57ce86f238509a59b85e8ab170466c233d80fb0f0171d32f7c6a5d1753cf5fa

                                                SHA512

                                                aa694d31935e710b5b87292a04c450b1403423dbed1ebfefd2747f144639906441e5bb813cbbd28165209b90ea3b45e7751815b0bc276d49457c8e960f2af90e

                                              • C:\Users\Admin\AppData\Roaming\accelerometer.png

                                                Filesize

                                                3KB

                                                MD5

                                                ee605850778b585f63c6382ab05e8112

                                                SHA1

                                                4463ca8edb3c221fd0bec825822d0f77b71d2e10

                                                SHA256

                                                583e9114740dd5e71aec0a4bab86d644c1856a3008d248f41502fc4368b62398

                                                SHA512

                                                ab521ba8d4b06b0d440d80a50b2439ec983a26df943021c82a9cabf931c352e11e6f8e12c5b97ffaed30ea60bf989c04fe5e96237cab6dc06241c19a4464e50b

                                              • C:\Users\Admin\AppData\Roaming\app_updater_smartbutton_normal.png

                                                Filesize

                                                2KB

                                                MD5

                                                4e7a4217392410d55c48d1dabae0cb38

                                                SHA1

                                                7173d944ffb06977e8f7b8b214ecd4142ed3b9b7

                                                SHA256

                                                aca70b5b238f37c84fa9a3b6db39d56abf120629e4ded88b5270987bc7eeaf96

                                                SHA512

                                                034b581edc5d3cc810394e8a61460c0613553f2f379c62c036659e862c27cc42d8ad6f4c366bd2133a5ea53c4ee3c748839accb6755e9f9100107e5d305665e5

                                              • C:\Users\Admin\AppData\Roaming\aw_main_header.jpg

                                                Filesize

                                                4KB

                                                MD5

                                                ccc85d0cd50498698b6884b0c01eceb5

                                                SHA1

                                                500c60fb341f8834ee26bb5ada33f22dcfffbda7

                                                SHA256

                                                e3bde6b2633f4f8f1482bd24394b70a9510df849ec912c76f7a68be867a0cb7a

                                                SHA512

                                                e4892b9d6a4d6b2008052d9a53b1ca04185f26ca710e0cab6e4bc0deaba28efba6dc3664bbe6267c0f4a2c888fed8ecc3eef19ae1e6a019ac81cac0f5d4ee893

                                              • C:\Users\Admin\AppData\Roaming\blue 072 bl 1.ADO

                                                Filesize

                                                524B

                                                MD5

                                                f149b2ba2027e4023f5c77af4c3a87a0

                                                SHA1

                                                b345e170c51b10af093984932eea53f4ae73d106

                                                SHA256

                                                b7d7d04467e439cacd5d52d515b8d3d75ea9d27370808da0b6bc1d3f641be5ea

                                                SHA512

                                                55703f521c008e8c9da345493584568f923acda7f34b831ef8c51a8247a9d1cd3fa8065d061ed796d60e456d7141c88555bba8cea61e6d3c230576f9d6f21f9e

                                              • C:\Users\Admin\AppData\Roaming\btn-back-static.png

                                                Filesize

                                                3KB

                                                MD5

                                                81e9e2761a1abaa59f61881664ce5a88

                                                SHA1

                                                049529b80a5bb5b7ab4e1b3e7c519bd4a833243f

                                                SHA256

                                                5aefe8f5e8ef8c6d9b68ddd22b530b0971c867d3d48bc30a5269ceaf2274901a

                                                SHA512

                                                62d773f2ee5678e978c4bfb249f3b043c9c777eb45a6d9891e27eb7ab80f1c2bc05993329a3f88c1370f19d31819471a32e27db116b9f7a19d70690b6e6d0179

                                              • C:\Users\Admin\AppData\Roaming\caution.png

                                                Filesize

                                                887B

                                                MD5

                                                c81b5317d4908545f44864fce61f1851

                                                SHA1

                                                2845725264796608d781187d95d7d41ab872dea5

                                                SHA256

                                                e9faf89885257ccdf9b9cdea3c4104079977d43d907fd948f4c1526aee0c923a

                                                SHA512

                                                f1cfa4d3aaa99bfcd51fd39314b75547e5ba26df5daf3ca432d95941e42099b5e429367ee80caae0f4e00ce5a62a4e5c4eea9e7b4deddc82c68ba7fe382a51e8

                                              • C:\Users\Admin\AppData\Roaming\computer_diagnostics_2.png

                                                Filesize

                                                1KB

                                                MD5

                                                671026e8f81a523575b346275f619ea7

                                                SHA1

                                                974512f4dbd74248120922478d01ffba73ce44ea

                                                SHA256

                                                ff9bd1b23341b5ef229ce7b706842db6b2f6691fc5f7df31ba49b13e0c26d3d7

                                                SHA512

                                                bc8a89eff659242a8af09003c99bf1f469123e35612cf48215dae1f53680bad4f438764d230c6f2c9f3da21831706fa82f1b6843edb52b2cbc0fc25801b93eef

                                              • C:\Users\Admin\AppData\Roaming\cpu.png

                                                Filesize

                                                4KB

                                                MD5

                                                21ddceeb0c385676eb35365c4ff1d24d

                                                SHA1

                                                9cbcd87590720bf2ce80304d0b298fbb44cb61e3

                                                SHA256

                                                82a9d562fac82452d5a767c2d0355e2e8f2d8550b62091522ab3985f6ec7ed0f

                                                SHA512

                                                15e115831e4ba38e8d73044cf50de8f8777faba3d1d099dc5eaba7af53ff87cb7c752f708b25aee35e1a416cac9debcf4f94e85d45a58ab109ac45d435c22840

                                              • C:\Users\Admin\AppData\Roaming\dingbat.font.family.xml

                                                Filesize

                                                1KB

                                                MD5

                                                ca0b373b889e605d1b85dde93f301e63

                                                SHA1

                                                a72b53f9f77f979bde20247b331b1809b58e1cba

                                                SHA256

                                                7e1958d6db091553d31366647375ddf1b9a3a747dfbbeb067b51d3b04be97f6f

                                                SHA512

                                                4adeaabb6f75859d686d88089b3be8ebe81a973aaf73fa28571961599f70143f356460ec4e10054c8864f0a15418ab1797f0418a4bbe16e68f6ae8cec7d37944

                                              • C:\Users\Admin\AppData\Roaming\draft.watermark.image.xml

                                                Filesize

                                                967B

                                                MD5

                                                81a14090a89ea84f314bb42c45978088

                                                SHA1

                                                6eed3a6053cb148bda8bc91997fc72217d53b24a

                                                SHA256

                                                b33347a75bba19d1832ac914dae86097b9485ff3d64c33741522c7f28c349c39

                                                SHA512

                                                00b77fd31a1cdb04adb57db4dbe15e2640f0ba411667378fed197ecc49d2af86e23b37cfb99b1006fca177ddd7362cf5cce0c5ec8646d63c10dbb4a22b846525

                                              • C:\Users\Admin\AppData\Roaming\excel.csv

                                                Filesize

                                                1KB

                                                MD5

                                                802d14c8b7994818f8da8d3c16ceca0c

                                                SHA1

                                                9405d119653f03bbdf9a12df89e66476b26810d6

                                                SHA256

                                                739a7e4c197fc12287217eab7e52ed30a2b50cff7ac1905bfa62e4ded8d37b35

                                                SHA512

                                                0889bdedfb4cf54eb2bb1eb3be6398d9c7bdbbc6b005522a7487c99c70908ee2cb9b954a523f16693ead2dc932028c051088faca1a6a56d89a0a764047da29ff

                                              • C:\Users\Admin\AppData\Roaming\f13.png

                                                Filesize

                                                1KB

                                                MD5

                                                80b1c409a323cd8dcab67dc9c60e1e99

                                                SHA1

                                                b49eb838cfc8d6ff86dacea72214b9b8449afd23

                                                SHA256

                                                eac261c67395603917c6e5a1ee8b9787897d027c7c31b6ede2568eb15c1ee214

                                                SHA512

                                                505eed0c9fceb7bed7f5cb11b41363ddb55eeb232a54a0e803007c8968fd84fdcf3c721d4ef541dc41696eab1d1de6de8bafdcc2667dacdb76aa4600f8452ab7

                                              • C:\Users\Admin\AppData\Roaming\footer.hr.xml

                                                Filesize

                                                881B

                                                MD5

                                                e586476b3a6efc0756e821207fa287c1

                                                SHA1

                                                b146c212391eda28e0d7325ebb2c79d357023ef6

                                                SHA256

                                                4fb548b7299ec5169152b442f494e458298e3897c98f29a48145768b40d07bb9

                                                SHA512

                                                f4866ac94712bd47f187df835ebfe5543e55d8879c305715ceaab47b2bc08fdce658b6e24f59ed82a78ca8ff4bdb13f63475a8a1e030a8ec97326f1f719dcf3a

                                              • C:\Users\Admin\AppData\Roaming\formal.object.properties.xml

                                                Filesize

                                                1KB

                                                MD5

                                                8caf19a4defdf0503c9586e272e88b3d

                                                SHA1

                                                7448169d23bce710bb687eaf10da08119bfe7ac2

                                                SHA256

                                                77ce6bd5a30454e48f216d504f592f84d18fe59d0b52cd89787b4cdb06420be8

                                                SHA512

                                                d4c5dc1eaed5fa90cc0d2c269bab99bb55f25eaa81cd7a5a894745b8ee349fc4e9db837072800ce3fec6f16d794e4e11f336c488bbbc0c5f011176ee705e626a

                                              • C:\Users\Admin\AppData\Roaming\{C861201E-33A0-5580-075B-8D71AEE1E70D}\eudcedit.exe

                                                Filesize

                                                244KB

                                                MD5

                                                0c8d0933037436b674f2b8478ec5baba

                                                SHA1

                                                e8a7034c43d84b18fb93dc02e8a0b818a645ece1

                                                SHA256

                                                2d89f1c873f9c04f773f309eb3b6a8ed32881868bfab3f4273f7e9c2db322fc1

                                                SHA512

                                                305050c391f443007e3f6e2e4ec60997da69db406b6d85efd19ed9f71683dbc9697280307867237b24034ebe9d99e8f249fc5fc75cb5bfe55721c283261ab144

                                              • C:\Users\Admin\Downloads\# DECRYPT MY FILES #.html

                                                Filesize

                                                12KB

                                                MD5

                                                b8716caba5407aabf8d98d2d31a57bcc

                                                SHA1

                                                8320281aa17ebc234bf92d1864c6be5ab04a1d0a

                                                SHA256

                                                b983256011f742a14dba9b89e7b2c6c3c354b3e925dea02e482a65b5189a0872

                                                SHA512

                                                684473a0d990b780bd832716bec8b74dc9a7f8a7c159b6d4e49ff74e192ce59bce35c9c42072f4b24853227891c287908fd8c97405130a3fa106fe7ceeea3547

                                              • memory/1968-194-0x0000000002190000-0x000000000219E000-memory.dmp

                                                Filesize

                                                56KB

                                              • memory/2084-445-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-451-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-130-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-129-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-472-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-476-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-201-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-202-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-204-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-124-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-483-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-123-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-121-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-203-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-448-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-131-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-455-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-459-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-442-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-439-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-480-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2084-469-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2120-198-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2120-197-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/2348-119-0x00000000021C0000-0x00000000021CE000-memory.dmp

                                                Filesize

                                                56KB

                                              • memory/4008-37-0x0000000002720000-0x000000000272E000-memory.dmp

                                                Filesize

                                                56KB

                                              • memory/4984-50-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/4984-43-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/4984-42-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/4984-41-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/4984-40-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/4984-36-0x0000000000400000-0x0000000000424000-memory.dmp

                                                Filesize

                                                144KB