Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

18/10/2022, 01:25

221018-btf3lsebgp 1

18/10/2022, 01:23

221018-bsbfqsdhf5 1

17/10/2022, 09:00

221017-kyevsabca2 9

17/10/2022, 09:00

221017-kyaaasbbh7 1

17/10/2022, 08:48

221017-kqj5jabbd6 8

17/10/2022, 08:37

221017-kjge3abcer 8

Analysis

  • max time kernel
    225s
  • max time network
    251s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2022, 08:48

General

  • Target

    http://we.tl/t-7si6bGYMbk

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 43 IoCs
  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Modifies registry class 35 IoCs
  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://we.tl/t-7si6bGYMbk
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4996
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4996 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3316
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3256
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb153346f8,0x7ffb15334708,0x7ffb15334718
      2⤵
        PID:4456
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
        2⤵
          PID:780
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2512
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:8
          2⤵
            PID:4292
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3784 /prefetch:1
            2⤵
              PID:2368
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:1
              2⤵
                PID:4084
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4380 /prefetch:1
                2⤵
                  PID:1720
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4088 /prefetch:8
                  2⤵
                    PID:460
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4068 /prefetch:8
                    2⤵
                      PID:2328
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:8
                      2⤵
                        PID:4576
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                        2⤵
                        • Drops file in Program Files directory
                        PID:4704
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff632e85460,0x7ff632e85470,0x7ff632e85480
                          3⤵
                            PID:1524
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3628
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6464 /prefetch:1
                          2⤵
                            PID:4588
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:1
                            2⤵
                              PID:2876
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6208 /prefetch:1
                              2⤵
                                PID:1516
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:1
                                2⤵
                                  PID:3636
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:1
                                  2⤵
                                    PID:2652
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6588 /prefetch:1
                                    2⤵
                                      PID:1408
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6600 /prefetch:1
                                      2⤵
                                        PID:5160
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6912 /prefetch:1
                                        2⤵
                                          PID:5252
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6868 /prefetch:1
                                          2⤵
                                            PID:5344
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=7368 /prefetch:8
                                            2⤵
                                              PID:5360
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7876 /prefetch:8
                                              2⤵
                                                PID:5460
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7964 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5572
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4184 /prefetch:8
                                                2⤵
                                                  PID:5972
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3076 /prefetch:8
                                                  2⤵
                                                    PID:1464
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:8
                                                    2⤵
                                                      PID:2664
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3228 /prefetch:8
                                                      2⤵
                                                        PID:5772
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1724 /prefetch:8
                                                        2⤵
                                                          PID:5848
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3220 /prefetch:2
                                                          2⤵
                                                            PID:5892
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4376 /prefetch:8
                                                            2⤵
                                                              PID:5940
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4228 /prefetch:8
                                                              2⤵
                                                                PID:5968
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2084,1688339155719107802,5361667292116768736,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4068 /prefetch:8
                                                                2⤵
                                                                  PID:2056
                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                1⤵
                                                                  PID:2688
                                                                • C:\Windows\System32\rundll32.exe
                                                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                  1⤵
                                                                    PID:4988
                                                                  • C:\Users\Admin\Downloads\slam ransomware builder installer.exe
                                                                    "C:\Users\Admin\Downloads\slam ransomware builder installer.exe"
                                                                    1⤵
                                                                    • Executes dropped EXE
                                                                    • Checks computer location settings
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:3960
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /c cd C:\Users\Admin\Desktop & del /Q /F slam_ransomware_builder.url & taskkill /F /IM slam.exe & exit
                                                                      2⤵
                                                                        PID:4688
                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                          taskkill /F /IM slam.exe
                                                                          3⤵
                                                                          • Kills process with taskkill
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:4580
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /c cd C:\Users\Admin\Desktop & del /Q /F slam_ransomware_builder.url & exit
                                                                        2⤵
                                                                          PID:4140
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /c start C:\slam_ransomware_builder\start.exe & exit
                                                                          2⤵
                                                                            PID:5308
                                                                            • C:\slam_ransomware_builder\start.exe
                                                                              C:\slam_ransomware_builder\start.exe
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • Checks computer location settings
                                                                              PID:4604
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4561.tmp\start.bat" C:\slam_ransomware_builder\start.exe"
                                                                                4⤵
                                                                                  PID:3144
                                                                                  • C:\slam_ransomware_builder\slam.exe
                                                                                    slam.exe
                                                                                    5⤵
                                                                                    • Executes dropped EXE
                                                                                    • Loads dropped DLL
                                                                                    • Modifies registry class
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:5020
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      "cmd" /c MSBuild.exe ConsoleApp2\ConsoleApp2.sln
                                                                                      6⤵
                                                                                        PID:6128
                                                                                        • C:\slam_ransomware_builder\MSBuild.exe
                                                                                          MSBuild.exe ConsoleApp2\ConsoleApp2.sln
                                                                                          7⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          PID:1908
                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Csc.exe
                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Csc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\tmp8519358ee50c489d8f14fef843c03efc.rsp"
                                                                                            8⤵
                                                                                              PID:1180
                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4349.tmp" "c:\slam_ransomware_builder\ConsoleApp2\ConsoleApp2\obj\Debug\CSCC88ABF0D6CC3418C8D9E9D76A76A70.TMP"
                                                                                                9⤵
                                                                                                  PID:1172
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "cmd" /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /out:Decrypter.exe src.cs /win32manifest:App.config
                                                                                            6⤵
                                                                                              PID:2360
                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /out:Decrypter.exe src.cs /win32manifest:App.config
                                                                                                7⤵
                                                                                                  PID:5536
                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4898.tmp" "c:\slam_ransomware_builder\CSCD8E8C23022524AF4848011A0489C8CB.TMP"
                                                                                                    8⤵
                                                                                                      PID:836
                                                                                      • C:\slam_ransomware_builder\test.exe
                                                                                        "C:\slam_ransomware_builder\test.exe"
                                                                                        1⤵
                                                                                        • Executes dropped EXE
                                                                                        • Modifies extensions of user files
                                                                                        • Checks computer location settings
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:4188
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /c taskkill /F /IM BackupExecAgentBrowser* & taskkill /F /IM BackupExecDiveciMediaService* & taskkill /F /IM BackupExecJobEngine* & taskkill /F /IM BackupExecManagementService* & taskkill /F /IM vss* & taskkill /F /IM sql* & taskkill /F /IM svc$* & taskkill /F /IM memtas* & taskkill /F /IM sophos* & taskkill /F /IM veeam* & taskkill /F /IM backup* & taskkill /F /IM GxVss* & taskkill /F /IM GxBlr* & taskkill /F /IM GxFWD* & taskkill /F /IM GxCVD* & taskkill /F /IM GxCIMgr* & taskkill /F /IM DefWatch* & taskkill /F /IM ccEvtMgr* & taskkill /F /IM SavRoam* & taskkill /F /IM RTVscan* & taskkill /F /IM QBFCService* & taskkill /F /IM Intuit.QuickBooks.FCS* & taskkill /F /IM YooBackup* & taskkill /F /IM YooIT* & taskkill /F /IM zhudongfangyu* & taskkill /F /IM sophos* & taskkill /F /IM stc_raw_agent* & taskkill /F /IM VSNAPVSS* & taskkill /F /IM QBCFMonitorService* & taskkill /F /IM VeeamTransportSvc* & taskkill /F /IM VeeamDeploymentService* & taskkill /F /IM VeeamNFSSvc* & taskkill /F /IM veeam* & taskkill /F /IM PDVFSService* & taskkill /F /IM BackupExecVSSProvider* & taskkill /F /IM BackupExecAgentAccelerator* & taskkill /F /IM BackupExecRPCService* & taskkill /F /IM AcrSch2Svc* & taskkill /F /IM AcronisAgent* & taskkill /F /IM CASAD2DWebSvc* & taskkill /F /IM CAARCUpdateSvc* & taskkill /F /IM TeamViewer*
                                                                                          2⤵
                                                                                            PID:1040
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM BackupExecAgentBrowser*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:4200
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM BackupExecDiveciMediaService*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5920
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM BackupExecJobEngine*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5580
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM BackupExecManagementService*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:1452
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM vss*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:3980
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM sql*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:4796
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM svc$*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2092
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM memtas*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:1776
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM sophos*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5948
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM veeam*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:3548
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM backup*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:3236
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM GxVss*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:3696
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM GxBlr*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:3632
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM GxFWD*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:6028
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM GxCVD*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2476
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM GxCIMgr*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5572
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM DefWatch*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:6112
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM ccEvtMgr*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:4736
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM SavRoam*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:4116
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM RTVscan*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5076
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM QBFCService*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:1136
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM Intuit.QuickBooks.FCS*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:4704
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM YooBackup*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:3592
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM YooIT*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5692
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM zhudongfangyu*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5480
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM sophos*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:3780
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM stc_raw_agent*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5520
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM VSNAPVSS*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5532
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM QBCFMonitorService*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5688
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM VeeamTransportSvc*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2132
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM VeeamDeploymentService*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:6056
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM VeeamNFSSvc*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:4480
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM veeam*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:980
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM PDVFSService*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:1628
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM BackupExecVSSProvider*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:3856
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM BackupExecAgentAccelerator*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:224
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM BackupExecRPCService*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5652
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM AcrSch2Svc*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:4592
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM AcronisAgent*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2304
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM CASAD2DWebSvc*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:1868
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM CAARCUpdateSvc*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              PID:2688
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM TeamViewer*
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              PID:2680
                                                                                          • C:\Windows\SysWOW64\NOTEPAD.EXE
                                                                                            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\README.txt
                                                                                            2⤵
                                                                                            • Opens file in notepad (likely ransom note)
                                                                                            PID:3096

                                                                                        Network

                                                                                        MITRE ATT&CK Enterprise v6

                                                                                        Replay Monitor

                                                                                        Loading Replay Monitor...

                                                                                        Downloads

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                                                                                          Filesize

                                                                                          717B

                                                                                          MD5

                                                                                          ec8ff3b1ded0246437b1472c69dd1811

                                                                                          SHA1

                                                                                          d813e874c2524e3a7da6c466c67854ad16800326

                                                                                          SHA256

                                                                                          e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

                                                                                          SHA512

                                                                                          e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          3bc1443386ca1911f35759eba2cf52d1

                                                                                          SHA1

                                                                                          7b4dbb3d168eb9e88adc9a4899657768c7322d8a

                                                                                          SHA256

                                                                                          3f172427dcb8fb168768a5a0831c48e97724b0984f03b7fb4d2c38d112368846

                                                                                          SHA512

                                                                                          04d4bf07487ad54cba1f0dd9e2462cc4da67b7ca20a3d75f8518469bae11556f2ce7238bcd75d09715e434bc789fd0c88fe61a1d615f98a88f5d5e623c9f8cd5

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\612EB2BBFFA412DE310C8385EAA972AE

                                                                                          Filesize

                                                                                          503B

                                                                                          MD5

                                                                                          358d9db3d84f18ed8c5ff78507f95745

                                                                                          SHA1

                                                                                          9ee4ac2081c34cc66bd0f3ff2e852592cfd1d34e

                                                                                          SHA256

                                                                                          db855bf96f52b779fd59e96709519d70f54b15f595bfdbe1c7fd8b79be122946

                                                                                          SHA512

                                                                                          d5a76e162fe0736ecde8f8d696a78adea1236c321e299b1e2cb94e162304b5d5b8c78e202597aec5ef8a1b2833736a66b24c25c7ace8b1bb3d86c07c50fe4001

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          5c344864df047fd721d1377d3304ff0b

                                                                                          SHA1

                                                                                          c014aff02897a166fa47b9171c87b733a24eff02

                                                                                          SHA256

                                                                                          b8a7647b51be2904afada746d0cb0791a266507435466dfd60c75dbd7509e16b

                                                                                          SHA512

                                                                                          b2ca080909057d57d4e38b22d72834f51e044d24a643c5a0440c1f1a3baaa0139e2244a4ad015e0b839116c42ccb8826ee071e2db90763c02f4dcfd588b76bf8

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                                          Filesize

                                                                                          471B

                                                                                          MD5

                                                                                          df08ee6338ea21249c086d137a7c8e8a

                                                                                          SHA1

                                                                                          8c84963709f58c0959a41069088b18a44d9b1935

                                                                                          SHA256

                                                                                          e56f9839411b377c8ed9627188f1e88e42434e0bf24084f7c0eebb714a1e50b7

                                                                                          SHA512

                                                                                          851d4aa3b218ee83e9e601baca06c1ee2457d278d05b303120411db000dc7b3b0ea9a06e9744063dd7692002dc35f537f86f5563e456cc650d50dc733bccdc36

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          d35cb93ad78a7e29785d4eb5fc25ab0e

                                                                                          SHA1

                                                                                          d1c0a3b38708b84a4198989ec13f086bfb79bb56

                                                                                          SHA256

                                                                                          7a16d6bd9ec044e74c7327462bd175518d199fe8fd2fe7d69ded48b6c707366c

                                                                                          SHA512

                                                                                          2148ec93a665e1a899ae1ee79b01968195e4c62378afd7feb519fe53944e9f18e466e89841cb9ee33231ad3f47ff933584732222fbe97bb928e497e7a7139cd8

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D6243C18F0F8F9AEC6638DD210F1984_FD4F3AB5065583C0DC5D6551E486247B

                                                                                          Filesize

                                                                                          471B

                                                                                          MD5

                                                                                          9d0d86b3c55d84e4eeb79db7eb51dbe9

                                                                                          SHA1

                                                                                          becc572560f027b77a2e8d7c68c5a2f26b3df24c

                                                                                          SHA256

                                                                                          2257c1309e27d56b6a389438958c2c220f4611eca403946273af43adda90d25e

                                                                                          SHA512

                                                                                          2183c044adfa85a0124b587eb59968881cf0c4b01a462077e3bbe36d8cd13d3ee4d708be617d770783def8d3a4dad04128e0426a6c3fb3fd9bb16cd2cfd10783

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_A250FA44615D767A3F3B7AFA283419C9

                                                                                          Filesize

                                                                                          279B

                                                                                          MD5

                                                                                          41bf6f5bc023a1b62dddbf3a03cdc87a

                                                                                          SHA1

                                                                                          83cabb42c754e9c1538e5ebf6c56696d73f237f8

                                                                                          SHA256

                                                                                          5de11a60d23b08916fd76f7242b24555ac6ea0c7b9bfca28fa568925da789152

                                                                                          SHA512

                                                                                          68c8925beb701dc497553045585221edcbbab07ee7cd4cc794d1096737cf415d44ecb3b07332e084cf7204ee0807cff81e04290bde6e2035f64919adb6ff1685

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          d59a05ba9c5285f503985b3b3cb8c7b9

                                                                                          SHA1

                                                                                          b0e1468c2510508f4c4f258b7af5b2d389d02b1c

                                                                                          SHA256

                                                                                          0166287ab72cc9f6e35c7c0d5488a8bb5fcf150052ac087f1720d00f56bbc085

                                                                                          SHA512

                                                                                          ca1c1b6acb5ffd191109a57c8537f61baef343bd87298dab440e91a7cd6e7a3ba3322dcf5b79247ae9c47780c8331889a68734d8a1e31282ed887d661dd4ae4c

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          cffb3bb22aad98d90d0869f156630add

                                                                                          SHA1

                                                                                          7be59bbb4a70a606da964bd3af2d96e1f5b68c3d

                                                                                          SHA256

                                                                                          3d7dafcc27fe8333df20bd4398ea56b592eceea8e126298fba1ad86caacb9ea6

                                                                                          SHA512

                                                                                          401c6dab268fdecfea5fa5f5a4d9c562cc1944f32098ef152d211376846f24176606454ba3e79516aa8b02bbb1b8bbd7757510d32f530942c455a5ee6e31f23b

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                                                                                          Filesize

                                                                                          724B

                                                                                          MD5

                                                                                          f569e1d183b84e8078dc456192127536

                                                                                          SHA1

                                                                                          30c537463eed902925300dd07a87d820a713753f

                                                                                          SHA256

                                                                                          287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413

                                                                                          SHA512

                                                                                          49553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_C89A7CE86B947A5BDDEC66331470004A

                                                                                          Filesize

                                                                                          471B

                                                                                          MD5

                                                                                          605901c6e42550516f2f8f55bdb77e58

                                                                                          SHA1

                                                                                          d766e9a80c7c8b461f5e68fc383ca892c1e23307

                                                                                          SHA256

                                                                                          39c2931465cffbe0f394c2dd1bed1833da893915af6c0dcb5a63939369909cf5

                                                                                          SHA512

                                                                                          9fb19fc02c33d3a73bef90bd1b24db4c8ed479cea771adafcd473f931a3fbd34677323424711da15fa7a99c721b4e4538fa2b4001b0dd397f338c9a94b728480

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                                                                                          Filesize

                                                                                          192B

                                                                                          MD5

                                                                                          e3b14914d0bd95dace132060a7a60e2a

                                                                                          SHA1

                                                                                          3f9468424874c3e73a09f59dd658d527f0ef5281

                                                                                          SHA256

                                                                                          c281e5e0287a30797340be6992e2f9dfedc1d207cac2cd2170860e0ad900421f

                                                                                          SHA512

                                                                                          9f19395641eb58f81277e58622ac544b2b079ea67eed46f30b1e89029e7a8bc43037dbf959b0a6bad965081a45ca4278ec514bab261d4075fdc56260c3c1b2f1

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                                          Filesize

                                                                                          410B

                                                                                          MD5

                                                                                          fea7018a5b9ba19eb959beaa267600b4

                                                                                          SHA1

                                                                                          d59dfebdb5a6604b84e4b1ec9eae684458b29842

                                                                                          SHA256

                                                                                          3293f92d56e18e7225b2f442d597f383874c3374903144c0855dbc6b242275b3

                                                                                          SHA512

                                                                                          0a80750892b4e75527ed12f9dc75416722b0b162888b828e895bd5f0ea15c1719333c132a067af77f8d4833acb0b6748004c31dd0d2722db8f72f11fc478de8f

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\612EB2BBFFA412DE310C8385EAA972AE

                                                                                          Filesize

                                                                                          552B

                                                                                          MD5

                                                                                          bad472d8a769fe94889cc01762b6414a

                                                                                          SHA1

                                                                                          1d1ba5581f9cca635b64673e2e5dd713a49fbcbd

                                                                                          SHA256

                                                                                          5fc8be92be04f82e504d3964c5c2c162458fda15f5a9f98a1c1ac677bf201600

                                                                                          SHA512

                                                                                          b4390f8139815917e8cddc1932dedbf5846ea3d3b9af6395968c71d919f1b3b40f66c0780d18096df4a6400f12e4f9525e47e7d8f3b2a0db6cbe4e717005a15c

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

                                                                                          Filesize

                                                                                          438B

                                                                                          MD5

                                                                                          6d857fbaec41a86f3749a67005fc654a

                                                                                          SHA1

                                                                                          6f29626060c048acaff5661c15e316130bdce960

                                                                                          SHA256

                                                                                          1a2ad4225d1e613b2836f969595fa2b9fd8fb264deac7623ebea6e80a47f618c

                                                                                          SHA512

                                                                                          f480df5b9d2c630852f8c910ef8c014e603dd14cf8a7f15003006dadacb6209e9be07c0c253c4019c99c4960f0f1cb1e8912d14ad69df20b5b841cf13e2950fb

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                                          Filesize

                                                                                          434B

                                                                                          MD5

                                                                                          1977a18b1c13fac0747ac82921cffb5b

                                                                                          SHA1

                                                                                          7f6755a9a5be6d9199e9bbfe81260f97d2222c92

                                                                                          SHA256

                                                                                          917db9f84848824ad24d755450471d5a7f2f42a3c063c37c8f9d79c5008e02dd

                                                                                          SHA512

                                                                                          9a3766c9d36498ac217e46b0781a0c1166bef6728aceea6583a5c2c7ad6fb62ee29639f4e1004b6695c4332d6fd0671c61b76b6143cbad76fd9f21459769b8ed

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F

                                                                                          Filesize

                                                                                          442B

                                                                                          MD5

                                                                                          f16875c20db6d7fbc2abbb5e59cf0773

                                                                                          SHA1

                                                                                          7bd66e7890fc019893e618a2b9a556ddc758a7b7

                                                                                          SHA256

                                                                                          7e673a024eb1bb12cbba97d82300e40ded60120786a28559c4bf317856f0346b

                                                                                          SHA512

                                                                                          c45740f7c67012397907a69fe1ed875a6ba10a530ec05344598a6b0ef28b0989fd2f7c6a1d26eeaa06e116d129fc6cac8cde7f440226718640ef4a010e3ce8eb

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D6243C18F0F8F9AEC6638DD210F1984_FD4F3AB5065583C0DC5D6551E486247B

                                                                                          Filesize

                                                                                          444B

                                                                                          MD5

                                                                                          38f4fc7b1d2ee6a886bf3d067c366a60

                                                                                          SHA1

                                                                                          c4c93df1f27c1921dd4d6f67bbca4271bae51bec

                                                                                          SHA256

                                                                                          e9684e213148ffc3bdab9247373679fb317b7afc0aac74ecf96aa3e8f00a88bf

                                                                                          SHA512

                                                                                          fd05ae9f1dd92d67f105d38a3e9c2910abecd26bb799f58ec74d97c6b5c4b029249d725378b2b9ea1a4c65e9fb70656d5645bf89aac66a1569a11c012fbc0185

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_A250FA44615D767A3F3B7AFA283419C9

                                                                                          Filesize

                                                                                          430B

                                                                                          MD5

                                                                                          1705d845ab5d2e22c581319b7544215b

                                                                                          SHA1

                                                                                          f1e3e79c222e9913e0ed50daf08c657a4a875073

                                                                                          SHA256

                                                                                          d5277698b4a669d9b8414cf9cac7478906bd48b8f1c4107940ceafaf8083175d

                                                                                          SHA512

                                                                                          4e78a55d86aa3c1c613cf73d32b47c22b844093cea8b62a0f1c3950f97e286bdddda6b0d12598d9e263af7a63e0cc7ba7419cc41fcbf3c145e4e75abafa264a1

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

                                                                                          Filesize

                                                                                          458B

                                                                                          MD5

                                                                                          e88106ee46c80124dd841ff6606dbb12

                                                                                          SHA1

                                                                                          3f28b1e76a010277f8ca16e94611b4bd70955a97

                                                                                          SHA256

                                                                                          bd31bc7a54dd74960b1e1b6577add80f46068c0a6efe77dfc0722a443fb6f441

                                                                                          SHA512

                                                                                          3b53299f0d64c3d2111c3af9876fe1dad5645943ef96887c5bc6249da0fcfb66bae9aa925268bb1ec47ee3263bb2d2c943fa12929b917d41dc9ad3037622e7d4

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

                                                                                          Filesize

                                                                                          432B

                                                                                          MD5

                                                                                          4437c4774e7697144e01186414613991

                                                                                          SHA1

                                                                                          323fe7a6d05b85a3a48c4e23ed9efb04148045c4

                                                                                          SHA256

                                                                                          e7fc33b380477e5f5259d2bf4fca9c400696dc9d1bc9efb91f6185a5ac5823b6

                                                                                          SHA512

                                                                                          648444f2d60c4c478bda4e0389fce7d65ece0f18d6c251d0267e7b3075b5c94111fcc2ddc9d4f7aad21868a907b74f3d418cb58a03a127a2aeca43dde558364a

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                                                                                          Filesize

                                                                                          392B

                                                                                          MD5

                                                                                          2dc7cac404d7c5e943fe4d7fe922847b

                                                                                          SHA1

                                                                                          defbf2aa7771078969598baa82cc8f818b4a54b1

                                                                                          SHA256

                                                                                          1c11a62ce49ce4e1594ec9aff620b6a56f58b1774c5df3e1c5d52e1a75a087ac

                                                                                          SHA512

                                                                                          5aa2ccf81d52d4406535257d0abf028af6e9bc76df6aa010324687cf68eb369ad7358587c7045ca5940b0a124a25dd879a67e769c39c8324825f4ebd3eed4c87

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_C89A7CE86B947A5BDDEC66331470004A

                                                                                          Filesize

                                                                                          406B

                                                                                          MD5

                                                                                          01389a377c6ff7ab8f7217c1c3846cb9

                                                                                          SHA1

                                                                                          88534a12259d39b810c0914c7e8682af2dbc9e81

                                                                                          SHA256

                                                                                          d8c06b011d7741d10d097cc7e4681df95368e7c364079eb17ea4f5b92d15bcc7

                                                                                          SHA512

                                                                                          565be4d6914b5884e1e78e1e550a715a4d5e2c1ba9ba4f7b2c8e5ac1c17de053227ddec3d752106a8784eafb98e770d926168b8ed55bdacfd10f1d41e80ef3f7

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat

                                                                                          Filesize

                                                                                          41KB

                                                                                          MD5

                                                                                          2cfa58651cb55fe218b22de2a3580117

                                                                                          SHA1

                                                                                          da408a408755e244b98f3905a435a7a9b7b6c7d3

                                                                                          SHA256

                                                                                          33b6e93993a236f8147e9e146ff04fe0472a5167f1b6e2768532fbd7bd159352

                                                                                          SHA512

                                                                                          4379b59bb2e8bfdc34d4e40ed90a2f7f4817ab0c7399b03c07c5ffa3139b636bed97d629c50c8ff4301b5955b2c1f728dc1b2efbc0a7270ad9a48fa6dde560dd

                                                                                        • C:\Users\Admin\AppData\Local\Temp\4561.tmp\start.bat

                                                                                          Filesize

                                                                                          96B

                                                                                          MD5

                                                                                          2615bf9ed6d2e854c0602ef8fdd787df

                                                                                          SHA1

                                                                                          4e0682a961ee43b9ddce5b3c03c83945d7d0cc40

                                                                                          SHA256

                                                                                          a33ee4de5292cb00e1833b85a5dc530240bb5f23ee64a56ae7fa23ae4aabc493

                                                                                          SHA512

                                                                                          24ec09d91c3d8d93c7dd595dad8eefd00de24759e039bc4dfc6967291ee54ef2a65b693b02143352a8a7c0e83b372d77389059811927b18f52472ead1332fb8c

                                                                                        • C:\Users\Admin\Downloads\slam ransomware builder installer.exe

                                                                                          Filesize

                                                                                          39.2MB

                                                                                          MD5

                                                                                          b31a1d7c6d732d78205b619daa8df3f0

                                                                                          SHA1

                                                                                          27ff179cd5a9ed7a562f62d40c492bc6963b23a0

                                                                                          SHA256

                                                                                          b3e9812eb077d65b30adc9b4f86bae472b22d66f8f3c95b2d49756177bbfd4fb

                                                                                          SHA512

                                                                                          76d0110eecdb0dbc8185c008f85d040885ae705b09d56f833c7254bb20f3f5a77adf2345d485c9370c5353ac0c8d2385dc90705db300f6dccec4568542847900

                                                                                        • C:\Users\Admin\Downloads\slam ransomware builder installer.exe

                                                                                          Filesize

                                                                                          39.2MB

                                                                                          MD5

                                                                                          b31a1d7c6d732d78205b619daa8df3f0

                                                                                          SHA1

                                                                                          27ff179cd5a9ed7a562f62d40c492bc6963b23a0

                                                                                          SHA256

                                                                                          b3e9812eb077d65b30adc9b4f86bae472b22d66f8f3c95b2d49756177bbfd4fb

                                                                                          SHA512

                                                                                          76d0110eecdb0dbc8185c008f85d040885ae705b09d56f833c7254bb20f3f5a77adf2345d485c9370c5353ac0c8d2385dc90705db300f6dccec4568542847900

                                                                                        • C:\slam_ransomware_builder\ConsoleApp2\ConsoleApp2\1.ico

                                                                                          Filesize

                                                                                          66KB

                                                                                          MD5

                                                                                          889e8ff9455bb4837f91ff644dcf2b82

                                                                                          SHA1

                                                                                          6bc850368a6444885e59d368ab5774cedb6792e2

                                                                                          SHA256

                                                                                          56ee941f7f4fcf1e050be3544ad73cfe7a061f288a3af4960632b0fcced94d51

                                                                                          SHA512

                                                                                          771af6b48883b408d45c952380ede6ab466efb776360af6bda5c0530332876d62b127803e4e4cef7e68dc64f829603cb939dbdc2d8cafe3d08dc954b796f2fa4

                                                                                        • C:\slam_ransomware_builder\ConsoleApp2\ConsoleApp2\Properties\AssemblyInfo.cs

                                                                                          Filesize

                                                                                          569B

                                                                                          MD5

                                                                                          6ae5c2395170e2d6d29d4f1e95e676e6

                                                                                          SHA1

                                                                                          533905ab44c6c68b58212f62202549646e23f2f6

                                                                                          SHA256

                                                                                          c12e04bcf0c4bd14dcbb50cc96416c77080ffc4bac7fb784d462ee6d6d163d6f

                                                                                          SHA512

                                                                                          492b0f4e8d4783194438f6be9d432bc008b7d72a31dbaf9aca5714e276ee13f8310408f379f165ec4ac63eb59404899c772f471a48a785ad8fd79c1cd9bfc80e

                                                                                        • C:\slam_ransomware_builder\ConsoleApp2\ConsoleApp2\Resources\wallpaper.jpg.SLAM

                                                                                          Filesize

                                                                                          122KB

                                                                                          MD5

                                                                                          f83cd0592ef46ff26c4b81f3ebbeec1c

                                                                                          SHA1

                                                                                          9a99d054675e7fa659188e1057a271b4b59c6e78

                                                                                          SHA256

                                                                                          2c070169ac950517fd5e828e309fb0e27ad24cfc94dfbc2c3de5f6a9adbc8d7b

                                                                                          SHA512

                                                                                          6c3576a275fb7da04c982682999ebaed346af757e88f2b5d12cc1ecaf3bb9639a458a2e207f69d5fa04dd03272e831d1c07e0a7c46beb28c2a51ef93425b2df9

                                                                                        • C:\slam_ransomware_builder\FastColoredTextBox.dll

                                                                                          Filesize

                                                                                          325KB

                                                                                          MD5

                                                                                          adac0cee5cc4de7d4046ae1243e41bf0

                                                                                          SHA1

                                                                                          c8d6d92f0dbee64d0f4c0930f0d2699a8253e891

                                                                                          SHA256

                                                                                          68d0e444c0b27552d2cb86501dcb7db3fd64b82d966e9708db0408ec1ba38c79

                                                                                          SHA512

                                                                                          1d7af604540532a4121850760b1e401bb6356e59503c26f3d1fa358a105b7d88362c92f78aa4394095b165f06c484b8c2d2ed640380e85ef9b3eb087d3e7c869

                                                                                        • C:\slam_ransomware_builder\slam ransomware builder.exe

                                                                                          Filesize

                                                                                          1.6MB

                                                                                          MD5

                                                                                          838ae3dbeff52602990b920a75ec58f3

                                                                                          SHA1

                                                                                          9f5e1638eb907f9baa63878fa8862898342554f4

                                                                                          SHA256

                                                                                          36e8d88612cfa55958f118871c346fa4ea42c19cbc90ecdea4885104089439a4

                                                                                          SHA512

                                                                                          414897ea9c51e2ae9c596cb1ef61bcfcea2c33eb08530dc6f9bec19a7ef9fbf73cbe9326cd3bae3a3590504d751af654d6b163ed315d598dce5310ca067c3266

                                                                                        • C:\slam_ransomware_builder\slam.exe

                                                                                          Filesize

                                                                                          1.6MB

                                                                                          MD5

                                                                                          838ae3dbeff52602990b920a75ec58f3

                                                                                          SHA1

                                                                                          9f5e1638eb907f9baa63878fa8862898342554f4

                                                                                          SHA256

                                                                                          36e8d88612cfa55958f118871c346fa4ea42c19cbc90ecdea4885104089439a4

                                                                                          SHA512

                                                                                          414897ea9c51e2ae9c596cb1ef61bcfcea2c33eb08530dc6f9bec19a7ef9fbf73cbe9326cd3bae3a3590504d751af654d6b163ed315d598dce5310ca067c3266

                                                                                        • C:\slam_ransomware_builder\start.exe

                                                                                          Filesize

                                                                                          46KB

                                                                                          MD5

                                                                                          f7b1a64333ab633f980b702723fb7cba

                                                                                          SHA1

                                                                                          e7e04a69a84c5a9e7d0901eb00face35457a0df1

                                                                                          SHA256

                                                                                          e7bde6768de9a7a1b1028d7fa52548f8c074b7355820b7a1cb2d4c2c082512d2

                                                                                          SHA512

                                                                                          666d09200f0bc1762903fcfb748335d1fec27cf2cd9723a91d2ad870468b94236ad7c15ed453446accc415f0be5d40f006d57695204fd7fa30c676a8e6d2ecad

                                                                                        • C:\slam_ransomware_builder\start.exe

                                                                                          Filesize

                                                                                          46KB

                                                                                          MD5

                                                                                          f7b1a64333ab633f980b702723fb7cba

                                                                                          SHA1

                                                                                          e7e04a69a84c5a9e7d0901eb00face35457a0df1

                                                                                          SHA256

                                                                                          e7bde6768de9a7a1b1028d7fa52548f8c074b7355820b7a1cb2d4c2c082512d2

                                                                                          SHA512

                                                                                          666d09200f0bc1762903fcfb748335d1fec27cf2cd9723a91d2ad870468b94236ad7c15ed453446accc415f0be5d40f006d57695204fd7fa30c676a8e6d2ecad

                                                                                        • C:\slam_ransomware_builder\uac\ConsoleApp2\1.ico

                                                                                          Filesize

                                                                                          66KB

                                                                                          MD5

                                                                                          889e8ff9455bb4837f91ff644dcf2b82

                                                                                          SHA1

                                                                                          6bc850368a6444885e59d368ab5774cedb6792e2

                                                                                          SHA256

                                                                                          56ee941f7f4fcf1e050be3544ad73cfe7a061f288a3af4960632b0fcced94d51

                                                                                          SHA512

                                                                                          771af6b48883b408d45c952380ede6ab466efb776360af6bda5c0530332876d62b127803e4e4cef7e68dc64f829603cb939dbdc2d8cafe3d08dc954b796f2fa4

                                                                                        • C:\slam_ransomware_builder\uac\ConsoleApp2\Properties\AssemblyInfo.cs

                                                                                          Filesize

                                                                                          556B

                                                                                          MD5

                                                                                          a08e9477bcf35558054417f16a5f5617

                                                                                          SHA1

                                                                                          5853ada9553643a039b1b56324f0c95226179c44

                                                                                          SHA256

                                                                                          7ef40c0cf01ec60f42ace3924716f5ccef0f5eea84bd8f9006016ddbfcdf36d2

                                                                                          SHA512

                                                                                          2f7950f9462fb26dfbd133311f2c0403929eef6c75abe416d55ca8e88dceaef15021e294c3ea683d221ae22ba7acac33c63d80d441adf28fa8ffd67a577b11b2

                                                                                        • C:\slam_ransomware_builder\wallpaper.jpg.SLAM

                                                                                          Filesize

                                                                                          122KB

                                                                                          MD5

                                                                                          f83cd0592ef46ff26c4b81f3ebbeec1c

                                                                                          SHA1

                                                                                          9a99d054675e7fa659188e1057a271b4b59c6e78

                                                                                          SHA256

                                                                                          2c070169ac950517fd5e828e309fb0e27ad24cfc94dfbc2c3de5f6a9adbc8d7b

                                                                                          SHA512

                                                                                          6c3576a275fb7da04c982682999ebaed346af757e88f2b5d12cc1ecaf3bb9639a458a2e207f69d5fa04dd03272e831d1c07e0a7c46beb28c2a51ef93425b2df9

                                                                                        • memory/1908-269-0x0000000005E90000-0x000000000600C000-memory.dmp

                                                                                          Filesize

                                                                                          1.5MB

                                                                                        • memory/1908-259-0x00000000053F0000-0x0000000005418000-memory.dmp

                                                                                          Filesize

                                                                                          160KB

                                                                                        • memory/1908-254-0x0000000005870000-0x00000000058B4000-memory.dmp

                                                                                          Filesize

                                                                                          272KB

                                                                                        • memory/1908-255-0x0000000006030000-0x000000000659C000-memory.dmp

                                                                                          Filesize

                                                                                          5.4MB

                                                                                        • memory/1908-256-0x0000000005B80000-0x0000000005C30000-memory.dmp

                                                                                          Filesize

                                                                                          704KB

                                                                                        • memory/1908-252-0x0000000004C80000-0x0000000004CB0000-memory.dmp

                                                                                          Filesize

                                                                                          192KB

                                                                                        • memory/1908-250-0x0000000004B80000-0x0000000004B9A000-memory.dmp

                                                                                          Filesize

                                                                                          104KB

                                                                                        • memory/1908-257-0x0000000006210000-0x000000000680E000-memory.dmp

                                                                                          Filesize

                                                                                          6.0MB

                                                                                        • memory/1908-258-0x0000000005F80000-0x00000000062E6000-memory.dmp

                                                                                          Filesize

                                                                                          3.4MB

                                                                                        • memory/1908-263-0x000000000643C000-0x000000000663E000-memory.dmp

                                                                                          Filesize

                                                                                          2.0MB

                                                                                        • memory/1908-265-0x00000000053F0000-0x0000000005420000-memory.dmp

                                                                                          Filesize

                                                                                          192KB

                                                                                        • memory/1908-253-0x0000000005930000-0x0000000005A52000-memory.dmp

                                                                                          Filesize

                                                                                          1.1MB

                                                                                        • memory/1908-249-0x00000000003C0000-0x0000000000400000-memory.dmp

                                                                                          Filesize

                                                                                          256KB

                                                                                        • memory/1908-268-0x0000000005FA0000-0x0000000006226000-memory.dmp

                                                                                          Filesize

                                                                                          2.5MB

                                                                                        • memory/1908-260-0x00000000053E0000-0x00000000053F2000-memory.dmp

                                                                                          Filesize

                                                                                          72KB

                                                                                        • memory/1908-261-0x0000000005C10000-0x0000000005C86000-memory.dmp

                                                                                          Filesize

                                                                                          472KB

                                                                                        • memory/1908-251-0x0000000004D10000-0x0000000004E6A000-memory.dmp

                                                                                          Filesize

                                                                                          1.4MB

                                                                                        • memory/3960-210-0x000000000C130000-0x000000000C13A000-memory.dmp

                                                                                          Filesize

                                                                                          40KB

                                                                                        • memory/3960-209-0x0000000007DB0000-0x0000000007DBA000-memory.dmp

                                                                                          Filesize

                                                                                          40KB

                                                                                        • memory/3960-208-0x0000000007DD0000-0x0000000007E62000-memory.dmp

                                                                                          Filesize

                                                                                          584KB

                                                                                        • memory/3960-207-0x0000000008380000-0x0000000008924000-memory.dmp

                                                                                          Filesize

                                                                                          5.6MB

                                                                                        • memory/3960-206-0x0000000000CA0000-0x00000000033E4000-memory.dmp

                                                                                          Filesize

                                                                                          39.3MB

                                                                                        • memory/3960-213-0x0000000009D80000-0x0000000009D92000-memory.dmp

                                                                                          Filesize

                                                                                          72KB

                                                                                        • memory/4188-275-0x0000000000EE0000-0x0000000000FCA000-memory.dmp

                                                                                          Filesize

                                                                                          936KB

                                                                                        • memory/5020-230-0x0000000006E00000-0x0000000006E66000-memory.dmp

                                                                                          Filesize

                                                                                          408KB

                                                                                        • memory/5020-226-0x0000000000490000-0x0000000000630000-memory.dmp

                                                                                          Filesize

                                                                                          1.6MB

                                                                                        • memory/5020-227-0x0000000008720000-0x00000000087BC000-memory.dmp

                                                                                          Filesize

                                                                                          624KB

                                                                                        • memory/5020-238-0x00000000092C0000-0x0000000009318000-memory.dmp

                                                                                          Filesize

                                                                                          352KB

                                                                                        • memory/5020-246-0x0000000009A20000-0x0000000009A9C000-memory.dmp

                                                                                          Filesize

                                                                                          496KB