Analysis

  • max time kernel
    232s
  • max time network
    264s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2025, 22:51

General

  • Target

    RNSM00267.7z

  • Size

    13.2MB

  • MD5

    5f3189f2d9671cc1effb61e909f5a331

  • SHA1

    711a6e17e44e2e064fe949b9242217c6b9a9dcb4

  • SHA256

    4a18db0e1412b7a0d521cac3cbe4c70be2e5f802175fc54ac1925140a765fa51

  • SHA512

    3006b84be4bce9f404585cce712a4172e5c7a9928a424b82c86c9bb9a53defa9c46ce01d439adefe0afa6e1516a233d99821dba25c4ebfb6f01e0a62a802362f

  • SSDEEP

    393216:g0fPRzH47pC2/+55Lch5v6JJpRy96LSKW:DfP+7ptMdc+JJC96LSB

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\restore_files_xyhek.txt

Ransom Note
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! What happened to your files ? All of your files were protected by a strong encryption with RSA-2048. More information about the encryption keys using RSA-2048 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) What does this mean ? This means that the structure and data within your files have been irrevocably changed, you will not be able to work with them, read them or see them, it is the same thing as losing them forever, but with our help, you can restore them. How did this happen ? Especially for you, on our server was generated the secret key pair RSA-2048 - public and private. All your files were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of your files is only possible with the help of the private key and decrypt program, which is on our secret server. What do I do ? Alas, if you do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed. If you really value your data, then we suggest you do not waste valuable time searching for other solutions because they do not exist. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://rtldkdh6.kghw88gh3eu.net/C1DF407750252A9 2. http://jsdf2wevw2.wrt23wqw34.net/C1DF407750252A9 3. https://7vhbukzxypxh3xfy.onion.to/C1DF407750252A9 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization. 3. Type in the address bar: 7vhbukzxypxh3xfy.onion/C1DF407750252A9 4. Follow the instructions on the site. IMPORTANT INFORMATION: Your personal pages: http://rtldkdh6.kghw88gh3eu.net/C1DF407750252A9 http://jsdf2wevw2.wrt23wqw34.net/C1DF407750252A9 https://7vhbukzxypxh3xfy.onion.to/C1DF407750252A9 Your personal page (using TOR): 7vhbukzxypxh3xfy.onion/C1DF407750252A9 Your personal identification number (if you open the site (or TOR 's) directly): C1DF407750252A9
URLs

http://rtldkdh6.kghw88gh3eu.net/C1DF407750252A9

http://jsdf2wevw2.wrt23wqw34.net/C1DF407750252A9

https://7vhbukzxypxh3xfy.onion.to/C1DF407750252A9

http://7vhbukzxypxh3xfy.onion/C1DF407750252A9

Extracted

Family

gozi

Extracted

Path

C:\Program Files\7-Zip\Lang\Recovery+xangx.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/BB63E344C138CEDB 2. http://kkd47eh4hdjshb5t.angortra.at/BB63E344C138CEDB 3. http://ytrest84y5i456hghadefdsd.pontogrot.com/BB63E344C138CEDB If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/BB63E344C138CEDB 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://tt54rfdjhb34rfbnknaerg.milerteddy.com/BB63E344C138CEDB http://kkd47eh4hdjshb5t.angortra.at/BB63E344C138CEDB http://ytrest84y5i456hghadefdsd.pontogrot.com/BB63E344C138CEDB *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/BB63E344C138CEDB
URLs

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/BB63E344C138CEDB

http://kkd47eh4hdjshb5t.angortra.at/BB63E344C138CEDB

http://ytrest84y5i456hghadefdsd.pontogrot.com/BB63E344C138CEDB

http://xlowfznrg4wf7dli.ONION/BB63E344C138CEDB

Extracted

Path

C:\Users\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #CerberRansomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Ransomware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E1 | | 2. http://cerberhhyed5frqa.xo59ok.win/3CBF-BA67-308C-0291-29E1 | | 3. http://cerberhhyed5frqa.zx34jk.win/3CBF-BA67-308C-0291-29E1 | | 4. http://cerberhhyed5frqa.rt4e34.win/3CBF-BA67-308C-0291-29E1 | | 5. http://cerberhhyed5frqa.as13fd.win/3CBF-BA67-308C-0291-29E1 |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E1); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E1 appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E1); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/3CBF-BA67-308C-0291-29E1 | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E1

http://cerberhhyed5frqa.xo59ok.win/3CBF-BA67-308C-0291-29E1

http://cerberhhyed5frqa.zx34jk.win/3CBF-BA67-308C-0291-29E1

http://cerberhhyed5frqa.rt4e34.win/3CBF-BA67-308C-0291-29E1

http://cerberhhyed5frqa.as13fd.win/3CBF-BA67-308C-0291-29E1

http://cerberhhyed5frqa.onion/3CBF-BA67-308C-0291-29E1

Extracted

Path

C:\Users\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber Ransomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #CerberRansomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Ransomware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E1" target="_blank">http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E1</a></li> <li><a href="http://cerberhhyed5frqa.xo59ok.win/3CBF-BA67-308C-0291-29E1" target="_blank">http://cerberhhyed5frqa.xo59ok.win/3CBF-BA67-308C-0291-29E1</a></li> <li><a href="http://cerberhhyed5frqa.zx34jk.win/3CBF-BA67-308C-0291-29E1" target="_blank">http://cerberhhyed5frqa.zx34jk.win/3CBF-BA67-308C-0291-29E1</a></li> <li><a href="http://cerberhhyed5frqa.rt4e34.win/3CBF-BA67-308C-0291-29E1" target="_blank">http://cerberhhyed5frqa.rt4e34.win/3CBF-BA67-308C-0291-29E1</a></li> <li><a href="http://cerberhhyed5frqa.as13fd.win/3CBF-BA67-308C-0291-29E1" target="_blank">http://cerberhhyed5frqa.as13fd.win/3CBF-BA67-308C-0291-29E1</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E1" target="_blank">http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E1</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E1" target="_blank">http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E1</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E1" target="_blank">http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E1</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/3CBF-BA67-308C-0291-29E1</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Cerber family
  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Gozi family
  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Contacts a large (16429) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (2734) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Renames multiple (883) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 11 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 21 IoCs
  • Executes dropped EXE 47 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 24 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Looks up external IP address via web service 7 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 24 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 10 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 54 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Interacts with shadow copies 3 TTPs 5 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 7 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 27 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3508
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00267.7z"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1792
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3160
      • C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe
        Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1404
        • C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe
          Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:4476
          • C:\Windows\SysWOW64\explorer.exe
            "C:\Windows\system32\explorer.exe"
            5⤵
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer Phishing Filter
            PID:1824
            • C:\Windows\SYSTEM32\vssadmin.exe
              vssadmin.exe Delete Shadows /All /Quiet
              6⤵
              • Interacts with shadow copies
              PID:6228
      • C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe
        Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:960
        • C:\Users\Admin\AppData\Roaming\Rutube\python\pythonw.exe
          "C:\Users\Admin\AppData\Roaming\Rutube\python\pythonw.exe" "C:\Users\Admin\AppData\Roaming\Rutube\launcher.py" 28800000
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:4444
      • C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe
        Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:4252
        • C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe
          Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer Phishing Filter
          PID:1628
          • C:\Windows\SYSTEM32\vssadmin.exe
            vssadmin.exe Delete Shadows /All /Quiet
            5⤵
            • Interacts with shadow copies
            PID:7704
      • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe
        Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:4088
        • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe
          "C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe"
          4⤵
          • Checks BIOS information in registry
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks SCSI registry key(s)
          PID:312
      • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exe
        Trojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:468
        • C:\Users\Admin\AppData\Roaming\vcwxqo.exe
          C:\Users\Admin\AppData\Roaming\vcwxqo.exe
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: RenamesItself
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:5208
          • C:\Windows\System32\vssadmin.exe
            "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
            5⤵
            • Interacts with shadow copies
            PID:5556
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RESTORE_FILES.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:6460
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RESTORE_FILES.HTML
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            PID:1640
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb09f46f8,0x7ffbb09f4708,0x7ffbb09f4718
              6⤵
                PID:6440
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:2
                6⤵
                  PID:7356
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:3
                  6⤵
                    PID:4940
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:8
                    6⤵
                      PID:6060
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:1
                      6⤵
                        PID:3868
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:1
                        6⤵
                          PID:4404
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:8
                          6⤵
                            PID:1892
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:8
                            6⤵
                              PID:2520
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:1
                              6⤵
                                PID:4172
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:1
                                6⤵
                                  PID:7388
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:1
                                  6⤵
                                    PID:7764
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:1
                                    6⤵
                                      PID:4976
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2272 /prefetch:1
                                      6⤵
                                        PID:4512
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2996 /prefetch:1
                                        6⤵
                                          PID:6532
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:1
                                          6⤵
                                            PID:5140
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2272 /prefetch:1
                                            6⤵
                                              PID:6304
                                          • C:\Windows\System32\vssadmin.exe
                                            "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
                                            5⤵
                                            • Interacts with shadow copies
                                            PID:7828
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Roaming\vcwxqo.exe >> NUL
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:7520
                                            • C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe
                                              "C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of SetWindowsHookEx
                                              PID:8120
                                              • C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe
                                                "C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"
                                                7⤵
                                                • Executes dropped EXE
                                                PID:7048
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\Desktop\00268\TR4C0D~1.EXE >> NUL
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3996
                                      • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe
                                        Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe
                                        3⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        • System Location Discovery: System Language Discovery
                                        PID:816
                                        • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe
                                          Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe
                                          4⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:7004
                                          • C:\Windows\kubkyobqskdy.exe
                                            C:\Windows\kubkyobqskdy.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            • System Location Discovery: System Language Discovery
                                            PID:7256
                                            • C:\Windows\kubkyobqskdy.exe
                                              C:\Windows\kubkyobqskdy.exe
                                              6⤵
                                              • Checks computer location settings
                                              • Drops startup file
                                              • Executes dropped EXE
                                              • Adds Run key to start application
                                              • Drops file in Program Files directory
                                              • System Location Discovery: System Language Discovery
                                              • Modifies registry class
                                              • System policy modification
                                              PID:7668
                                              • C:\Windows\System32\wbem\WMIC.exe
                                                "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
                                                7⤵
                                                  PID:7468
                                                • C:\Windows\SysWOW64\NOTEPAD.EXE
                                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
                                                  7⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Opens file in notepad (likely ransom note)
                                                  PID:1748
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
                                                  7⤵
                                                  • Enumerates system info in registry
                                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                  PID:6780
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb09f46f8,0x7ffbb09f4708,0x7ffbb09f4718
                                                    8⤵
                                                      PID:3968
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10199555960520990209,15182328216820311529,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2
                                                      8⤵
                                                        PID:6624
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,10199555960520990209,15182328216820311529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:3
                                                        8⤵
                                                          PID:5500
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,10199555960520990209,15182328216820311529,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:8
                                                          8⤵
                                                            PID:6612
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10199555960520990209,15182328216820311529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
                                                            8⤵
                                                              PID:3212
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10199555960520990209,15182328216820311529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
                                                              8⤵
                                                                PID:1940
                                                            • C:\Windows\System32\wbem\WMIC.exe
                                                              "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
                                                              7⤵
                                                                PID:5804
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\KUBKYO~1.EXE
                                                                7⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:7692
                                                                • C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe
                                                                  "C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"
                                                                  8⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetThreadContext
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:6972
                                                                  • C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe
                                                                    "C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"
                                                                    9⤵
                                                                    • Executes dropped EXE
                                                                    PID:7528
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00268\TR539E~1.EXE
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:7384
                                                            • C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe
                                                              "C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1156
                                                              • C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe
                                                                "C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"
                                                                7⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:8188
                                                      • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Blocker.gdri-2f3409bb36d5411d1a02ebd189c305e2b20f744c204f15eef9be459ec398448b.exe
                                                        Trojan-Ransom.Win32.Blocker.gdri-2f3409bb36d5411d1a02ebd189c305e2b20f744c204f15eef9be459ec398448b.exe
                                                        3⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1528
                                                        • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                          4⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4716
                                                          • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4652
                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                              dw20.exe -x -s 916
                                                              6⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Checks processor information in registry
                                                              • Enumerates system info in registry
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:4388
                                                          • C:\Users\Admin\AppData\Local\Temp\taskmgr.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"
                                                            5⤵
                                                            • Executes dropped EXE
                                                            PID:1212
                                                          • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5624
                                                      • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Blocker.jouu-1a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b.exe
                                                        Trojan-Ransom.Win32.Blocker.jouu-1a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b.exe
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        • System Location Discovery: System Language Discovery
                                                        • Checks processor information in registry
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2200
                                                      • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Cryakl.anq-f24b74c9ab283b89c0a173092c5fe869651eccae96b6c7df628b958a31363ff5.exe
                                                        Trojan-Ransom.Win32.Cryakl.anq-f24b74c9ab283b89c0a173092c5fe869651eccae96b6c7df628b958a31363ff5.exe
                                                        3⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:5988
                                                        • C:\Program Files (x86)\Compressed data archive\Info o dogovore\service.exe
                                                          "C:\Program Files (x86)\Compressed data archive\Info o dogovore\service.exe"
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetThreadContext
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2884
                                                          • C:\Program Files (x86)\Compressed data archive\Info o dogovore\service.exe
                                                            "C:\Program Files (x86)\Compressed data archive\Info o dogovore\service.exe"
                                                            5⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:7332
                                                            • C:\Users\Admin\AppData\Local\Temp\service.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\service.exe"
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3648
                                                              • C:\Users\Admin\AppData\Local\Temp\service.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\service.exe"
                                                                7⤵
                                                                • Checks computer location settings
                                                                • Drops startup file
                                                                • Executes dropped EXE
                                                                • Adds Run key to start application
                                                                • Sets desktop wallpaper using registry
                                                                • Drops file in Program Files directory
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies Control Panel
                                                                PID:5140
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IQGIA.bat" "
                                                                  8⤵
                                                                    PID:8076
                                                        • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Foreign.giny-ff20937831ae585f931be8aebb0cf4cb4e56b20023310bb99f1b48b0ec75c945.exe
                                                          Trojan-Ransom.Win32.Foreign.giny-ff20937831ae585f931be8aebb0cf4cb4e56b20023310bb99f1b48b0ec75c945.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4748
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 484
                                                            4⤵
                                                            • Program crash
                                                            PID:3628
                                                        • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exe
                                                          Trojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exe
                                                          3⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops file in Windows directory
                                                          • System Location Discovery: System Language Discovery
                                                          • Checks SCSI registry key(s)
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of SendNotifyMessage
                                                          PID:3584
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BDBE\5EDF.bat" "C:\Users\Admin\AppData\Roaming\batmview\AppEmuid.exe" "C:\Users\Admin\Desktop\00268\TRA5DC~1.EXE""
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:6876
                                                            • C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe
                                                              "C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:7404
                                                              • C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe
                                                                "C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:4872
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /C ""C:\Users\Admin\AppData\Roaming\batmview\AppEmuid.exe" "C:\Users\Admin\Desktop\00268\TRA5DC~1.EXE""
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5632
                                                              • C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe
                                                                "C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetThreadContext
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:5460
                                                                • C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe
                                                                  "C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"
                                                                  7⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:8056
                                                              • C:\Users\Admin\AppData\Roaming\batmview\AppEmuid.exe
                                                                "C:\Users\Admin\AppData\Roaming\batmview\AppEmuid.exe" "C:\Users\Admin\Desktop\00268\TRA5DC~1.EXE"
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetThreadContext
                                                                • Drops file in Windows directory
                                                                • System Location Discovery: System Language Discovery
                                                                • Checks SCSI registry key(s)
                                                                • Suspicious behavior: MapViewOfSection
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:6856
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe
                                                                  7⤵
                                                                  • Suspicious use of SetThreadContext
                                                                  • Suspicious behavior: MapViewOfSection
                                                                  PID:2088
                                                        • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Locky.yr-3c0cf985f5fc5089419a8c5e29759466c96205ab6534140aad4e245acb5c920d.exe
                                                          Trojan-Ransom.Win32.Locky.yr-3c0cf985f5fc5089419a8c5e29759466c96205ab6534140aad4e245acb5c920d.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5380
                                                        • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exe
                                                          Trojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exe
                                                          3⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:320
                                                        • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Purga.p-d59a1c9544e90afd7e70fdce1d8d7f72025143c5d2a2b85d6537dedfe4c0fe73.exe
                                                          Trojan-Ransom.Win32.Purga.p-d59a1c9544e90afd7e70fdce1d8d7f72025143c5d2a2b85d6537dedfe4c0fe73.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3468
                                                        • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Shade.yn-be2dc8d21f6ce018142769dda8d77b63a526ca77dbc4198635a160aa527f7ef9.exe
                                                          Trojan-Ransom.Win32.Shade.yn-be2dc8d21f6ce018142769dda8d77b63a526ca77dbc4198635a160aa527f7ef9.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5176
                                                        • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe
                                                          Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetThreadContext
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:5920
                                                          • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe
                                                            Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe
                                                            4⤵
                                                            • Adds policy Run key to start application
                                                            • Drops startup file
                                                            • Executes dropped EXE
                                                            • Adds Run key to start application
                                                            • System Location Discovery: System Language Discovery
                                                            • Modifies Control Panel
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:7908
                                                            • C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe
                                                              "C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:7956
                                                              • C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe
                                                                "C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"
                                                                6⤵
                                                                • Adds policy Run key to start application
                                                                • Checks computer location settings
                                                                • Drops startup file
                                                                • Executes dropped EXE
                                                                • Adds Run key to start application
                                                                • Sets desktop wallpaper using registry
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies Control Panel
                                                                • Modifies registry class
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:7816
                                                                • C:\Windows\system32\vssadmin.exe
                                                                  "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
                                                                  7⤵
                                                                  • Interacts with shadow copies
                                                                  PID:7056
                                                                • C:\Windows\system32\wbem\wmic.exe
                                                                  "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
                                                                  7⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:4936
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
                                                                  7⤵
                                                                    PID:5864
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb09f46f8,0x7ffbb09f4708,0x7ffbb09f4718
                                                                      8⤵
                                                                        PID:1128
                                                                    • C:\Windows\system32\NOTEPAD.EXE
                                                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
                                                                      7⤵
                                                                        PID:7348
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E1
                                                                        7⤵
                                                                          PID:6736
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb09f46f8,0x7ffbb09f4708,0x7ffbb09f4718
                                                                            8⤵
                                                                              PID:6020
                                                                          • C:\Windows\System32\WScript.exe
                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
                                                                            7⤵
                                                                              PID:3000
                                                                            • C:\Windows\system32\cmd.exe
                                                                              /d /c taskkill /t /f /im "verifiergui.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe" > NUL
                                                                              7⤵
                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                              PID:8020
                                                                              • C:\Windows\system32\taskkill.exe
                                                                                taskkill /t /f /im "verifiergui.exe"
                                                                                8⤵
                                                                                • Kills process with taskkill
                                                                                PID:7020
                                                                              • C:\Windows\system32\PING.EXE
                                                                                ping -n 1 127.0.0.1
                                                                                8⤵
                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                • Runs ping.exe
                                                                                PID:4156
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          /d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe" > NUL
                                                                          5⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                          PID:7980
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe"
                                                                            6⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:7024
                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                            ping -n 1 127.0.0.1
                                                                            6⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                            • Runs ping.exe
                                                                            PID:7500
                                                                    • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Zerber.pfu-72548d588dd3ed6f21f17d16b41913a513f4bd9d5a151d2fa4bbb6070ed85d7f.exe
                                                                      Trojan-Ransom.Win32.Zerber.pfu-72548d588dd3ed6f21f17d16b41913a513f4bd9d5a151d2fa4bbb6070ed85d7f.exe
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3836
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 240
                                                                        4⤵
                                                                        • Program crash
                                                                        PID:7792
                                                                  • C:\Windows\system32\taskmgr.exe
                                                                    "C:\Windows\system32\taskmgr.exe" /4
                                                                    2⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    • Suspicious use of FindShellTrayWindow
                                                                    • Suspicious use of SendNotifyMessage
                                                                    PID:5888
                                                                  • C:\Windows\system32\taskmgr.exe
                                                                    "C:\Windows\system32\taskmgr.exe" /4
                                                                    2⤵
                                                                    • Suspicious use of FindShellTrayWindow
                                                                    • Suspicious use of SendNotifyMessage
                                                                    PID:6328
                                                                  • C:\Windows\system32\taskmgr.exe
                                                                    "C:\Windows\system32\taskmgr.exe" /4
                                                                    2⤵
                                                                      PID:4932
                                                                    • C:\Windows\system32\taskmgr.exe
                                                                      "C:\Windows\system32\taskmgr.exe" /4
                                                                      2⤵
                                                                      • Drops startup file
                                                                      • Checks SCSI registry key(s)
                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                      PID:7424
                                                                    • C:\Windows\system32\mspaint.exe
                                                                      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\RECOVERY.png" /ForceBootstrapPaint3D
                                                                      2⤵
                                                                        PID:2852
                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                      1⤵
                                                                        PID:4052
                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                        1⤵
                                                                          PID:4212
                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                          1⤵
                                                                            PID:4440
                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                            1⤵
                                                                            • Modifies registry class
                                                                            PID:1216
                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                            1⤵
                                                                              PID:4544
                                                                            • C:\Windows\System32\rundll32.exe
                                                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                              1⤵
                                                                                PID:1152
                                                                              • C:\Windows\System32\svchost.exe
                                                                                C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
                                                                                1⤵
                                                                                  PID:5592
                                                                                • C:\Windows\system32\vssvc.exe
                                                                                  C:\Windows\system32\vssvc.exe
                                                                                  1⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:5560
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4748 -ip 4748
                                                                                  1⤵
                                                                                    PID:6004
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3836 -ip 3836
                                                                                    1⤵
                                                                                      PID:3696
                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                      1⤵
                                                                                        PID:5176
                                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                        1⤵
                                                                                          PID:7352
                                                                                        • C:\Windows\system32\AUDIODG.EXE
                                                                                          C:\Windows\system32\AUDIODG.EXE 0x30c 0x244
                                                                                          1⤵
                                                                                            PID:5856
                                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                            1⤵
                                                                                              PID:7036
                                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                              1⤵
                                                                                                PID:7996
                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
                                                                                                1⤵
                                                                                                  PID:5280
                                                                                                • C:\Windows\system32\OpenWith.exe
                                                                                                  C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                  1⤵
                                                                                                    PID:7276

                                                                                                  Network

                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                  Replay Monitor

                                                                                                  Loading Replay Monitor...

                                                                                                  Downloads

                                                                                                  • C:\$Recycle.Bin\README.txt

                                                                                                    Filesize

                                                                                                    101B

                                                                                                    MD5

                                                                                                    32d027cbc79f0ca8a00137735910608c

                                                                                                    SHA1

                                                                                                    75ca897c8a90fbb82aa287b32e31bffa6c5db9f7

                                                                                                    SHA256

                                                                                                    a53da51349ca3a073b76b5daecb03bc6d81ccf250b11c3772c9c69f3563a42bb

                                                                                                    SHA512

                                                                                                    0005862023794ad6979058f3d8a7d234b0b05e5eef5cc829d0e74b0b5b2fe3747e13b34d68333b13ae32b9e1655aca9a5ce5afba797fe3117ab57308750ae1e0

                                                                                                  • C:\PerfLogs\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    1f8dfc1cc8b19a64a0367b7d4626cb15

                                                                                                    SHA1

                                                                                                    abe4fce46a1e177e1c06d621638e6d547c1cc28d

                                                                                                    SHA256

                                                                                                    a6bf4025bd90bdf5421528da34593cbe7ab625fc25b07fef43da95cadfb3d15f

                                                                                                    SHA512

                                                                                                    9307bfe13aa8537d0809035f523a1c67e72f7a81c159accad295c25216a1db312b93dec5425437c5b7ee30bc82e844010383fffcb90c95ba09cd9d9aac5e6c17

                                                                                                  • C:\Program Files (x86)\Compressed data archive\Info o dogovore\service.exe

                                                                                                    Filesize

                                                                                                    319KB

                                                                                                    MD5

                                                                                                    6381adb801d76d076b3ad4b55e3b4757

                                                                                                    SHA1

                                                                                                    b1cbbb309ec24fa075dc90c66057cb77dfa5bb4f

                                                                                                    SHA256

                                                                                                    ad2c8e4a1d5ee164d06db4a516163c3ec90654b3658480ccc39542d1f4b9ed60

                                                                                                    SHA512

                                                                                                    de350e86c73ed6c2efb7b77e03d19f998c63014bf1e75d2cbd5e14422ceb18dc8c3a22b35f88706a2ae88cb4203b72c38563d723012c72631adf9bcd373d657e

                                                                                                  • C:\Program Files\7-Zip\Lang\Recovery+xangx.html

                                                                                                    Filesize

                                                                                                    9KB

                                                                                                    MD5

                                                                                                    b7e48c9b9cadd54df7c77ff512ea52b6

                                                                                                    SHA1

                                                                                                    9ae9208ea874790b8cd09d212791f02ac3454916

                                                                                                    SHA256

                                                                                                    76ff611cc007723d179356ac426160863a74610818203b8fdb7ac1ca7a952c8c

                                                                                                    SHA512

                                                                                                    c779a756a0e9d9655a14ff883bc54df68938d31ccf814a958b71fdcc685e3cfee679684c08b4f34a28d422fde7d81b943e9b8fd5ace8e4895bfcd9fbb4f2e425

                                                                                                  • C:\Program Files\7-Zip\Lang\Recovery+xangx.png

                                                                                                    Filesize

                                                                                                    63KB

                                                                                                    MD5

                                                                                                    889a18e779a123badc56183e2ca93e9e

                                                                                                    SHA1

                                                                                                    c8e182ff03bcfd7544bc908d28f1fe537b37f09e

                                                                                                    SHA256

                                                                                                    76155b561a3a46c695fd192c7555eec1ba097da69bd4d9d8b874cff9c44232ac

                                                                                                    SHA512

                                                                                                    fc41dbf9daa54ee72cb570e6aa75de73453df2d2c43b08f22f404052abfd8ef688c89dc4da03fe19483ec7d1a36475e7e69a3e2e05bbf8ea9f8da0dd899302ab

                                                                                                  • C:\Program Files\7-Zip\Lang\Recovery+xangx.txt

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    31c123567fd0e3e3d7fcc2500326e505

                                                                                                    SHA1

                                                                                                    6d4c1ed96c4da43e9f5928bec4408fe60e7a3cc2

                                                                                                    SHA256

                                                                                                    d5b3c7cb499dbbcc02d634eccc212a433c7b65507b078b46156b35e31e53d750

                                                                                                    SHA512

                                                                                                    dabf05e0a396046139b9fb3e6eb40c11fc4e026c32e9ff9f3739db75dd1477775dd344fd8af7e2bf40e560d3f99dd8ad70c0848d7a9eea98c60b446b990bdb07

                                                                                                  • C:\Program Files\7-Zip\Lang\restore_files_xyhek.html

                                                                                                    Filesize

                                                                                                    5KB

                                                                                                    MD5

                                                                                                    ed2069891e24261c369fb951b462040c

                                                                                                    SHA1

                                                                                                    bc66bdc570a86b6d180d9bcd417cef144a491b94

                                                                                                    SHA256

                                                                                                    80c7012dd47bc1bc38d82a69dcdd38ed1c67e9584ba411276a97e325df76ba69

                                                                                                    SHA512

                                                                                                    9a24690e970c5d5c7316a1e4b5e1eae8d95b791d7aabe602fbbe49dc53e70d1e821643dd7618357ba967c5d661d6f4aac43feeeba23cde52a8c9cd4a70f811f8

                                                                                                  • C:\Program Files\7-Zip\Lang\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    18f6dc6e02d8d80777b49e593bf0750a

                                                                                                    SHA1

                                                                                                    154a39d1afadf650c28dd2b04cf863870fb06e01

                                                                                                    SHA256

                                                                                                    0f54b78f757371ec29d28c0c75af799f22bd01e6e22aff1ee5e43a3f6bf92be9

                                                                                                    SHA512

                                                                                                    6b38732684de0e4f4bea7cd78423bc89011c87471e62da25f4ea62e5fda03edcb989013ff2b92c7b1254c8e418f0ced7103cdcd8db2fccfbe31b887788a37ef5

                                                                                                  • C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\README.txt

                                                                                                    Filesize

                                                                                                    480B

                                                                                                    MD5

                                                                                                    19d4b73fb59e6e72829ba740e4deccaf

                                                                                                    SHA1

                                                                                                    ca8b24e55b8b47104fef23cf8a867e159be6012a

                                                                                                    SHA256

                                                                                                    27a71e7844ac3ea79d6d1ecc16d0f131593f735663c86a6a7b34536661b31ffe

                                                                                                    SHA512

                                                                                                    07ee59c3540513ab028746bbdfc42f25878011dc2bd7a65ffe6fe64e7b34423eba3365bd945a9829acb3e66e8cf5ffbaa06708b51114b6875c78893c12e50b2f

                                                                                                  • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    37ad5a8d02938e11e0ec509a7250cfab

                                                                                                    SHA1

                                                                                                    f3bc6aed015f4db8b4b1d3b436eda61b31e459a2

                                                                                                    SHA256

                                                                                                    1fb29faed189b394fcf022f9e9b91e8132cecdae354290c4123c1d2741c89d26

                                                                                                    SHA512

                                                                                                    d0b8f4cc9b4b687dc0fdb4711bff85329162b29a35a4311e6a3f73f74c490af9cf5ffce61051a06c846015e340e5426e28ce144b37bb2f11bf15d52a208fbe57

                                                                                                  • C:\ProgramData\Package Cache\{01B2627D-8443-41C0-97F0-9F72AC2FD6A0}v56.64.8804\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    25KB

                                                                                                    MD5

                                                                                                    92508add31fac4966d43256cdb261eca

                                                                                                    SHA1

                                                                                                    06f73c98fcfbbd9ac515dfb2d082d0b44e5a8e52

                                                                                                    SHA256

                                                                                                    5239c1ec24f1c642d295dc72251f63a1e3a65753432fe8de746a3fdc9bdddb19

                                                                                                    SHA512

                                                                                                    462d6ab7f2aa8d8997cf2b9669162fbda9c8f879efddf054e537825be13d6e8652fe1c04b48902b78c406f15c2cbb40c5e892afee776b22c449f93b3186d82bd

                                                                                                  • C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    25KB

                                                                                                    MD5

                                                                                                    55346c9be32ed5a020cd9eaf48e79341

                                                                                                    SHA1

                                                                                                    7d5cbb75a148d6de19b54efdb067e63db5487372

                                                                                                    SHA256

                                                                                                    35faa9603b056fa1c60c3b0a806952ef54ef7f6deb1944f4c2ed1baab0a0ee25

                                                                                                    SHA512

                                                                                                    e81872544296ff01b002227ecf05a2cc05473626f87ff7f8754d840a36c29248de24fa2e068cf8def15b49a01a311349f4eb8cadc3e854e07c47f1d3ed4673b8

                                                                                                  • C:\ProgramData\Package Cache\{37B8F9C7-03FB-3253-8781-2517C99D7C00}v11.0.61030\packages\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    25KB

                                                                                                    MD5

                                                                                                    87dfbfcd1208da861114d15ba9d8ce51

                                                                                                    SHA1

                                                                                                    7cd6c6b685e3af600af27372d1fd4244bb8d4963

                                                                                                    SHA256

                                                                                                    1011a4c7b57d0060ace5954fa9d2f9da246d899a68a3149a838eb265bb6e7b36

                                                                                                    SHA512

                                                                                                    6cd8ed7ff22eb64b4ebfd051054e9726c7e4d793bb81a411d52e2be8b593d7dd2e86aeb31fa487c7a563cbc17f984d3bdb53c058f02f0be7c186b7b0b0b208e0

                                                                                                  • C:\ProgramData\Package Cache\{37B8F9C7-03FB-3253-8781-2517C99D7C00}v11.0.61030\packages\vcRuntimeAdditional_amd64\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    25KB

                                                                                                    MD5

                                                                                                    c2c773fce24b48f98fc16e2a4a645e1a

                                                                                                    SHA1

                                                                                                    9491c87f139ce7c35e1c8393e3237faf7162f147

                                                                                                    SHA256

                                                                                                    569ff22260d53e073db970ed34389e73fa09e97b53392d98cd983f365a2e4f91

                                                                                                    SHA512

                                                                                                    160a7fde5535617481af0574cfd3704ebcd9f34db8a6caee54d20e14048ddaf77bfce57492315c44ad5d1d16776636d18774720c3d61202a3c7ee4cc95f9247d

                                                                                                  • C:\ProgramData\Package Cache\{37B8F9C7-03FB-3253-8781-2517C99D7C00}v11.0.61030\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    25KB

                                                                                                    MD5

                                                                                                    5f257033e9ce9b2c19c0793966eed00f

                                                                                                    SHA1

                                                                                                    4deb4b18099740a9133a311387b74ba740657075

                                                                                                    SHA256

                                                                                                    181caed88b6fe5a3bc1cd131f76cd06df2e8ce70004212a26ac00a4b7950d64f

                                                                                                    SHA512

                                                                                                    233ddbef25e2b56c63ce580a5e6834225d91fec5685728791f42e5e9e7a86d5f614cdef46fc6702741736bf4ff2e6f6214e7a03910bf45a0a94ca2a409adccee

                                                                                                  • C:\ProgramData\Package Cache\{3A96B93E-763F-41E7-85C7-1F3CCC37EF27}v48.108.8828\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    25KB

                                                                                                    MD5

                                                                                                    b90be75cce6f02f7e6fa0cf9a87c035a

                                                                                                    SHA1

                                                                                                    d20d3b5aaa89c01d2f4ccda2a22f05869c97b397

                                                                                                    SHA256

                                                                                                    4758c8ce411e3a6cec28ce0441d132200068977e3c5ff276b740b472e1e70663

                                                                                                    SHA512

                                                                                                    725c5ee3b23575564cc3d5e23b7892c02beefed040e3bcc04150f82141445ab073187669c15ba605f628a14b00458e6393831bd5f137560532175d1f16e8e917

                                                                                                  • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    25KB

                                                                                                    MD5

                                                                                                    7ce1d224320ff140751999c81285ebcd

                                                                                                    SHA1

                                                                                                    13c00018c5d5dd7903f4e7801aa6c8f0e8f915f8

                                                                                                    SHA256

                                                                                                    24d8df6557da36890a482a0069bc2212200de0a30c2b3fb5968e7063e62d103f

                                                                                                    SHA512

                                                                                                    110d5c439532159d44dcdbdffb33b8df577d2d7dcf887fce8ce87b8ad592d655c3f9b91ba469b660270a1ffec0fceacb281d0c037e1f5f326622a7ea1642f8d6

                                                                                                  • C:\ProgramData\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\packages\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    25KB

                                                                                                    MD5

                                                                                                    0491c86ddcdbd74a6583dc84f5fe34f5

                                                                                                    SHA1

                                                                                                    7b9482c96876789a45fa1787965f305a5661021c

                                                                                                    SHA256

                                                                                                    b376ccb70702f14342925833130b3d8ab7ca32bd02b73428ae7fd8379b3af875

                                                                                                    SHA512

                                                                                                    f72ec95e013044a4de6911e839ff05ac4b57e9d998fa46cf7402e706519077cf7fd9182826b8ab1fea8d4295ca313305ccfac4dbd2b834c4bf2476f9eb2ef7d7

                                                                                                  • C:\ProgramData\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\packages\vcRuntimeAdditional_amd64\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    00055a91f6aa8e308e6c0ee7be1a4a1c

                                                                                                    SHA1

                                                                                                    b5871222e50d9ee5186263be7f958c948ab168a6

                                                                                                    SHA256

                                                                                                    6e368bd0a4a325151953c6b99713ac7b9f4d00b1aa528a1230a4dacac2d3541c

                                                                                                    SHA512

                                                                                                    230590b616d9fa6b4475cf0203becbf3fef1780d05f4548aa43e6a34c343fa3b5ea0310ab9d64a3968b4496aa1221a7aa0ca9f39b40e4be11c8fd108719a5361

                                                                                                  • C:\ProgramData\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    25KB

                                                                                                    MD5

                                                                                                    b28e1d216a72a406e9f50738fdcf5e5c

                                                                                                    SHA1

                                                                                                    c0aeea05d880fbb1cebaa60a8ab7299e541aaf43

                                                                                                    SHA256

                                                                                                    abf2985fdcd9d86efbd7a25b578c001c19c2105c62377ed7b3e66a6ca8065da2

                                                                                                    SHA512

                                                                                                    4d83e1ab131ff57f65bc26aa530e2d2dc045a2850ceeb559074b9daf942599e92bb063ed08d3b64258835d6540c386d2e7a3e093cf5cd13a75c7d508abf772b1

                                                                                                  • C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    2e53c3b7640ca3929de2b2f9a0c4824c

                                                                                                    SHA1

                                                                                                    ad04c9c266ab0a42f8974d582469064702e7a0d6

                                                                                                    SHA256

                                                                                                    2c6686629a847c546bac90c721faced990839c13c20f217446e91ad9835eedaf

                                                                                                    SHA512

                                                                                                    6ece8770591737c569781772bd4daf590a5b7bb9c9fa64ba8f3502e42441e39b9d36876646eab8eb8a8cb8ea87bf2dbc9ddcac8fceb063c887c6745b15d7f961

                                                                                                  • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    7f7b4bf4d85c2b0ef02c18d21bc35bea

                                                                                                    SHA1

                                                                                                    07a66da2c4360f51de114fa4d4dac19e0e586146

                                                                                                    SHA256

                                                                                                    28299627194750833149606939f2a36346d9c3404dd04dd24d9831d0c088240e

                                                                                                    SHA512

                                                                                                    a1a3be0051811e741e07d21bd114d37b2ad67e35739f078821ac6c93f410656c89f04cf04f4697d0cf58a7c4df9809484c6e1c10cfd7ca4a2b2ef7f84bd7ccd8

                                                                                                  • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    d8c359a6fbff39e8b1f60dde94b2ed62

                                                                                                    SHA1

                                                                                                    07b13587ba8a65648a9605b19d10068f7e5e6957

                                                                                                    SHA256

                                                                                                    adbf3584b1e9579ca112143c6cada3b352daba8bbc76d229b256e568165e3e0c

                                                                                                    SHA512

                                                                                                    4d47b46dabc3aadc342e7015165855debfba6a366cab7dff3735544659a925d98736ae4d6910875aaeaad453e622246c9e163046aa61482e3f251fd0e723284d

                                                                                                  • C:\ProgramData\Package Cache\{662A0088-6FCD-45DD-9EA7-68674058AED5}v14.30.30704\packages\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    33e3b9fbeead5f4ac347e1387f814c74

                                                                                                    SHA1

                                                                                                    bcc235d4a2754527c8651adb6baa6004ad1a87a7

                                                                                                    SHA256

                                                                                                    a44e05bb59be0682536ad974afed7624e2832880d9fcc7659920203c941afe44

                                                                                                    SHA512

                                                                                                    3d74eaaa131a78a5f28195e052c428166b722f83dae700d5db45906141ac944a89f3b3490bda1411abe13c07ea3bccd17c958fa806cf9a1481c2bd0c7b673c32

                                                                                                  • C:\ProgramData\Package Cache\{662A0088-6FCD-45DD-9EA7-68674058AED5}v14.30.30704\packages\vcRuntimeMinimum_amd64\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    c7f8b819ee847f472aa9b59101189ab5

                                                                                                    SHA1

                                                                                                    bf050b8d0aa2d0b005d38dbe4bfb1a57c9d6818d

                                                                                                    SHA256

                                                                                                    5f8c9fc2625967eb0de8a798705ea158361e99f72ce24acbce2617b6c1864880

                                                                                                    SHA512

                                                                                                    68b644c4723bb1ae722bcfe5f8c395d0a001f11cd77f7bf1e93040014a96a5918db90be39847ce4ddf1f375446f9b683bd603bc2b0ca641565776c5ca3fd6a36

                                                                                                  • C:\ProgramData\Package Cache\{662A0088-6FCD-45DD-9EA7-68674058AED5}v14.30.30704\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    34abacd7e6b559b068ec61ed92e87468

                                                                                                    SHA1

                                                                                                    6f1142c9681de31816b125d0cd16428aa338e9f0

                                                                                                    SHA256

                                                                                                    3e857ca93499a863d0c63f3f4f1e40499948bb4050027825e4e3aae6c941b934

                                                                                                    SHA512

                                                                                                    c5e4802ebcd612bd2bf9c6d8db166c929fb533b30b4bfc71ec1e478ed4af6c30ea6034154d4226a5dcfa10544833785a1b6685b107711f112ef38778286ae7fb

                                                                                                  • C:\ProgramData\Package Cache\{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}v14.30.30704\packages\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    51cfb4707a724492ecab94abd77a889d

                                                                                                    SHA1

                                                                                                    7c6aa216e0480a0838a0c5e5372e2fc2c9b7c633

                                                                                                    SHA256

                                                                                                    49a10044e000d7263e9ec93d110f46b90682ce372ab589495659832606248c0a

                                                                                                    SHA512

                                                                                                    3b43a72908871340d09ad1aa9b4aa2f52f00e5bb41cd70b0089e3605c6f27b4181f4e3e57d69ba0a92844e02db256c97be6ba6660b7b4afa58ec367e8d433dc8

                                                                                                  • C:\ProgramData\Package Cache\{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}v14.30.30704\packages\vcRuntimeAdditional_amd64\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    980b77156efd299a2f7b91071ccf51af

                                                                                                    SHA1

                                                                                                    d0ecd1b95e0ff32cad671d532d59953214c5c41a

                                                                                                    SHA256

                                                                                                    d9f04dcf54cd5af901673fb9510395f4bc70e8e5d9bf12259b9ae823d96ca5fe

                                                                                                    SHA512

                                                                                                    5f7a376f346b3014f2b9eb70fbbbb5237f0982db9d825c6d8004ab1ae08a76959a0dea14818c4dc21b27701dc83721421679461ab18954fd6ac860fe85e7060c

                                                                                                  • C:\ProgramData\Package Cache\{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}v14.30.30704\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    ae0f9a38af1e1d9cc4671c60ac4e4ead

                                                                                                    SHA1

                                                                                                    fda23dee3d7f7535307536baf40641cf4928ae30

                                                                                                    SHA256

                                                                                                    20313ce76955dbd4917bd5433a467219a158280182b315d298d65f8b7003352b

                                                                                                    SHA512

                                                                                                    f8fd7873eb045fe6cd33d73a8717542d66178b1ba5731496394da14bd19c2e8878853715ff944153831d257b4716208c82392ee7932142633b6b84ba26eb0784

                                                                                                  • C:\ProgramData\Package Cache\{7447A794-FA2E-42BE-BA9A-5FCBD54C5DF3}v48.108.8828\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    945f25ea44beae0e145d6a1d07b5c5f0

                                                                                                    SHA1

                                                                                                    b9ad2c9b503a550c6af35b8555e91ac307713ccc

                                                                                                    SHA256

                                                                                                    a78ae14a83382d2138e032411b44269f9e392beaa39db18e60a67780691b3e79

                                                                                                    SHA512

                                                                                                    e156c36fddb3825551e7792ae8aa74e8c1a52ced40da271bdfe594773e5a462551930dec08c49270f39f2c6bb83c6cf30e72c089d96faa7da4df816b5d0897bd

                                                                                                  • C:\ProgramData\Package Cache\{79043ED0-7ED1-4227-A5E5-04C5594D21F7}v48.108.8828\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    05492cb2fd8a6b369893d1aa1793c1a0

                                                                                                    SHA1

                                                                                                    69cf13a110a89d975c961c83e0cb172ec823fc2e

                                                                                                    SHA256

                                                                                                    4aacfaa155f64f5483e40d077832340b35362a12c1ee04dfb5d9f262b6bc7447

                                                                                                    SHA512

                                                                                                    fd4505e5f5c4f8fd4b24eaa536762699cfcf9714711f4f5b4d8b602e333b4a9a2fe1b3b29a1e76e6a368489ff573a0f7ddd46647c69da4cf37992354305f0118

                                                                                                  • C:\ProgramData\Package Cache\{7DAD0258-515C-3DD4-8964-BD714199E0F7}v12.0.40660\packages\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    d82b23c3ccf7f86958dde58d96a14437

                                                                                                    SHA1

                                                                                                    fef0ad14e97dab6c5b2697a378ddb1be4617dea6

                                                                                                    SHA256

                                                                                                    140cf2ed1f3fd1bae6c27e3e5fea3cc413c8ca1f507abf0702fd1c58a8c9af46

                                                                                                    SHA512

                                                                                                    cb4135d42a04acc165f22a75957b383524f8485d2cd3af2f09672a03f94f669e03562d16182422aa33c8fdb3bf0b5410f2286d5c5f8b352680f5b615ccd2e023

                                                                                                  • C:\ProgramData\Package Cache\{7DAD0258-515C-3DD4-8964-BD714199E0F7}v12.0.40660\packages\vcRuntimeAdditional_x86\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    1b41ac65d14302acbedbb6eac3ee4468

                                                                                                    SHA1

                                                                                                    ac514efbcc79c14697f934f275aa809b65a8ddaf

                                                                                                    SHA256

                                                                                                    124f17223e7e315898d3667ec5f3a2e373577bf1ad45a44721f17147613160df

                                                                                                    SHA512

                                                                                                    0fd3f2027d9e37fedb1b2ee3d07803122672f981f80ff713a6bdcfdf3af5944ce94bdc852d16fd36939c64dcba13fb05d9992c022dd90a5571e1fecb7105d1c8

                                                                                                  • C:\ProgramData\Package Cache\{7DAD0258-515C-3DD4-8964-BD714199E0F7}v12.0.40660\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    cb8f31759b495e139516bcc2042eae2c

                                                                                                    SHA1

                                                                                                    736136a6851952ca9ca6b1072279d8a7c334c8aa

                                                                                                    SHA256

                                                                                                    87691ebb28980c9a3c75b60ecedc486ae9b5e435e27671c0870479e174c64df3

                                                                                                    SHA512

                                                                                                    26dbb0792ff030c8138a916e250d3ba7f41c723fe6effd92ff0059ef50ed293f1f2912856fce7582ef1edb4ce3c99a9e5134eccd7886070ab356f6edb79e7a3b

                                                                                                  • C:\ProgramData\Package Cache\{9F51D16B-42E8-4A4A-8228-75045541A2AE}v56.64.8781\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    089ec420263366deae36e31e78e2b481

                                                                                                    SHA1

                                                                                                    d7c66630ea2468dbe3d72f0a55e7a0418ef3999e

                                                                                                    SHA256

                                                                                                    5011c07799e5290326c4610e99a5411cbf86e1b8b0e05ab36ad3247b53c77a58

                                                                                                    SHA512

                                                                                                    e301188dcc84d2782b5e059bd08987a04495f7bd1a3d5df41d19be2acccaebaf7ab10a52e3a3edc3edc9b90c33f46b29bed6268e1986ebf6f39e923c5ab100a7

                                                                                                  • C:\ProgramData\Package Cache\{B175520C-86A2-35A7-8619-86DC379688B9}v11.0.61030\packages\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    5fa12f4a7d4102dd4a12fbf28cc6533e

                                                                                                    SHA1

                                                                                                    84f3f04c445de25f91a488494e73f97bf3ccf689

                                                                                                    SHA256

                                                                                                    873c680814aa1d8d499bf21e492d6b57aa62452b9e1cba7abdbd96e985dbfd36

                                                                                                    SHA512

                                                                                                    953b89a42e828327af9bb617b26b2431d9dd07cf22264dcdb2d98b810141712e6a7e6cde0ed74fd58729f5a21d6938dde74f8fec9fbcb08f9e9c5fdf1159d177

                                                                                                  • C:\ProgramData\Package Cache\{B175520C-86A2-35A7-8619-86DC379688B9}v11.0.61030\packages\vcRuntimeAdditional_x86\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    ecf995a9af495243366ce13e4dd607c8

                                                                                                    SHA1

                                                                                                    b1543722d3c46c7723de639624654c4739f0d12f

                                                                                                    SHA256

                                                                                                    0cbaf6adf34317d262b9ffeeb497a82380922540cdf3884eec7f71c40c67b245

                                                                                                    SHA512

                                                                                                    09b95053f697c2e4aca122768b7558d8eddc253c75ff3590812efe1d6c0e612c266c55cd02c76b73b8183d9dcfe93737ae837faea00d42c55043de829206cddd

                                                                                                  • C:\ProgramData\Package Cache\{B175520C-86A2-35A7-8619-86DC379688B9}v11.0.61030\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    364010300cc3c1e09348cb6da5be39c7

                                                                                                    SHA1

                                                                                                    391b4079c1774d103005ce63274ba1fbbafd2aff

                                                                                                    SHA256

                                                                                                    fad19f15e435d8d9d6cdd1714c0bdc6b4dd0d44908f5939d1f4021e72c4e1b1a

                                                                                                    SHA512

                                                                                                    6b2ff0a48f4bf6d3ac1a42ad05156fa629e1e7576160325b731a711d271d502632a891377e9cdb3e6eff202bc8d4ac11cfa3b5c285c1ece82acac7dc1ab2a74e

                                                                                                  • C:\ProgramData\Package Cache\{BCC2FB07-8CF0-4542-B10C-61BCEF04AFF2}v64.8.8795\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    cd9cb9d9e2b7341024e3e8b92e4b5474

                                                                                                    SHA1

                                                                                                    774dc7473dad3f980a851c12107da3e2faefd092

                                                                                                    SHA256

                                                                                                    64b125d2581f5ad81691a70954cfe82a260ec945da30894369689a458f61dd3e

                                                                                                    SHA512

                                                                                                    9c315bcd8185d1289b0bfe9c6cbd19914ea6b5a5879cdf57beef51ca9756228f6692ba2b8293d3ea487a869e3a6d811b66e981ecddb8c19f1d3390c3cf25a366

                                                                                                  • C:\ProgramData\Package Cache\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}v11.0.61030\packages\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    08fe0bb1822e211a445e6a0708955589

                                                                                                    SHA1

                                                                                                    ab5de829d3e914afb51286a0847b0f4963f4a166

                                                                                                    SHA256

                                                                                                    fc2c42351262158e24e533070e28a2dd16668faf910c9cedc856423482b10ccb

                                                                                                    SHA512

                                                                                                    c3fe25b7db8dba477ac257d94b2bc857dd4356cabd7e1a35f97ff260bc91692ef7a05250de6ae3d30077dbf52e180ac5b0e364d725e5747ad07bda7df04b1d13

                                                                                                  • C:\ProgramData\Package Cache\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}v11.0.61030\packages\vcRuntimeMinimum_x86\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    557d56f79a41f865540ae2b503638ab7

                                                                                                    SHA1

                                                                                                    26d5d7836cd4de2689b2c4fa43b1bdeb790626e0

                                                                                                    SHA256

                                                                                                    35854a5fe112174cae196613c981eec02f499574ca655708a34f9b72e84a00ac

                                                                                                    SHA512

                                                                                                    e234eb1ebc9ee3556b617bed46b280ffa2e8d4eef1745f84fb32d07660541772c311c717ee9902cb9e40de5d79cce32bc9eaed5e3c5b6935cf3a472f2c0e907b

                                                                                                  • C:\ProgramData\Package Cache\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}v11.0.61030\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    5792da4aef6750b9527c3e7350e796c5

                                                                                                    SHA1

                                                                                                    afeb95a4f3011023df0747dd172ff26cb9775b46

                                                                                                    SHA256

                                                                                                    2fdb31f6c2f31969bec3f4271203b7239f4e758640a1a52b855fadd2a22a9ecc

                                                                                                    SHA512

                                                                                                    be53a770aefc3d6a1e2958b61992370501f76268009d097567a4d82200ed312918410d341cadbd3a47291cd4e4967a94983fddbe102a67d18d5fab1c9e39113a

                                                                                                  • C:\ProgramData\Package Cache\{BF08E976-B92E-4336-B56F-2171179476C4}v14.30.30704\packages\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    c4cf5e616bf5ca2936865ca271aedea1

                                                                                                    SHA1

                                                                                                    902a584063ee35341d81156b2a5f16f61095df9d

                                                                                                    SHA256

                                                                                                    37f7181a2af04b9830228153cb3cdb473b301e934b29959f7eb79434974b4fd3

                                                                                                    SHA512

                                                                                                    c74a080ec14b78be01a2b07ffe6c5181d6b719c038488a37b9d2a56ea1f582fa835f9710c5d267eba9ee8a7542eb96f705e1da9f9532ee4ff85ad093e3605fc7

                                                                                                  • C:\ProgramData\Package Cache\{BF08E976-B92E-4336-B56F-2171179476C4}v14.30.30704\packages\vcRuntimeAdditional_x86\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    f91361bdab01e41056dfc16168d5d127

                                                                                                    SHA1

                                                                                                    805b340d15b5eb2e852a9f13cbb452def7f8b1b6

                                                                                                    SHA256

                                                                                                    18ebfe097eb410ba60b52a2bc63bbad1c7406fdd0a2f3f4d6394d38cd7036a78

                                                                                                    SHA512

                                                                                                    7989f7801305cdfa9d13463e579cd186d2349ba905b0ea21e6faa448a3df08283518ec9b159069c00d267f4d8d4ff619998ed5d7ccf1d25b7c3ed58c8ae42b73

                                                                                                  • C:\ProgramData\Package Cache\{BF08E976-B92E-4336-B56F-2171179476C4}v14.30.30704\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    0581aa122ed3e830437cc49236941b86

                                                                                                    SHA1

                                                                                                    83c61480ff0d2e178d32dfec870e0c015eba837d

                                                                                                    SHA256

                                                                                                    9364f1cb8ef92db6a7914d2548628e092ac2cecf96c00863ccca05b8792ca278

                                                                                                    SHA512

                                                                                                    6e8633271a2884bc0d8cae7df69d51f1406cd0abd2fca07aff4ab2c6bd4aba949d0befb87ac72d2b113303b8d5cc2b60831bd98063111dcad59cd9389341fd9c

                                                                                                  • C:\ProgramData\Package Cache\{C7B73281-AB0A-4DAD-A09F-5C30D40679AC}v64.8.8795\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    5eb0b552f9672517ad9896a7f3125acf

                                                                                                    SHA1

                                                                                                    a52df6eaab8e7f797ae2d33e5748c0c2aa43ec94

                                                                                                    SHA256

                                                                                                    d9bf223368e8b86f80c78715a78d06817198162091c4a1dbcc7e0a8c26333fdf

                                                                                                    SHA512

                                                                                                    fbdf3243e0b5a2d9095026115e138c082638334a5700048e0f361a51b64b055ac64ca76c7eef744a485848da64dc6c2ecdb4678f6d11fadb80eb5dd24fa37a63

                                                                                                  • C:\ProgramData\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    adfe9ec72244280107a1acf6ceef2bdb

                                                                                                    SHA1

                                                                                                    8113a9d8e69984110e2408cdf3eb2e440f5429a7

                                                                                                    SHA256

                                                                                                    50d7f9e889f07b864b7287f8c5b8af1b5586113774eba93c611e7dd015ce7f33

                                                                                                    SHA512

                                                                                                    d8a782c7eb623e76763bbd5c354b09d95afeabe3b0e3c26b1568a67f52e630b9f46572423979c67a42cb1456684a2bd3cfd5d66a5fc64302e705b4999347e0a7

                                                                                                  • C:\ProgramData\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\vcRuntimeMinimum_amd64\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    f4114dd8c82ddc2140f1af4e8af15f44

                                                                                                    SHA1

                                                                                                    e6fe579ad084fdb91e5874e76f604501dc50aab5

                                                                                                    SHA256

                                                                                                    e6f64a849a641aebcb99a3d83cad2ff79144bb2622c528c403d2fd08d0d0049a

                                                                                                    SHA512

                                                                                                    ff41639b13928750715c0b566c5bbdbe6bf3ebb6722ea23c2dc322475d0b0523e5a781bc61387a1f53fd7ef07c1a8b202d82b161f56e829ee0ef57c925d89ea5

                                                                                                  • C:\ProgramData\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    c80ae85f600afa183401162717841b75

                                                                                                    SHA1

                                                                                                    e093981acd26aa346235929991755eb652363978

                                                                                                    SHA256

                                                                                                    c60a598e2961c8315838e2373952793ee548c3991c75f762d5c25fa558309439

                                                                                                    SHA512

                                                                                                    022582d1adcc2d06d662757a230e9f9e5bc4684c159a44b7ca0b2e6560c9a6a89c7297e6e1432b66481fd27e44f000c1ae2a1b7f96f361a081b1f67db7e57c2b

                                                                                                  • C:\ProgramData\Package Cache\{CE4D7AE0-FCBA-486F-A58F-DBA3626FBE4B}v56.64.8781\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    a8ad9cd46ec653f10ccea86c2a795970

                                                                                                    SHA1

                                                                                                    f0ec15cb5f8c8a87a126ded6f8a2c9b2601bb578

                                                                                                    SHA256

                                                                                                    9e5de09f16bfdcac52c6a7fcb802bdf7eb20b4033a49f60700311c147a6546d7

                                                                                                    SHA512

                                                                                                    a5be7345b8b873315a165be88e1b581b2ef38c806d59e451731dc4b5fafc2df7cb5693fc4f0e6e24ab737aefbce6cac7c1c1a71d8a39343a5218f3b29beeb777

                                                                                                  • C:\ProgramData\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    9b80d54744564b50d866cab23af332e7

                                                                                                    SHA1

                                                                                                    db0286aca607202d33cc0877bc87991980aaea49

                                                                                                    SHA256

                                                                                                    b63026cf8fc9b5bd5c924bf87edc43d6c3c1ad6a63d8d06b6743a98a24e0be2b

                                                                                                    SHA512

                                                                                                    4882535e9d62001761fe0b084fd3eb9de6a608b55dc25a503c8ed3f082b6500e9e15c7cb77feb82d48e124c65c0c2fd52d3772575eb71918ceb7ea50d9b9418b

                                                                                                  • C:\ProgramData\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\vcRuntimeMinimum_amd64\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    358b2da83ebeb24057d306bd8810e296

                                                                                                    SHA1

                                                                                                    75b4fa915fcebfbe6207640f0b32dded7967988e

                                                                                                    SHA256

                                                                                                    5df44b81dcb2f123e511573e302a92341166078638f99b73d57052540d3a8f64

                                                                                                    SHA512

                                                                                                    a855622db3a302fc12f8fc6f995a06db329059f3eea4f08a4811f17d5309b52437218433949ee6ccf51aa5c70641662ad4805c2535542e1b314167d3d4736c80

                                                                                                  • C:\ProgramData\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    f7dc345ff2bdd3349311830dc0cc9430

                                                                                                    SHA1

                                                                                                    aaf4224b3ae60f097ac67528821bb980642cbcc1

                                                                                                    SHA256

                                                                                                    286dc3f40041c01d4bd7301cae9657b9a1e7be0f0a73a46ea737319d117e0d59

                                                                                                    SHA512

                                                                                                    7c24107661de3fccf5eb4e2df1ee37be33efd876b0fc1f2db7656d651fa68d9355497c9229236e6d905ffe7e01b6dabb4b5f09372f065947770584c6868f7b63

                                                                                                  • C:\ProgramData\Package Cache\{D46F1FD9-2FE8-4D05-B2AC-011C23B69B24}v64.8.8806\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    bdc40d8c74bb0fe6dfc73305456e5c80

                                                                                                    SHA1

                                                                                                    95b0bebf463b7601c6adae44acc875b60b4ef357

                                                                                                    SHA256

                                                                                                    656d47214ea4860b400d4870e618cbf796dac3849bc8949c05fd30f4129b275e

                                                                                                    SHA512

                                                                                                    feb56228a80de570f275c88cf7dfddcb9c5c87a8133112db191b4610109f34a74e631221e27b20ddb5668f46c5a1363696c062d23d299b25d49ea536ae7fc8a5

                                                                                                  • C:\ProgramData\Package Cache\{E30D8B21-D82D-3211-82CC-0F0A5D1495E8}v12.0.40660\packages\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    0c8418d85378d4393530cec17055a295

                                                                                                    SHA1

                                                                                                    72057498fb2956cb81af36d2dbe8a9baae1cd81c

                                                                                                    SHA256

                                                                                                    ca79634e3bf7e05e7198ce9af7a50a364bc8c6417c7d4de515c8f686c46fcef5

                                                                                                    SHA512

                                                                                                    e729f09f7ff4ec467ecde61b739a9de7252c015b498e13f3a7b4df0e27edadad50ea2142345fbc74bccd16a54119cbebcdabc8639a6bb9a8df8c97acb98e75b2

                                                                                                  • C:\ProgramData\Package Cache\{E30D8B21-D82D-3211-82CC-0F0A5D1495E8}v12.0.40660\packages\vcRuntimeMinimum_x86\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    0b1d94438f1c30f2a76431fa5f74ce3d

                                                                                                    SHA1

                                                                                                    85156cbe8ede04521842f03ebc306e62c01abc9f

                                                                                                    SHA256

                                                                                                    51c3c8af82df3382e3e8482e9f23bc6681929622d9a6e922fd200b323c0305ca

                                                                                                    SHA512

                                                                                                    94cdf2fbe5b65e5b76e3da55cffb27cf92789617e23b32d2f8019ecc58ef177278d5d81370aa4a16b23a7f7e7993e03ae50137c023866c462c96c71b0e66c2c8

                                                                                                  • C:\ProgramData\Package Cache\{E30D8B21-D82D-3211-82CC-0F0A5D1495E8}v12.0.40660\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    7f2e4613c14a582414abab7e09bc0a86

                                                                                                    SHA1

                                                                                                    9d02a2facfffc5735d07de0bddd0725f0449808b

                                                                                                    SHA256

                                                                                                    b55075f95ec7727b7eb1fd47c44b2df2b33b82e499657fccbff63f9938bc755b

                                                                                                    SHA512

                                                                                                    825ca9c3c06941e9e4c1c6c29e783682c07b23d0724940c752cfa2439f489281d27f0d2a3a2854d225aa6878f7e797cbf62c821a8582cbfad1dd0b817093289d

                                                                                                  • C:\ProgramData\Package Cache\{E634F316-BEB6-4FB3-A612-F7102F576165}v48.108.8836\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    93d59aa1a8e8e06813b28e69f380012f

                                                                                                    SHA1

                                                                                                    d9d00d3a7b650bcd2990cba7d3970ae233abda00

                                                                                                    SHA256

                                                                                                    9f69daf277f7953187cddd5617078dfb53c89d9681d8ab7d100bbad6e3750253

                                                                                                    SHA512

                                                                                                    a1386017695000f2b38dfe47fd9bbaf631729be4e11431b8fe472e97c56c6881f5dd1f71c60e3e5c381099ac8af8fb628ca5149c755d61664391e16555b36678

                                                                                                  • C:\ProgramData\Package Cache\{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}v14.30.30704\packages\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    dd10d63dc901df2f458bced04f36c424

                                                                                                    SHA1

                                                                                                    7b23f28d8ccefd419272eeb1e36e4a773b0e1f32

                                                                                                    SHA256

                                                                                                    71325b8f9993892b39a4579b168c80d302e147defcc4f7c10c919ec344546ead

                                                                                                    SHA512

                                                                                                    d2191555ab9f61dd0035790daad1232c13ce32e0dc8112c4899b872265b59538cf90b9f844f0faf10ad27c437faa388c7613cd19a40fef2e806de82a9b4263df

                                                                                                  • C:\ProgramData\Package Cache\{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}v14.30.30704\packages\vcRuntimeMinimum_x86\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    3906418dc8b7327dd64a00c8292231c4

                                                                                                    SHA1

                                                                                                    22222cb1769bb96e221245fac9927fc3bfcefb6a

                                                                                                    SHA256

                                                                                                    1d4f318f8520aeff0bebcbb9687e81950501e996b5ae646e5569ab59eef35819

                                                                                                    SHA512

                                                                                                    7b431183e988b69bc0bc4c4ba6278fc2abf5253406dd39329255bbded011fc9c1ee096f626c611a2ce0f4e326e06b6c8fe155a55af8703e19ab5a54de31dd8ef

                                                                                                  • C:\ProgramData\Package Cache\{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}v14.30.30704\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    c8ea7c9d37ab66453baabbae7b3ec332

                                                                                                    SHA1

                                                                                                    9bf1bc153b61001f890abf68b4f73903614375bf

                                                                                                    SHA256

                                                                                                    ed8e347e37880c55322cd9b3f46ff0c3578c4293a8dbf3f1628259c5cafa63de

                                                                                                    SHA512

                                                                                                    0b2eb46745405f725a4b28a2ab059cc95b3b51431a95881a7c7c636be75045ffe0c5ce01dacf19b90d34069ad368ce6029cf306610355246a69de7d12c62b05a

                                                                                                  • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    90b5e17add69f1c23e4f3e918ca5126a

                                                                                                    SHA1

                                                                                                    35e27b4fae3fb54dc308df008c9ba2471b381b56

                                                                                                    SHA256

                                                                                                    0461445a5d9ca3d0d252272ef4341f784111563fa55313b109a1622dcff8c55c

                                                                                                    SHA512

                                                                                                    f4c8a4d868672510c01d33033567da9f7ad0671662489e28c3504ab50e37155eabeca05e130e7f36e5549c83fca3bfe047aa6ebae166af57e7f81afb34948c9b

                                                                                                  • C:\ProgramData\Package Cache\{d87ae0f4-64a6-4b94-859a-530b9c313c27}\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    a13bb408ab8e0b090ca210d661c85faf

                                                                                                    SHA1

                                                                                                    c2017a8746f20a70dcaa7a8a20eff4d14a8b8d59

                                                                                                    SHA256

                                                                                                    8e572daf48b9d16b41d44404125a320a30d147603727fb118c3a6015e8247dfa

                                                                                                    SHA512

                                                                                                    d82b4260086b87bbe22daeb52aed37088b7e24279de6db9c2c52e577bece0515ca7f028b462f4fc53c0ed35212f04ddb9143064f0f2e3c6fff3284e25a0c7dfc

                                                                                                  • C:\ProgramData\Package Cache\{ef5af41f-d68c-48f7-bfb0-5055718601fc}\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    b8580ea1c130ad73bf386c22d674f443

                                                                                                    SHA1

                                                                                                    87645e42cba32db838c485b588978a6bbe6b57f4

                                                                                                    SHA256

                                                                                                    697f86094a44a21a608e97e413648ffa7a9dae064ce26484c4ab2603a75a0206

                                                                                                    SHA512

                                                                                                    79aec1d01d2c384b95aa6795bea9bb05e56310e167ba30eb1c49ab4ed5353d723a8a07c78c55e0758c3b195e9d59a00a6fdc368afd0dfd237f973773cbcb35a9

                                                                                                  • C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    5ca0d133f3dd8d45acb3ac8b9eccca3b

                                                                                                    SHA1

                                                                                                    e37829ea89088ab10c1a8a827f7fccc842f97ca7

                                                                                                    SHA256

                                                                                                    1a074855dabf47c36e4326e6166ff916285a6aff50d471d990801d010432ff32

                                                                                                    SHA512

                                                                                                    08bb846fab495b3820ef863e9c37aaaf64d0a42eff55709e158016b9c21e15fcd5feb903b5157872b4955fea2bf9f6166babc4044ef20dda965adf97f12eaf2e

                                                                                                  • C:\ProgramData\Packages\Microsoft.549981C3F5F10_8wekyb3d8bbwe\S-1-5-21-1161330783-2912525651-1278508834-1000\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    c2a28a79916d929cc8469137fd7d6bad

                                                                                                    SHA1

                                                                                                    ce011ec5fa8cb18d16a809524bbd39af05c76067

                                                                                                    SHA256

                                                                                                    f3de1139737aa792c2253853dfde8eefa2be6e3202f3a33dc836b84f9047c582

                                                                                                    SHA512

                                                                                                    112642a867ca2b966666ca3c153ca4ad5a1d94d3fcfc9b846721c5dd8b3dbc7cb180acb5f7b62fd70396bda815c391362a0e95eb328a631d1228048afc8f40eb

                                                                                                  • C:\ProgramData\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\S-1-5-21-1161330783-2912525651-1278508834-1000\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    209616e527dec909a2ff339a261ef4ac

                                                                                                    SHA1

                                                                                                    b460227a042cb2749330675f670aabf374d2dab3

                                                                                                    SHA256

                                                                                                    268fb4dca6ff3ec2147886ec14de6a9c330e2ed0d55a36e1396147e04340af68

                                                                                                    SHA512

                                                                                                    6c5b1da000c880a761ad3fa793fce64724c2cc22a0c1246bcf9303f714f1828ad9091fc11efb16e52de4e90a70e62d3beea2f6f41102a919176274043c00b9a6

                                                                                                  • C:\ProgramData\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    94fe7c54551a28a774604aea44363069

                                                                                                    SHA1

                                                                                                    d5cbd664c1093879a1613e411be47e14dbf61d62

                                                                                                    SHA256

                                                                                                    4d061c7d3e5438410b78fcd81ce83713d2e928b8d0cae9c90ce41620d866588b

                                                                                                    SHA512

                                                                                                    7076850ae9943232cffb861ebe70130f89dddf443199d0bb48f81a7cc4931e4f8990d04f99de494d403186bf1f9afc94689b3ed1bd7041d3689e3b8092d6cbda

                                                                                                  • C:\ProgramData\Packages\Microsoft.SkypeApp_kzf8qxf38zg5c\S-1-5-21-1161330783-2912525651-1278508834-1000\restore_files_xyhek.txt

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                    MD5

                                                                                                    3de8dd5831b2f06785c284d9b886b56c

                                                                                                    SHA1

                                                                                                    c06ecc44c289927435cc45984374df45182980e1

                                                                                                    SHA256

                                                                                                    7ce54e837cd73314b67372bffd5f37cd5853fcbde0007e3c0fb689730c0f5e37

                                                                                                    SHA512

                                                                                                    b6f4a493a0706bd9f451e719a906f3dbde9adf847e48aed2b9cc7fe547c7be97409ff18d96a043063c2cc91b2cb2d9e7a86142cdcad3ea8e37165f51a90bc038

                                                                                                  • C:\Users\# DECRYPT MY FILES #.html

                                                                                                    Filesize

                                                                                                    12KB

                                                                                                    MD5

                                                                                                    c321e4e94353306c679f6b4ffadae627

                                                                                                    SHA1

                                                                                                    1d91574670c8771e0eb5f8b5819eb25ef02fff24

                                                                                                    SHA256

                                                                                                    80ec8ad31083bbfd7371d12859892e4f1eb9775857ba71856fafd421cfbbc850

                                                                                                    SHA512

                                                                                                    65ad41fef363b5dc5be746af2e4cd64b889adaa57450b5bbb40cd71e0836834003a140edef75b95c4b7562f024cb731c7982ba7062197ff5dbb1b3090607f583

                                                                                                  • C:\Users\# DECRYPT MY FILES #.txt

                                                                                                    Filesize

                                                                                                    10KB

                                                                                                    MD5

                                                                                                    a350790990a0de0a849d65797cdf0102

                                                                                                    SHA1

                                                                                                    c1499fc362d85775d17a4c4291de05bdbad644d2

                                                                                                    SHA256

                                                                                                    570ccf2013e58ac08bfed8c4d51053f6151b7a357670fd9c77d41c0773c7e596

                                                                                                    SHA512

                                                                                                    045bc7c3b9c86ca0badfab325d8b842744b8c4d2f6e606adafc02d66d7d2429042c7cb075cbdb32a1009a90f1dfa9491ef6d3789dcdf357a997e685bae3b040e

                                                                                                  • C:\Users\# DECRYPT MY FILES #.url

                                                                                                    Filesize

                                                                                                    85B

                                                                                                    MD5

                                                                                                    f09fda510441e55b3089a956357f3a34

                                                                                                    SHA1

                                                                                                    eb967b50c488f7b2ae46dd49e6d6d2ceac418e06

                                                                                                    SHA256

                                                                                                    ed06a5277833b103499cfcde1400df3bf4881fa49fa037db23c7948a65c4713d

                                                                                                    SHA512

                                                                                                    dd00117873a630aeeafa37a84e1e2c2206579fd154acb3c0a6cde23c34f8b63f16ada4916930b2cd75abd40baf7745254cd3b39101f8cbbdb9e041509fbdf1d6

                                                                                                  • C:\Users\# DECRYPT MY FILES #.vbs

                                                                                                    Filesize

                                                                                                    216B

                                                                                                    MD5

                                                                                                    48ac29422570636cae371b68c858b988

                                                                                                    SHA1

                                                                                                    ff86dea198c93a8ae49ee52c6eb919fcbd259aab

                                                                                                    SHA256

                                                                                                    3926b08f205999c2f1a24121117ecfeed31557bf6f0529416f3432321292c6b0

                                                                                                    SHA512

                                                                                                    75019e6fd4b53528aab1af668149540e1bc372e58e4786eda1da75e7c9718dbc274cbf3f37cd38fbe7e618ea9c1b24c2534d18aecfcc3264ec55f83f206faaa3

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\explorer.exe.log

                                                                                                    Filesize

                                                                                                    672B

                                                                                                    MD5

                                                                                                    17339b4e0be5b444450259d2cb80f63f

                                                                                                    SHA1

                                                                                                    b31124639a17b84c9e3f921b755d4b3bfbd34412

                                                                                                    SHA256

                                                                                                    618f7bec7488149da01fd6c95150b5678e4e0af83c95f4075a74bd6b2e030a30

                                                                                                    SHA512

                                                                                                    d0cafa6f29f5ab28144c65c2ccdd44eb0ebf4f384d74a5a49f9be135132b41e5f8c9471669d5ac932632ebf6b31545089a12459f75a5e8b67aa1347faad6c9a8

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                    Filesize

                                                                                                    152B

                                                                                                    MD5

                                                                                                    3c6e13dc1762aa873320bed152204f3c

                                                                                                    SHA1

                                                                                                    38df427d38ca5ce6ce203490a9fb8461c7444e12

                                                                                                    SHA256

                                                                                                    5c441148843b7c8dbff4c4a72962a532aaf0bdd484d07a03dd9a32fd461b1371

                                                                                                    SHA512

                                                                                                    133054cb042e11013bfdad1bd11e3407d08cf26a66d0743bea9708d261aa904a1047bb0097b187ecf8436cb6cff3bec28c89e435862cad0e0fa264799556b70c

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                    Filesize

                                                                                                    152B

                                                                                                    MD5

                                                                                                    f5da507c2059b715761792e7106405f0

                                                                                                    SHA1

                                                                                                    a277fd608467c5a666cf4a4a3e16823b93c6777f

                                                                                                    SHA256

                                                                                                    8c1d99de087ac5f2e7b2afce66eff36a646bef46800c0c1d7737d6f0df74b7e8

                                                                                                    SHA512

                                                                                                    01c92729dd8061aa122b116a674c73bb78016f66d2cb8f7fb64907352758a825e87a1e345334386440699d2a6d1e17baccb400c5aee151eb64e64019cbebb870

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                    Filesize

                                                                                                    152B

                                                                                                    MD5

                                                                                                    8f37d2335c33a1ab36fe0d33a9da7e73

                                                                                                    SHA1

                                                                                                    9d7e9dc7db6c508418fa98d073fb1b4ab594eaeb

                                                                                                    SHA256

                                                                                                    bc0a1b16a51249eabdd4a82952bdc9220ba861b83ccfa9119c14834cc24ca580

                                                                                                    SHA512

                                                                                                    5cfa7645688821b7f7581c7ee5bca2a2a257536b135faf6d68a696287eca6e689e0511c7f5c176f1ec1c99b43e9c5175c79329f27d592824d036b5e8bf66b88b

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                    Filesize

                                                                                                    152B

                                                                                                    MD5

                                                                                                    8f203d2ba3090fcb5eb19057f50c544d

                                                                                                    SHA1

                                                                                                    e9c4eab99cf78a80e1b7d7a68a667ec0a072c731

                                                                                                    SHA256

                                                                                                    59641258c0d4af7d8cdc2bda378902f4d9d7ee38d45e0c6e5bdb34a3f5d65b3f

                                                                                                    SHA512

                                                                                                    7e0b2ea9e50191f7f84522f7a5960d54a2d88967ba21bce45238d1066b6697a45bfed7f10fc1fb0707478dc00e49681f71e95e2c7c0c06d1575a02e5b05c920b

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1

                                                                                                    Filesize

                                                                                                    264KB

                                                                                                    MD5

                                                                                                    03714f4f5e1ee1b379b74924498d7498

                                                                                                    SHA1

                                                                                                    a0a62ef66ea11d953db8c22de2ee08b53e55b710

                                                                                                    SHA256

                                                                                                    839fe870d34fd1c621aaca42246b52161b0f77515d4c227ba7cc411327067aa2

                                                                                                    SHA512

                                                                                                    086b7e3a0b5e4a4bafa654e2d8f69f89bd41a9b159091d183af3046d7ebc2ffc3ea44bf5475820411586c52a824c7494aa49231ef3e8451527bb4b475d3bc80c

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    63c15d23a723cc7fdc6742fcc9d55d98

                                                                                                    SHA1

                                                                                                    6ffc931f20c6dfe5209d656dec99c126d32ac16e

                                                                                                    SHA256

                                                                                                    f924c1e4456b6f1771297d914e346da090e9f589bb87a57524046a8e0d647264

                                                                                                    SHA512

                                                                                                    06b61c8b4be658cf53c8f779e0cda480ec309644d0cda765e49f2dde83b52f983da5aee79513c4e93b0014cf87274e40b1473d6ac2cef16a9913778b2dc33af5

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    383aaafac315d797f4b45cd66ef14e2e

                                                                                                    SHA1

                                                                                                    961226b3917a9071a7da00f5e5a3864b51a111b6

                                                                                                    SHA256

                                                                                                    26d549bdc25682062b25f44795ecb38fc892bb188a788b28ace42d269287391a

                                                                                                    SHA512

                                                                                                    ad045a950583815ead7868b1070800bff9013d042554be440efc266d26e68a3ffb2c9ec4bd76997d7490fe580711c6ac883dc54181c8365834fddfa37818c57f

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    63b07bcdb242eac0f8439cc77ee20dfc

                                                                                                    SHA1

                                                                                                    9393adf9e45970bd13583124a714fedb878104aa

                                                                                                    SHA256

                                                                                                    d313b196ef73ac61706cfd08d0e24aa7dab106e6b57566d9b7e610e8d485e1fd

                                                                                                    SHA512

                                                                                                    e009e2ce5d09659ddf7438d8a0600efe04856e72b72fb22cb90fe8a86955c7da6829c6ac13ac6a4e3bc5bdcc0d44bca69ae0ae0a76eeff2e343a1dd6619fa451

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    50c200d777033715982f9bb9e967a215

                                                                                                    SHA1

                                                                                                    49b4c0b697d4b249be2daa8e79a31cbd18859b48

                                                                                                    SHA256

                                                                                                    30a13347891742717631d1ba0dd8375cc3215ae4742ff648a411c4c06fd3ba8d

                                                                                                    SHA512

                                                                                                    33e9b7d67d22d7196ceb53c85ac81c5c5d5bd6abbe2c70f9bf69509308b6e9675b8a6fb7f0ad75feb8550863831c2c9c46c9ec2cd3eeb300e3c6c2c768da5aea

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    25f93dfa7a3aa1df70b52b04e090af55

                                                                                                    SHA1

                                                                                                    01d9611a5fb00c371acbba456b8a564367ba611e

                                                                                                    SHA256

                                                                                                    d1fddedeb501cdf1dcbd41bd4ba8f02cfe637ea7a3caa2752f87051da5b43b2f

                                                                                                    SHA512

                                                                                                    0e1bc245019c803110fe8d4b54ec6b38eda8c05c7034a5c199738f6f3eaea3fc2a9a3d1b767d1d66878b05117116b3fa2038f3ba69f206427a5f0cce421a1288

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    95bc852d1fcef78dab8f1afe4df4d321

                                                                                                    SHA1

                                                                                                    b62106a077e85a26716ed581be65f278ec365db0

                                                                                                    SHA256

                                                                                                    5fdf0fc63f72e580936bc22a8c9e8f3124573020847f5d32a27b8e6addfae7a5

                                                                                                    SHA512

                                                                                                    4e76bc313bc6dd062f45d9e7171f55b0ae769ee17e2bfce8329bb9a39146100fcbc1c10ff3ddfa46a5162993d9d669aa65690b95b6658d1c9035c9857a2e336b

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                    Filesize

                                                                                                    16B

                                                                                                    MD5

                                                                                                    6752a1d65b201c13b62ea44016eb221f

                                                                                                    SHA1

                                                                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                    SHA256

                                                                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                    SHA512

                                                                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                    Filesize

                                                                                                    11KB

                                                                                                    MD5

                                                                                                    3c75d878df9cb852c7609bed3fd6a05b

                                                                                                    SHA1

                                                                                                    af85eb32e3be29e30c2b04974ea640892e94ebe7

                                                                                                    SHA256

                                                                                                    dd43e2befe5b432a47e3202e7beaf5b2e92d061ca88438799c7c040934cb8514

                                                                                                    SHA512

                                                                                                    e2a39f9e793db47e57a0c7564afc5ddb48dd5ff300fe0e4686c181e95881cf5ae660e8fb3eb1f548522db95e1cde945194a5fe3ddab35afe8dcc37601caba0b9

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                    Filesize

                                                                                                    11KB

                                                                                                    MD5

                                                                                                    b9337ffa0f42330067bd50b46d9d8d45

                                                                                                    SHA1

                                                                                                    50d1502d3803b2f0cd0d830e10384e64e22abe2a

                                                                                                    SHA256

                                                                                                    1ba60ec772a5f037a248c02a287cb3e6176166a1477d39a62ce40b7161a56ba3

                                                                                                    SHA512

                                                                                                    ef9f4fb51b36c93f2c366c96c99ad4341e41b50559123f602beeead0515c1859db31205672aaee89e2eb575255947c5b066be82fdfcf2898f7103006de88659a

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                    Filesize

                                                                                                    10KB

                                                                                                    MD5

                                                                                                    bbcd142f9117551fc883e1e877ab1a66

                                                                                                    SHA1

                                                                                                    52a2948283d9831610b8e67c41179a1d8e386271

                                                                                                    SHA256

                                                                                                    8b4d2a6ce30d64de5a55da8305ad9d67185a532aeb4786c15f24e1951e579dc7

                                                                                                    SHA512

                                                                                                    df88099b1fae959e3ec915f61d9bced4f554e643520b82ab4ecdc98863b38b3e01a96d1d0deaa3089eada3ba815f1af3bc5c8f50543f26da29ed4f28adf18c20

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                    Filesize

                                                                                                    11KB

                                                                                                    MD5

                                                                                                    a2094c3916c4f9b87bb85aa207e197a9

                                                                                                    SHA1

                                                                                                    1f3d4474f36c60d0708668ffe73a90f6620adef6

                                                                                                    SHA256

                                                                                                    8fb1395d2b4039f12313501241ab23de167f095eb50e89736ed0f63a1ad7730c

                                                                                                    SHA512

                                                                                                    d8039c4da3a1b48594161e99eaadbbb226ce7fdac5996407360447896e8214f5ca7a1e3b695061eb6777368038e9568467c0f81d5ebafd5625f7d673145c359d

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db

                                                                                                    Filesize

                                                                                                    28KB

                                                                                                    MD5

                                                                                                    afb747be72f6a0e516d2cd07d3acdbb1

                                                                                                    SHA1

                                                                                                    d36f2d929afd41fe01ae694ebf404ccfe1adaa7a

                                                                                                    SHA256

                                                                                                    69912cbddad20d59196185a64f12f27c219a68289266e4135dec4fa5c3a98337

                                                                                                    SHA512

                                                                                                    8898432190cc6b44129c95b1b76ddd9dea927330ccf0f4b8e461d1157d3cc70485da975e82a9536571235f0893742496194faa4d0d79bfa457fa531755363cdd

                                                                                                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133849112959841953.txt

                                                                                                    Filesize

                                                                                                    76KB

                                                                                                    MD5

                                                                                                    b49b94a857261ee3f775bcc406ec7f18

                                                                                                    SHA1

                                                                                                    e4f314f86c0322226970651061ca1a760518552b

                                                                                                    SHA256

                                                                                                    4eb06ef459cf17751407de81a3ad68837af46e5a8fb60dbc5fde8443e14eea04

                                                                                                    SHA512

                                                                                                    f8471ba7e8d00631de3449cf73f00613f527c05cbb5a30ddb7a9fbed2a4859d03d4105f5817c1318932be50a6facb4e2945d50f358b1ff1c62fe71c3b0b796cb

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nsa11D9.tmp\System.dll

                                                                                                    Filesize

                                                                                                    11KB

                                                                                                    MD5

                                                                                                    3e6bf00b3ac976122f982ae2aadb1c51

                                                                                                    SHA1

                                                                                                    caab188f7fdc84d3fdcb2922edeeb5ed576bd31d

                                                                                                    SHA256

                                                                                                    4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe

                                                                                                    SHA512

                                                                                                    1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nsbECAF.tmp\System.dll

                                                                                                    Filesize

                                                                                                    11KB

                                                                                                    MD5

                                                                                                    883eff06ac96966270731e4e22817e11

                                                                                                    SHA1

                                                                                                    523c87c98236cbc04430e87ec19b977595092ac8

                                                                                                    SHA256

                                                                                                    44e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82

                                                                                                    SHA512

                                                                                                    60333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nslEC9E.tmp\INetC.dll

                                                                                                    Filesize

                                                                                                    21KB

                                                                                                    MD5

                                                                                                    92ec4dd8c0ddd8c4305ae1684ab65fb0

                                                                                                    SHA1

                                                                                                    d850013d582a62e502942f0dd282cc0c29c4310e

                                                                                                    SHA256

                                                                                                    5520208a33e6409c129b4ea1270771f741d95afe5b048c2a1e6a2cc2ad829934

                                                                                                    SHA512

                                                                                                    581351aef694f2489e1a0977ebca55c4d7268ca167127cefb217ed0d2098136c7eb433058469449f75be82b8e5d484c9e7b6cf0b32535063709272d7810ec651

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nslEC9E.tmp\InstallOptions.dll

                                                                                                    Filesize

                                                                                                    14KB

                                                                                                    MD5

                                                                                                    046074d285897c008499f7f3ad5be114

                                                                                                    SHA1

                                                                                                    159040d616a056ee3498ec86debab58ef5036a55

                                                                                                    SHA256

                                                                                                    254c5ccbce59ad882f7f51d0bf760cabde8c88c5af84e13cc8ad77ba0361055c

                                                                                                    SHA512

                                                                                                    ab7436fda44e340dd5909ddec809c6b569a90d888529ef9320375e1aae7af85afcab8c1c1618551d3fe8d6ae727f7dca97aa8781b5555da759d501d2ccd749e1

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nslEC9E.tmp\System.dll

                                                                                                    Filesize

                                                                                                    10KB

                                                                                                    MD5

                                                                                                    0ff5120f1afd0f295c2baa0f7192d3f8

                                                                                                    SHA1

                                                                                                    bde842d5d11005dcb4ff1d4ea97da31865477697

                                                                                                    SHA256

                                                                                                    4ca5bf1beb4b802914c4d3e2f37861f6ba5ecf969cfeadf5855edf58f647a721

                                                                                                    SHA512

                                                                                                    e049ffd7aace8d136eee007ee4f8dbc2ae8f3dce79d1c633d9654392240f8215787df8a6d08085257db51f28ff2a8023a13333dda3ea7f9bdc8b9c57b605f0a0

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nslEC9E.tmp\ioSpecial.ini

                                                                                                    Filesize

                                                                                                    558B

                                                                                                    MD5

                                                                                                    b8cf7bab4a4976574bc2bf5bf8a97292

                                                                                                    SHA1

                                                                                                    51da6d1884e09855510f28ff8ce5d87e883cc1c4

                                                                                                    SHA256

                                                                                                    3e75f27d8279a213c39ad233a41431063f70e5ebee20ef1da309cb92268f21fe

                                                                                                    SHA512

                                                                                                    9091463950a7ebe15ec65bac083e9eedb8ca518a45b29004daf9e8f3bf68c984876700265d550ba0ae81fabe3dff066c0c29cf00eca1cc475395e8a94996c45a

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nslEC9E.tmp\ioSpecial.ini

                                                                                                    Filesize

                                                                                                    670B

                                                                                                    MD5

                                                                                                    3418cf6d26cc89133798a2ebe6b4c8d9

                                                                                                    SHA1

                                                                                                    bb62dad3c7c3dd11e58152aeea8848e037410cdf

                                                                                                    SHA256

                                                                                                    3d5fc622c0867fb31855ade0129e8ce7e862227d1f5069dcd77cbaeb4f69f9c6

                                                                                                    SHA512

                                                                                                    2c2f40098e3398615cc2a55cee66de1c3788325c3a8e6e824c3d12a1af19f9391467c97664a6aed449ee6f221a07b4920b52d23e32a7dbbeeb5d50ad385caa06

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nsm20ED.tmp\LangDLL.dll

                                                                                                    Filesize

                                                                                                    5KB

                                                                                                    MD5

                                                                                                    cd24bd16342d02d7665ddf304725046a

                                                                                                    SHA1

                                                                                                    6e359d46eb62662c9b497be1996f20a778e88a9b

                                                                                                    SHA256

                                                                                                    7a296c111f54ca35369070b6776e787a4a588605f6f6d5acf3420731af7bcf23

                                                                                                    SHA512

                                                                                                    a9e6319258cf05d12457fef3a2c8965c4180ebab39259e441ef0a2ca38b160f7a27184ecf8f84295b8071add95e4733d0233be2cb369a58ce8a39d8010cad0e2

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nsm20ED.tmp\nsDialogs.dll

                                                                                                    Filesize

                                                                                                    9KB

                                                                                                    MD5

                                                                                                    dbdbf4017ff91c9de328697b5fd2e10a

                                                                                                    SHA1

                                                                                                    b597a5e9a8a0b252770933feed51169b5060a09f

                                                                                                    SHA256

                                                                                                    be60a00f32924ccbe03f9914e33b8e1ad8c8a1ca442263a69896efba74925b36

                                                                                                    SHA512

                                                                                                    3befc15aab0a5dbe7fde96155b0499d385f2799b1a2d47ce04f37b5804006b1c6c4fff93d3cedb56a2a8172b23752b6f9dc6168cfce3596b91def3247836cf10

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\taskmgr.exe

                                                                                                    Filesize

                                                                                                    9KB

                                                                                                    MD5

                                                                                                    bbf8f7e57a66bd16a2809e035f6b9918

                                                                                                    SHA1

                                                                                                    ffd985bca84ba0b6d96a634771bc42dc1064da72

                                                                                                    SHA256

                                                                                                    3ba294e5207000f0712d8616bde121ef110f88c79edb2d3143416cc749f549c1

                                                                                                    SHA512

                                                                                                    ee83e74c33c8d0cd48696f045dd4cb41566095ea0f7256168d1e0db2c49a93302c787b96306d9227b1b8f6e8ae1837d21525f8c4e84eff0054825478099352ec

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\~~~~~~~~~m.big

                                                                                                    Filesize

                                                                                                    2B

                                                                                                    MD5

                                                                                                    54d54a126a783bc9cba8c06137136943

                                                                                                    SHA1

                                                                                                    e066133fdba5e5077ee034d757dc6dfcebd12979

                                                                                                    SHA256

                                                                                                    5312fb609f60384731fcfcb95deef3602239bf61f865a07bd8e08d818d22e9fa

                                                                                                    SHA512

                                                                                                    4191c6e4ae49de201d2d6da4a5ae2be6ff91f4ad0e24214d374d36035371f5c9495b412fff063786338e75277c2d2221ad56cd23d8199ae3e333745fb9fcf7f1

                                                                                                  • C:\Users\Admin\AppData\Roaming\Aero.dll

                                                                                                    Filesize

                                                                                                    67KB

                                                                                                    MD5

                                                                                                    ab4215e3e2defed379e64c1acbd251fe

                                                                                                    SHA1

                                                                                                    7de78373ae36f40b1633773418713e718a429f48

                                                                                                    SHA256

                                                                                                    7cf97c5caaa325bea7c0e36c2456a625abff2a563b1d30d8eea3d238bf28be32

                                                                                                    SHA512

                                                                                                    c04ba93fb24cd82459254b2f789757f90ac7053ba30809eacf0173b55055ac2ffbfb718d377b92ccc65e25d228baba8f053d2fd8e2cf4df78afcf2cac8aa9179

                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms

                                                                                                    Filesize

                                                                                                    8KB

                                                                                                    MD5

                                                                                                    2d2b150a9c2cb5247b14d6ce832e8366

                                                                                                    SHA1

                                                                                                    49fb4ebf9d8acac233562bf5ed18322824e9bb02

                                                                                                    SHA256

                                                                                                    5276b5627c834fe99c35547f0d4f729f128d14e98c716bcfcf665e3e58c60872

                                                                                                    SHA512

                                                                                                    68972e4ab41b4b8afceb24302d58c84724ff4a4700e701f0ffbb9183241e41d4e64af77a1af574f2c2de5cd6e885c163bfdf456f0166f02668f3a97b74ce647f

                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms

                                                                                                    Filesize

                                                                                                    8KB

                                                                                                    MD5

                                                                                                    5ca0b747b101d1444b58312f7fcce8cd

                                                                                                    SHA1

                                                                                                    8d2dd83454a4426547110d0fc1dccc5c8cbcbfac

                                                                                                    SHA256

                                                                                                    ea1b8088c01e68cd6f0b3e28bb6ccfe0c54d43443011dead3a35b840557fe6bd

                                                                                                    SHA512

                                                                                                    6383d14279f32fd322ae0e23573dee71f55f70641e9af456e6c635b836cc8c1c814edadadf9260540a96d3e630762387608bca5f0e0354d63c1385146671da2b

                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms

                                                                                                    Filesize

                                                                                                    8KB

                                                                                                    MD5

                                                                                                    d39a16a0a0107ec95a7b6d3320142706

                                                                                                    SHA1

                                                                                                    5adb4dd3f7902bc68309430a098cefaa345de890

                                                                                                    SHA256

                                                                                                    ba476c400e01c1cc6a190d06e62dfa0ceb25ec21ed1d6c936980e96f881b7e88

                                                                                                    SHA512

                                                                                                    049913345da5ee8dfda8fe0139b55afef958d4af7fcad989cc9abf8f82c7fc77f5ee22163653ef4f40af7d6ffaf7ebeed78072d32210a4f8b9b2c3aa96d989e2

                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms

                                                                                                    Filesize

                                                                                                    8KB

                                                                                                    MD5

                                                                                                    e46513ff7c9bdaf4c0c54406ada055fb

                                                                                                    SHA1

                                                                                                    4ed75218c5b4b8f5e20bbba77307951c375424ba

                                                                                                    SHA256

                                                                                                    32a1c41731220013813cc31d7491f6d112bc06cb063614d295cc1d55e2fc4f8e

                                                                                                    SHA512

                                                                                                    a413b3cb0cb119d61c1f0c677858a1f6a9cac80b1b2a4530cd06c82efb98bc50af0e8f723976670bb40a05e637985841dfbaf7771756c98e857bcf39847b23ec

                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.jpg

                                                                                                    Filesize

                                                                                                    51KB

                                                                                                    MD5

                                                                                                    bd74a3c50fd08981e89d96859e176d68

                                                                                                    SHA1

                                                                                                    0a98b96aefe60b96722d587b7c3aabcd15927618

                                                                                                    SHA256

                                                                                                    ab305218ee0e95fa553885fa52f3a25dcc13b4deade8b7993ccb9f230a272837

                                                                                                    SHA512

                                                                                                    0704243904abc3691177e34606fe2741945f69cf7ecb898655d98e81b145bf707d20cfa0af01fb3aa1cd170e2f3ce8f625b1612e0fcf5eba01f770617ffc9f1e

                                                                                                  • C:\Users\Admin\AppData\Roaming\Registry.dll

                                                                                                    Filesize

                                                                                                    56KB

                                                                                                    MD5

                                                                                                    a93830a0101fce548a630b3256afa3da

                                                                                                    SHA1

                                                                                                    62b27948b9ddb08ac2530cb030b4ba1868ac0148

                                                                                                    SHA256

                                                                                                    64c1f86110e60108e594e692e5e26a491f6c202fa4352841eb3d05265e073001

                                                                                                    SHA512

                                                                                                    1ba0e66c4e02480beb8cdb5f581677d96b49523cb70d94927a2dd94d0835309ef23f181729f3c4bd00cb0dee8fda4f9978ed837943e192d308328cd8fe6e3d8f

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe

                                                                                                    Filesize

                                                                                                    373KB

                                                                                                    MD5

                                                                                                    d6c6b080a5164efbf01db30a093e62dc

                                                                                                    SHA1

                                                                                                    75158a5ddedc315e579735f885f2cda820d9927f

                                                                                                    SHA256

                                                                                                    5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c

                                                                                                    SHA512

                                                                                                    40be1f832032e69c1d8fe8dbc633753bc8a5a235e917e3f7d476b4d933e86e585124121b5602c233bfd984b21100beb26e09fc3630df90ff4a56eea179749591

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe

                                                                                                    Filesize

                                                                                                    3.5MB

                                                                                                    MD5

                                                                                                    d79f3ca8e35312e5e8532da17bd3f4a4

                                                                                                    SHA1

                                                                                                    4bac93ec0e08b26f5b4ab93995d4c26b06da7a5e

                                                                                                    SHA256

                                                                                                    d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94

                                                                                                    SHA512

                                                                                                    b0c53b8c75892b920761a562371ad3b3c5c8172d36398e766d836d920c8d0c0d252ab79174a9e0dcc07b7ed4b2f7f13330a3c7492b8b8c33287e7b67899023c1

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe

                                                                                                    Filesize

                                                                                                    382KB

                                                                                                    MD5

                                                                                                    92f9da918c01838f2b72326944a4db58

                                                                                                    SHA1

                                                                                                    118c626dcc99a011acce5673baf6d14523a52c59

                                                                                                    SHA256

                                                                                                    22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883

                                                                                                    SHA512

                                                                                                    812cfff5faf4bbff968666d51cce47a110dc4133c7b730e11f5861a23376b7146b22a378b1998dd83e5776126653fe1bc0abf2c5b9101a0308308a24b718f087

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe

                                                                                                    Filesize

                                                                                                    224KB

                                                                                                    MD5

                                                                                                    8c9bb73ea61389d67e711cf4f827ffe8

                                                                                                    SHA1

                                                                                                    0169c261bb101feb583ae883eed6a8df5b1123e3

                                                                                                    SHA256

                                                                                                    5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef

                                                                                                    SHA512

                                                                                                    9ee5b878adb47c9a592c5352d758b160756a0394055e974d9a2e0423ba6037a0a378208e2a9c5d005334701018260a66b93cc91d1ff61912f640922d7189ace0

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exe

                                                                                                    Filesize

                                                                                                    308KB

                                                                                                    MD5

                                                                                                    3fd0e08a21ed5da0526b57bcc535a899

                                                                                                    SHA1

                                                                                                    0b7d364ac8ed429f4510fa055a81e4920f78594b

                                                                                                    SHA256

                                                                                                    04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221

                                                                                                    SHA512

                                                                                                    3308ffccfeb9d5d03337f4f8e2d3b25c67d95db449b5a29bc36a2bb92cb254c2a9794720e6aaec41850fd23d9adf921ce1e99d8dfb1ccc9c8d2f04cc753eccce

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe

                                                                                                    Filesize

                                                                                                    384KB

                                                                                                    MD5

                                                                                                    79535b332bdfc03f51ff90f099d1b78a

                                                                                                    SHA1

                                                                                                    16368bef8aa2b55589ec4d20c55513421ed91c98

                                                                                                    SHA256

                                                                                                    e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715

                                                                                                    SHA512

                                                                                                    24524f7942ff275cafbd4677db9715128712512ae4986af74f69d00ba97e73c0fa1faec89b08c0186819d58ad1ec6531d1ecc3fe9db291871d6ade3a859057bf

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Blocker.gdri-2f3409bb36d5411d1a02ebd189c305e2b20f744c204f15eef9be459ec398448b.exe

                                                                                                    Filesize

                                                                                                    89KB

                                                                                                    MD5

                                                                                                    7714fccf2d8f60a76f2f77ba55666437

                                                                                                    SHA1

                                                                                                    42799ab23f8199f334a001a84438a90d3dee92fb

                                                                                                    SHA256

                                                                                                    2f3409bb36d5411d1a02ebd189c305e2b20f744c204f15eef9be459ec398448b

                                                                                                    SHA512

                                                                                                    3d6aba025680e8f57bdc68250f5b03bad43e14d886136f7c061af274e445e5a3a6e954a3c695d434e29adafff8d14fbc2f6c3732219421db86d0debbbfadebcf

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Blocker.jouu-1a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b.exe

                                                                                                    Filesize

                                                                                                    179KB

                                                                                                    MD5

                                                                                                    611e378188460af33f5bdaeb969e9a42

                                                                                                    SHA1

                                                                                                    1b726244dab741d4909c01b747516df45ccbb8ba

                                                                                                    SHA256

                                                                                                    1a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b

                                                                                                    SHA512

                                                                                                    e2f691e09aa4b9d8f5d87f812967688ca5f9dadaf55fd4b0aca75bea1452b0f5d3b6c1c2474a1a264461cd996ae5f261e6db004deab5e8c8f184035cc23745a9

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Cryakl.anq-f24b74c9ab283b89c0a173092c5fe869651eccae96b6c7df628b958a31363ff5.exe

                                                                                                    Filesize

                                                                                                    498KB

                                                                                                    MD5

                                                                                                    14011d295197f6207fb4d813eb8faf87

                                                                                                    SHA1

                                                                                                    3a651083b51896d593358ef68243f797a365412a

                                                                                                    SHA256

                                                                                                    f24b74c9ab283b89c0a173092c5fe869651eccae96b6c7df628b958a31363ff5

                                                                                                    SHA512

                                                                                                    674660e569ae8859955bfc478022d4a5723b8ed0d818687e05b41c0e46431324216da012f8550a37235fd20610c395460d1ac21b1d635eab7b0bc27cd75b40ca

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Foreign.giny-ff20937831ae585f931be8aebb0cf4cb4e56b20023310bb99f1b48b0ec75c945.exe

                                                                                                    Filesize

                                                                                                    60KB

                                                                                                    MD5

                                                                                                    ff39a7c8614faa4ed935fc98c70abe61

                                                                                                    SHA1

                                                                                                    0bf45376b68df92ee9445441d6a3c68b68da188e

                                                                                                    SHA256

                                                                                                    ff20937831ae585f931be8aebb0cf4cb4e56b20023310bb99f1b48b0ec75c945

                                                                                                    SHA512

                                                                                                    3e2fd5997bcb411e95b396c0927a1bb942b347266fe3eb80fb3dd1278ecd5b8404506f1e63012799ed3941be78cc21dac9f3fd11cc2e7f25871b7d141564a690

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exe

                                                                                                    Filesize

                                                                                                    645KB

                                                                                                    MD5

                                                                                                    bc71d446ce77809677db5e027771a049

                                                                                                    SHA1

                                                                                                    41664bb2ed8781c1b67a3870b56ed9576b9a1227

                                                                                                    SHA256

                                                                                                    4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca

                                                                                                    SHA512

                                                                                                    c84648e5c2e0bde139f5be9cf7204d5fe7fdc93769b773e31f41153d430871eb1c622a5b3c31da94072fa925a94379f2809bbd96c9a0068e87297f4d04f3835e

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Locky.yr-3c0cf985f5fc5089419a8c5e29759466c96205ab6534140aad4e245acb5c920d.exe

                                                                                                    Filesize

                                                                                                    114KB

                                                                                                    MD5

                                                                                                    b64b25ecb8b7087106f5656c28004e2d

                                                                                                    SHA1

                                                                                                    e6991557888156cd1d1aea8d27483b8dbc336dcb

                                                                                                    SHA256

                                                                                                    3c0cf985f5fc5089419a8c5e29759466c96205ab6534140aad4e245acb5c920d

                                                                                                    SHA512

                                                                                                    15911e03053994d6b96bc8cbee64b5a8bb81dde6fea33eddf5816f2a6cb033d258bddc368e06e1c028e6b2fcb21b64c3ff69519d5ecc269ac9410129200650b5

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exe

                                                                                                    Filesize

                                                                                                    6.7MB

                                                                                                    MD5

                                                                                                    95f7b6bab2ed4f96f7efabefd65a0c90

                                                                                                    SHA1

                                                                                                    49d7c444ace78047c5ac2a0261f86997b84793db

                                                                                                    SHA256

                                                                                                    cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1

                                                                                                    SHA512

                                                                                                    c90412072e22bbca16b93d0ec68eb71b64fbbc763fdc2c02fec0fd0c8b257a2efb408836ffa7f27c44b3ca75f9a8585e78d84ba5ff7b713f65deab0dcefa2dd2

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Purga.p-d59a1c9544e90afd7e70fdce1d8d7f72025143c5d2a2b85d6537dedfe4c0fe73.exe

                                                                                                    Filesize

                                                                                                    170KB

                                                                                                    MD5

                                                                                                    4eacf26dedae4eb5220ab62b8cb06308

                                                                                                    SHA1

                                                                                                    b92e8e316c09ebaf5497e2bdfd233afec38f4ba6

                                                                                                    SHA256

                                                                                                    d59a1c9544e90afd7e70fdce1d8d7f72025143c5d2a2b85d6537dedfe4c0fe73

                                                                                                    SHA512

                                                                                                    69dde601c9f058b5d37162ba15471e961559958bb624a4683f1b48bec9e16af4bcd523ba598f5a937641a3347ae3c19f0d6cc0671083244c1202b4c4040d1323

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Shade.yn-be2dc8d21f6ce018142769dda8d77b63a526ca77dbc4198635a160aa527f7ef9.exe

                                                                                                    Filesize

                                                                                                    882KB

                                                                                                    MD5

                                                                                                    487101a3806c4448a71caaff6e3ecaf1

                                                                                                    SHA1

                                                                                                    ccd0eb3fa95beaef0d706b3be98f7e26352a25bb

                                                                                                    SHA256

                                                                                                    be2dc8d21f6ce018142769dda8d77b63a526ca77dbc4198635a160aa527f7ef9

                                                                                                    SHA512

                                                                                                    87aa1d6abf9b405a9a847c3f8d6c0bb3750e85db29867a610b27848292cac03565b3825f5fc53495eea781ac55b33ced31835a1833322653e9b3b31d449dbfb3

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe

                                                                                                    Filesize

                                                                                                    212KB

                                                                                                    MD5

                                                                                                    137f2dcee6f3fd645a1c523b19a2d30d

                                                                                                    SHA1

                                                                                                    38d3bcda8aa75a1b36735796266d214d2eb8c903

                                                                                                    SHA256

                                                                                                    f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777

                                                                                                    SHA512

                                                                                                    ec9a4646b546956cfd435a4669581406d7a8b71efe8b7132adf7817af5d4f9694ea794d1c0de97db724f915a3d8744986d21f2b5217b85c15b62fc11b018571b

                                                                                                  • C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Zerber.pfu-72548d588dd3ed6f21f17d16b41913a513f4bd9d5a151d2fa4bbb6070ed85d7f.exe

                                                                                                    Filesize

                                                                                                    496KB

                                                                                                    MD5

                                                                                                    1b357bb6bc155d179f7d5eede82b206d

                                                                                                    SHA1

                                                                                                    ae4a2669b00036af1d7d652f0004c145e11f78a5

                                                                                                    SHA256

                                                                                                    72548d588dd3ed6f21f17d16b41913a513f4bd9d5a151d2fa4bbb6070ed85d7f

                                                                                                    SHA512

                                                                                                    73218677f6526e57d621fa21a87914cc3943abb0934c3a2e80476d1047ece5706c79e385747442798917b7a18fb6e9a7284f1063ade407a62c664be3f0bb7c21

                                                                                                  • memory/320-151-0x0000000000400000-0x0000000001A58000-memory.dmp

                                                                                                    Filesize

                                                                                                    22.3MB

                                                                                                  • memory/320-2351-0x0000000000400000-0x0000000001A58000-memory.dmp

                                                                                                    Filesize

                                                                                                    22.3MB

                                                                                                  • memory/468-87-0x0000000072380000-0x00000000723B9000-memory.dmp

                                                                                                    Filesize

                                                                                                    228KB

                                                                                                  • memory/468-52-0x0000000000400000-0x00000000006F1000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.9MB

                                                                                                  • memory/468-102-0x0000000072380000-0x00000000723B9000-memory.dmp

                                                                                                    Filesize

                                                                                                    228KB

                                                                                                  • memory/468-101-0x0000000000400000-0x00000000006F1000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.9MB

                                                                                                  • memory/960-901-0x00000000026F0000-0x00000000026FB000-memory.dmp

                                                                                                    Filesize

                                                                                                    44KB

                                                                                                  • memory/1212-1272-0x000000001B960000-0x000000001BE2E000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.8MB

                                                                                                  • memory/1404-159-0x0000000003400000-0x0000000003418000-memory.dmp

                                                                                                    Filesize

                                                                                                    96KB

                                                                                                  • memory/1404-618-0x0000000003400000-0x0000000003418000-memory.dmp

                                                                                                    Filesize

                                                                                                    96KB

                                                                                                  • memory/1628-3408-0x0000000000400000-0x000000000044F000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/1824-1293-0x00000000010B0000-0x0000000001121000-memory.dmp

                                                                                                    Filesize

                                                                                                    452KB

                                                                                                  • memory/1824-3262-0x00000000010B0000-0x0000000001121000-memory.dmp

                                                                                                    Filesize

                                                                                                    452KB

                                                                                                  • memory/1824-3244-0x00000000010B0000-0x0000000001121000-memory.dmp

                                                                                                    Filesize

                                                                                                    452KB

                                                                                                  • memory/1824-3249-0x00000000010B0000-0x0000000001121000-memory.dmp

                                                                                                    Filesize

                                                                                                    452KB

                                                                                                  • memory/1824-1290-0x00000000010B0000-0x0000000001121000-memory.dmp

                                                                                                    Filesize

                                                                                                    452KB

                                                                                                  • memory/3584-1273-0x0000000000400000-0x00000000004A6000-memory.dmp

                                                                                                    Filesize

                                                                                                    664KB

                                                                                                  • memory/3584-3123-0x0000000000400000-0x00000000004A6000-memory.dmp

                                                                                                    Filesize

                                                                                                    664KB

                                                                                                  • memory/3584-2557-0x0000000000400000-0x00000000004A6000-memory.dmp

                                                                                                    Filesize

                                                                                                    664KB

                                                                                                  • memory/4252-146-0x0000000002700000-0x000000000270E000-memory.dmp

                                                                                                    Filesize

                                                                                                    56KB

                                                                                                  • memory/4476-1292-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                    Filesize

                                                                                                    328KB

                                                                                                  • memory/4476-1285-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                    Filesize

                                                                                                    328KB

                                                                                                  • memory/4476-1294-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                    Filesize

                                                                                                    328KB

                                                                                                  • memory/4476-162-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                    Filesize

                                                                                                    328KB

                                                                                                  • memory/4748-122-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                                    Filesize

                                                                                                    72KB

                                                                                                  • memory/4748-631-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                                    Filesize

                                                                                                    72KB

                                                                                                  • memory/4872-3405-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/4872-3404-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/5208-92-0x0000000000400000-0x00000000006F1000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.9MB

                                                                                                  • memory/5208-118-0x0000000071F40000-0x0000000071F79000-memory.dmp

                                                                                                    Filesize

                                                                                                    228KB

                                                                                                  • memory/5208-1678-0x0000000000400000-0x00000000006F1000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.9MB

                                                                                                  • memory/5208-902-0x0000000000400000-0x00000000006F1000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.9MB

                                                                                                  • memory/5208-3127-0x0000000000400000-0x00000000006F1000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.9MB

                                                                                                  • memory/5208-16591-0x0000000071F40000-0x0000000071F79000-memory.dmp

                                                                                                    Filesize

                                                                                                    228KB

                                                                                                  • memory/5988-117-0x0000000000400000-0x0000000000443000-memory.dmp

                                                                                                    Filesize

                                                                                                    268KB

                                                                                                  • memory/7004-3256-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                                                    Filesize

                                                                                                    536KB

                                                                                                  • memory/7004-3129-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                                                    Filesize

                                                                                                    536KB

                                                                                                  • memory/7004-3128-0x0000000000400000-0x0000000000486000-memory.dmp

                                                                                                    Filesize

                                                                                                    536KB

                                                                                                  • memory/7816-3125-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/7816-3400-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/7816-3126-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/7908-2559-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/7908-2560-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/7908-2558-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/7908-2566-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB