Malware Analysis Report

2024-12-07 02:17

Sample ID 241117-3v719szemg
Target https://gofile.io/d/J0F9V6
Tags
gandcrab wannacry aspackv2 backdoor defense_evasion discovery evasion execution impact ransomware upx worm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

Threat Level: Known bad

The file https://gofile.io/d/J0F9V6 was found to be: Known bad.

Malicious Activity Summary

gandcrab wannacry aspackv2 backdoor defense_evasion discovery evasion execution impact ransomware upx worm

Gandcrab

Wannacry

Gandcrab family

Wannacry family

Deletes shadow copies

Modifies Windows Firewall

ASPack v2.12-2.42

Modifies file permissions

File and Directory Permissions Modification: Windows File and Directory Permissions Modification

Looks up external IP address via web service

UPX packed file

AutoIT Executable

Browser Information Discovery

Program crash

Scheduled Task/Job: Scheduled Task

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of WriteProcessMemory

Suspicious use of SendNotifyMessage

Modifies registry key

Enumerates system info in registry

Runs net.exe

Views/modifies file attributes

Suspicious use of FindShellTrayWindow

Interacts with shadow copies

Kills process with taskkill

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-17 23:51

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-17 23:51

Reported

2024-11-17 23:54

Platform

win10v2004-20241007-en

Max time kernel

155s

Max time network

166s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/J0F9V6

Signatures

Gandcrab

ransomware backdoor gandcrab

Gandcrab family

gandcrab

Wannacry

ransomware worm wannacry

Wannacry family

wannacry

Deletes shadow copies

ransomware defense_evasion impact execution

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

File and Directory Permissions Modification: Windows File and Directory Permissions Modification

defense_evasion

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-addr.es N/A N/A
N/A ip-addr.es N/A N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\System32\vssadmin.exe N/A
N/A N/A C:\Windows\System32\vssadmin.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\taskkill.exe N/A
N/A N/A C:\Windows\SYSTEM32\taskkill.exe N/A
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Modifies registry key

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A

Runs net.exe

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\SCHTASKS.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4420 wrote to memory of 3968 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3968 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 3160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 4028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 4028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4420 wrote to memory of 1988 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/J0F9V6

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc2d946f8,0x7ffcc2d94708,0x7ffcc2d94718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2572 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:8

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4736 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:1

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:8

C:\Users\Admin\Downloads\FUCKPCS\freehacks.exe

"C:\Users\Admin\Downloads\FUCKPCS\freehacks.exe"

C:\Users\Admin\AppData\Roaming\Avoid.exe

"C:\Users\Admin\AppData\Roaming\Avoid.exe"

C:\Users\Admin\AppData\Roaming\ChilledWindows.exe

"C:\Users\Admin\AppData\Roaming\ChilledWindows.exe"

C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe

"C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe"

C:\Users\Admin\AppData\Roaming\CrazyNCS.exe

"C:\Users\Admin\AppData\Roaming\CrazyNCS.exe"

C:\Users\Admin\AppData\Roaming\Curfun.exe

"C:\Users\Admin\AppData\Roaming\Curfun.exe"

C:\Users\Admin\AppData\Roaming\DesktopBoom.exe

"C:\Users\Admin\AppData\Roaming\DesktopBoom.exe"

C:\Users\Admin\AppData\Roaming\Flasher.exe

"C:\Users\Admin\AppData\Roaming\Flasher.exe"

C:\Users\Admin\AppData\Roaming\Hydra.exe

"C:\Users\Admin\AppData\Roaming\Hydra.exe"

C:\Users\Admin\AppData\Roaming\Launcher.exe

"C:\Users\Admin\AppData\Roaming\Launcher.exe"

C:\Users\Admin\AppData\Roaming\Melting.exe

"C:\Users\Admin\AppData\Roaming\Melting.exe"

C:\Users\Admin\AppData\Roaming\Popup.exe

"C:\Users\Admin\AppData\Roaming\Popup.exe"

C:\Users\Admin\AppData\Roaming\rickroll.exe

"C:\Users\Admin\AppData\Roaming\rickroll.exe"

C:\Users\Admin\AppData\Roaming\ScreenScrew.exe

"C:\Users\Admin\AppData\Roaming\ScreenScrew.exe"

C:\Users\Admin\AppData\Roaming\Time.exe

"C:\Users\Admin\AppData\Roaming\Time.exe"

C:\Users\Admin\AppData\Roaming\Trololo.exe

"C:\Users\Admin\AppData\Roaming\Trololo.exe"

C:\Users\Admin\AppData\Roaming\Vista.exe

"C:\Users\Admin\AppData\Roaming\Vista.exe"

C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe

"C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe"

C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe

"C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe"

C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe

"C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe"

C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe

"C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe"

C:\Users\Admin\AppData\Roaming\RedBoot.exe

"C:\Users\Admin\AppData\Roaming\RedBoot.exe"

C:\Users\Admin\AppData\Roaming\RedEye.exe

"C:\Users\Admin\AppData\Roaming\RedEye.exe"

C:\Users\Admin\30845522\protect.exe

"C:\Users\Admin\30845522\protect.exe"

C:\Users\Admin\30845522\assembler.exe

"C:\Users\Admin\30845522\assembler.exe" -f bin "C:\Users\Admin\30845522\boot.asm" -o "C:\Users\Admin\30845522\boot.bin"

C:\Users\Admin\AppData\Roaming\Rensenware.exe

"C:\Users\Admin\AppData\Roaming\Rensenware.exe"

C:\Users\Admin\AppData\Roaming\Rokku.exe

"C:\Users\Admin\AppData\Roaming\Rokku.exe"

C:\Windows\SYSTEM32\taskkill.exe

taskkill.exe /f /im explorer.exe

C:\Windows\SYSTEM32\taskkill.exe

taskkill.exe /f /im taskmgr.exe

C:\Users\Admin\AppData\Roaming\satan.exe

"C:\Users\Admin\AppData\Roaming\satan.exe"

C:\Users\Admin\AppData\Roaming\Satana.exe

"C:\Users\Admin\AppData\Roaming\Satana.exe"

C:\Users\Admin\AppData\Roaming\Seftad.exe

"C:\Users\Admin\AppData\Roaming\Seftad.exe"

C:\Users\Admin\AppData\Roaming\SporaRansomware.exe

"C:\Users\Admin\AppData\Roaming\SporaRansomware.exe"

C:\Users\Admin\AppData\Roaming\ViraLock.exe

"C:\Users\Admin\AppData\Roaming\ViraLock.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3648 -ip 3648

C:\Users\Admin\AppData\Roaming\WannaCry.exe

"C:\Users\Admin\AppData\Roaming\WannaCry.exe"

C:\Users\Admin\AppData\Roaming\satan.exe

"C:\Users\Admin\AppData\Roaming\satan.exe"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x528 0x514

C:\Users\Admin\AppData\Roaming\Heek\uxokv.exe

"C:\Users\Admin\AppData\Roaming\Heek\uxokv.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_bf7f26b6.bat"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c 211961731832843.bat

C:\Users\Admin\lAAkUkoo\GsQsMwEw.exe

"C:\Users\Admin\lAAkUkoo\GsQsMwEw.exe"

C:\Users\Admin\30845522\overwrite.exe

"C:\Users\Admin\30845522\overwrite.exe" "C:\Users\Admin\30845522\boot.bin"

C:\ProgramData\cgMIIAAo\WCAUEAAU.exe

"C:\ProgramData\cgMIIAAo\WCAUEAAU.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\ViraLock"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 1200

C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe

"C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe"

C:\Windows\SysWOW64\reg.exe

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1

C:\Windows\SysWOW64\reg.exe

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2

C:\Windows\SysWOW64\reg.exe

reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eUAwIAcc.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""

C:\Users\Admin\AppData\Roaming\Heek\uxokv.exe

"C:\Users\Admin\AppData\Roaming\Heek\uxokv.exe"

C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe

"C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe"

C:\Users\Admin\AppData\Roaming\Xyeta.exe

"C:\Users\Admin\AppData\Roaming\Xyeta.exe"

C:\Windows\System32\vssadmin.exe

"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet

C:\Windows\SysWOW64\attrib.exe

attrib +h .

C:\Windows\SysWOW64\icacls.exe

icacls . /grant Everyone:F /T /C /Q

C:\Users\Admin\AppData\Roaming\$uckyLocker.exe

"C:\Users\Admin\AppData\Roaming\$uckyLocker.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 6924 -ip 6924

C:\Windows\system32\msiexec.exe

C:\Windows\system32\msiexec.exe /V

C:\Users\Admin\AppData\Roaming\7ev3n.exe

"C:\Users\Admin\AppData\Roaming\7ev3n.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 6924 -s 464

C:\Users\Admin\AppData\Roaming\taskdl.exe

taskdl.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c 199601731832852.bat

C:\Windows\SysWOW64\attrib.exe

attrib +h +s F:\$RECYCLE

C:\Windows\SysWOW64\msiexec.exe

"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe SETUPEXEDIR=C:\Users\Admin\AppData\Roaming\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "

C:\Users\Admin\AppData\Roaming\ViraLock.exe

C:\Users\Admin\AppData\Roaming\ViraLock

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\ViraLock"

C:\Windows\SysWOW64\reg.exe

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1

C:\Windows\SysWOW64\reg.exe

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2

C:\Windows\SysWOW64\reg.exe

reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CKgUcIUU.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Users\Admin\AppData\Roaming\Annabelle.exe

"C:\Users\Admin\AppData\Roaming\Annabelle.exe"

C:\Windows\System32\vssadmin.exe

"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet

C:\Users\Admin\AppData\Roaming\BadRabbit.exe

"C:\Users\Admin\AppData\Roaming\BadRabbit.exe"

C:\Users\Admin\AppData\Roaming\Birele.exe

"C:\Users\Admin\AppData\Roaming\Birele.exe"

C:\Users\Admin\AppData\Roaming\Cerber5.exe

"C:\Users\Admin\AppData\Roaming\Cerber5.exe"

C:\Users\Admin\AppData\Roaming\CoronaVirus.exe

"C:\Users\Admin\AppData\Roaming\CoronaVirus.exe"

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"

C:\Users\Admin\AppData\Roaming\CryptoWall.exe

"C:\Users\Admin\AppData\Roaming\CryptoWall.exe"

C:\Users\Admin\AppData\Roaming\DeriaLock.exe

"C:\Users\Admin\AppData\Roaming\DeriaLock.exe"

C:\Windows\SysWOW64\explorer.exe

"C:\Windows\syswow64\explorer.exe"

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w0000021C

C:\Users\Admin\AppData\Roaming\Dharma.exe

"C:\Users\Admin\AppData\Roaming\Dharma.exe"

C:\Users\Admin\AppData\Roaming\Fantom.exe

"C:\Users\Admin\AppData\Roaming\Fantom.exe"

C:\Users\Admin\AppData\Roaming\GandCrab.exe

"C:\Users\Admin\AppData\Roaming\GandCrab.exe"

C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe

"C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe"

C:\Users\Admin\AppData\Roaming\Krotten.exe

"C:\Users\Admin\AppData\Roaming\Krotten.exe"

C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe

"C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe"

C:\Users\Admin\AppData\Roaming\NotPetya.exe

"C:\Users\Admin\AppData\Roaming\NotPetya.exe"

C:\Windows\SysWOW64\taskkill.exe

taskkill /F /IM explorer.exe

C:\Windows\SysWOW64\svchost.exe

-k netsvcs

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

C:\Windows\SysWOW64\taskkill.exe

taskkill /FI "USERNAME eq Admin" /F /IM WCAUEAAU.exe

C:\Windows\SysWOW64\wbem\WMIC.exe

"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive

C:\Windows\SysWOW64\cmd.exe

/c schtasks /Delete /F /TN rhaegal

C:\Users\Admin\Downloads\FUCKPCS\ac\nc123.exe

"C:\Users\Admin\Downloads\FUCKPCS\ac\nc123.exe"

C:\Users\Admin\Downloads\FUCKPCS\ac\mssql.exe

"C:\Users\Admin\Downloads\FUCKPCS\ac\mssql.exe"

C:\Users\Admin\Downloads\FUCKPCS\ac\mssql2.exe

"C:\Users\Admin\Downloads\FUCKPCS\ac\mssql2.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\FUCKPCS\ac\Shadow.bat" "

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\FUCKPCS\ac\systembackup.bat" "

C:\Users\Admin\Downloads\FUCKPCS\ac\EVER\SearchHost.exe

"C:\Users\Admin\Downloads\FUCKPCS\ac\EVER\SearchHost.exe"

C:\Users\Admin\AppData\Local\system.exe

"C:\Users\Admin\AppData\Local\system.exe"

C:\Windows\SysWOW64\reg.exe

"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\services\VSS" /v Start /t REG_DWORD /d 4 /f

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #1

C:\Windows\SysWOW64\cmd.exe

/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2226854414 && exit"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat

C:\Windows\SysWOW64\SCHTASKS.exe

C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f

C:\Users\Admin\AppData\Roaming\ViraLock.exe

C:\Users\Admin\AppData\Roaming\ViraLock

C:\Windows\syswow64\MsiExec.exe

C:\Windows\syswow64\MsiExec.exe -Embedding 511E600CFB1D50E41397E30097A8DA57

C:\Windows\SysWOW64\netsh.exe

C:\Windows\system32\netsh.exe advfirewall set allprofiles state on

C:\Windows\SysWOW64\cmd.exe

/c schtasks /Create /SC once /TN "" /TR "C:\Windows\system32\shutdown.exe /r /f" /ST 05:33

C:\Windows\SysWOW64\net.exe

"C:\Windows\System32\net.exe" stop vss

C:\Windows\SysWOW64\cscript.exe

cscript C:\Users\Admin\AppData\Local\Temp/file.vbs

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\USCC5-A8ETZ-TXTXH-TGTOY.HTML

C:\Windows\SysWOW64\net.exe

"C:\Windows\System32\net.exe" stop swprv

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2680 /prefetch:2

C:\Windows\SysWOW64\net.exe

"C:\Windows\System32\net.exe" stop srservice

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18103789774296527893,14927897639520404581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:1

C:\Windows\SysWOW64\schtasks.exe

schtasks /Delete /F /TN rhaegal

C:\Windows\SysWOW64\cscript.exe

cscript //nologo c.vbs

C:\Windows\SysWOW64\schtasks.exe

schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2226854414 && exit"

C:\Windows\SysWOW64\cscript.exe

cscript C:\Users\Admin\AppData\Local\Temp/file.vbs

C:\ProgramData\cgMIIAAo\WCAUEAAU.exe

"C:\ProgramData\cgMIIAAo\WCAUEAAU.exe"

C:\Users\Admin\AppData\Roaming\Bezilom.exe

"C:\Users\Admin\AppData\Roaming\Bezilom.exe"

C:\Users\Admin\AppData\Local\Temp\sys3.exe

C:\Users\Admin\AppData\Local\Temp\\sys3.exe

C:\Users\Admin\AppData\Roaming\taskdl.exe

taskdl.exe

C:\Windows\SysWOW64\reg.exe

reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 gofile.io udp
FR 45.112.123.126:443 gofile.io tcp
US 8.8.8.8:53 126.123.112.45.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 api.gofile.io udp
FR 45.112.123.126:443 api.gofile.io tcp
US 8.8.8.8:53 s.gofile.io udp
FR 51.75.242.210:443 s.gofile.io tcp
FR 51.75.242.210:443 s.gofile.io tcp
US 8.8.8.8:53 210.242.75.51.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 store3.gofile.io udp
BE 94.139.32.11:443 store3.gofile.io tcp
BE 94.139.32.11:443 store3.gofile.io tcp
US 8.8.8.8:53 11.32.139.94.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 134.130.81.91.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
BO 200.87.164.69:9999 tcp
BO 200.87.164.69:9999 tcp
US 8.8.8.8:53 google.com udp
GB 142.250.187.238:80 google.com tcp
GB 142.250.187.238:80 google.com tcp
US 8.8.8.8:53 238.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 6pi3jrqjbssfh6gu.onion.pw udp
US 144.202.70.158:80 6pi3jrqjbssfh6gu.onion.pw tcp
US 8.8.8.8:53 158.70.202.144.in-addr.arpa udp
US 144.202.70.158:443 6pi3jrqjbssfh6gu.onion.pw tcp
US 8.8.8.8:53 blockchain.info udp
US 104.16.237.243:443 blockchain.info tcp
US 8.8.8.8:53 243.237.16.104.in-addr.arpa udp
US 144.202.70.158:80 6pi3jrqjbssfh6gu.onion.pw tcp
US 144.202.70.158:443 6pi3jrqjbssfh6gu.onion.pw tcp
BO 200.119.204.12:9999 tcp
BO 200.119.204.12:9999 tcp
GB 142.250.187.238:80 google.com tcp
GB 142.250.187.238:80 google.com tcp
US 104.16.237.243:443 blockchain.info tcp
BO 200.87.164.69:9999 tcp
GB 142.250.187.238:80 google.com tcp
US 104.16.237.243:443 blockchain.info tcp
BO 200.87.164.69:9999 tcp
GB 142.250.187.238:80 google.com tcp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 184.164.136.134:80 tcp
US 8.8.8.8:53 ip-addr.es udp
FR 188.165.164.184:80 ip-addr.es tcp
US 8.8.8.8:53 184.164.165.188.in-addr.arpa udp
N/A 10.127.0.0:445 tcp
N/A 10.127.0.0:445 tcp
BO 190.186.45.170:9999 tcp
BO 190.186.45.170:9999 tcp
N/A 10.127.0.0:139 tcp
US 8.8.8.8:53 r10.i.lencr.org udp
N/A 10.127.0.0:139 tcp
GB 88.221.135.9:80 r10.i.lencr.org tcp
N/A 10.127.0.1:445 tcp
FR 188.165.164.184:443 ip-addr.es tcp
US 8.8.8.8:53 9.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 jaster.in udp
N/A 10.127.0.1:445 tcp
SG 76.73.17.194:9090 tcp
N/A 10.127.0.1:139 tcp
N/A 10.127.0.1:139 tcp
N/A 10.127.0.2:445 tcp
US 8.8.8.8:53 168.245.100.95.in-addr.arpa udp
N/A 10.127.0.2:445 tcp
BO 200.119.204.12:9999 tcp
US 8.8.8.8:53 arizonacode.bplaced.net udp
US 199.232.214.172:445 ctldl.windowsupdate.com tcp
GB 142.250.187.238:445 google.com tcp
US 13.107.42.16:445 config.edge.skype.com tcp
N/A 10.127.0.2:139 tcp
BO 200.119.204.12:9999 tcp
US 144.202.70.158:445 6pi3jrqjbssfh6gu.onion.pw tcp
IE 52.111.236.21:445 nexusrules.officeapps.live.com tcp
N/A 10.127.0.1:445 tcp
US 154.35.32.5:443 tcp
GB 142.250.187.238:80 google.com tcp
US 199.232.214.172:139 ctldl.windowsupdate.com tcp
GB 142.250.187.238:139 google.com tcp
DE 162.55.0.137:80 arizonacode.bplaced.net tcp
GB 142.250.187.238:80 google.com tcp
N/A 10.127.0.2:139 tcp
US 13.107.42.16:139 config.edge.skype.com tcp
GB 142.250.187.238:80 google.com tcp
US 144.202.70.158:139 6pi3jrqjbssfh6gu.onion.pw tcp
IE 52.111.236.21:139 nexusrules.officeapps.live.com tcp
N/A 10.127.0.1:139 tcp
US 8.8.8.8:53 137.0.55.162.in-addr.arpa udp
N/A 10.127.0.3:445 tcp
N/A 10.127.0.3:139 tcp
N/A 10.127.0.3:445 tcp
N/A 10.127.0.3:139 tcp
N/A 10.127.0.4:445 tcp
US 8.8.8.8:53 r10.o.lencr.org udp
N/A 10.127.0.4:139 tcp
N/A 10.127.0.4:445 tcp
GB 88.221.135.105:80 r10.o.lencr.org tcp
N/A 10.127.0.4:139 tcp
N/A 10.127.0.5:445 tcp
US 8.8.8.8:53 105.135.221.88.in-addr.arpa udp
N/A 10.127.0.5:445 tcp
N/A 10.127.0.5:139 tcp
N/A 10.127.0.5:139 tcp
FR 91.121.12.127:4141 tcp
BO 200.87.164.69:9999 tcp
US 144.202.70.158:80 6pi3jrqjbssfh6gu.onion.pw tcp
BO 190.186.45.170:9999 tcp
N/A 10.127.0.6:139 tcp
N/A 10.127.0.6:139 tcp
N/A 10.127.0.7:445 tcp
BO 200.87.164.69:9999 tcp
US 144.202.70.158:443 6pi3jrqjbssfh6gu.onion.pw tcp
GB 142.250.187.238:80 google.com tcp
N/A 10.127.0.7:445 tcp
N/A 10.127.0.7:139 tcp
US 8.8.8.8:53 mxbbvhtjqunc.org udp
N/A 10.127.0.7:139 tcp
N/A 10.127.0.8:445 tcp
IE 40.126.31.67:445 login.live.com tcp
DE 136.243.76.173:445 tcp
FR 51.75.242.210:445 s.gofile.io tcp
US 8.8.8.8:53 ictedrwutbwh.co.uk udp
N/A 10.127.0.8:139 tcp
N/A 10.127.0.8:445 tcp
IE 40.126.31.67:139 login.live.com tcp
DE 136.243.76.173:139 tcp
FR 51.75.242.210:139 s.gofile.io tcp
N/A 10.127.0.8:139 tcp
N/A 10.127.0.9:445 tcp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 7de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1 010da169e15457c25bd80ef02d76a940c1210301
SHA256 6e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512 e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c

\??\pipe\LOCAL\crashpad_4420_ISTURIKLOXUDETBK

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 85ba073d7015b6ce7da19235a275f6da
SHA1 a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA256 5ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512 eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 96704cdbe8e5cc0d162d5536278cc9f6
SHA1 065b08de1eba4374e83d41e53245f59ef4d96766
SHA256 769487617fb1ba8b8d2d4d0c2181d5bc28ab21bcb5d76efa18943c06e5bec747
SHA512 b8b325e51ff65bc26b6f1b9ba6b67c486bcd8453057c80e58b2eaf694397a7e41847f4686446695f539d98e2a3cfbf0439d30e98bd2074bdea7276436a59bf8a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 446afe6c123daf9a0096670868098dab
SHA1 9cfdcab43d23fb4c0d987b3f5fb05652f35c4420
SHA256 2dc9f018504c790588cefc64be81a93c9dc7afe8b57403b39338dc4ba41b3de0
SHA512 af20b0ade2556fe3e877c913d00656c16ccbabdb30e719a6ab09d42ff96069c6f729ef1d0fc5f8bd05b1cc121c60b27939354d22a103784969791f623aa6546e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 d8af205fba273dad895678c64300375b
SHA1 655916dc5d878c09fbcad4d1a0fc2e6b3f0e8a5f
SHA256 747c2bef68dbc6a8e0afb7558e0b84a9e8dc427b1ea5c3d78895bf55605f8812
SHA512 ee2413637a6c651f54b8e6b871c76d2d0fad321a853ff885c203fdaaa0e32bf85a0e5ed37765182d4e73242b9b8ac3ca14a4c83a6a6e1110caa1668bfe84316b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 bc462c7d8927bb2c743f159a7d8dab9c
SHA1 292be1f5551e3ece61bf6c732f2c0bba56a5c752
SHA256 91b5c75512fd92d0bbd20f567cd5cf6519893e935444e5bfa127323f691b6014
SHA512 310138ec87da32c3ec495282b0f1c83797c37f9f3396ea6ef15d197c691d5b9325051a4f6380e3043c4e2d952d5d2d20681f2687827438a125f1ecfae68f0023

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 3d57dc6f94ada659ecc6e88e36e688c6
SHA1 15130156c4f73ca954697b29602d0dda06f2e007
SHA256 06a43219266a7bf486a860cef1ab7f724e22c748f21acb32c6d6c78dd95ff19e
SHA512 1f4b6692709b2dc27ffbb75cf67ef479670305d91e33055583eef2b104059cbd48d2fcab69447b28a6e0172329a69ef38e243d38ecc7ee27df92aac2adde8e8e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 d3505cdceb56ad3d0bb1db95f701fde0
SHA1 fc1520f7c752348afdbc64b7d8c564a6308fef2e
SHA256 067856c204860fd2b365622ef454cece0d807ce718c0453fb8ac224127c9f969
SHA512 e02fe1be5333fd97826cfdeb8e0c4dcc0da72ec95e3c7d6c6b4431983fb0518978dd4674407bf5db3a14e9386ace3822cb4de20c67cfd22001f37da5dc81029f

memory/5564-158-0x00000000001F0000-0x00000000011F0000-memory.dmp

C:\Users\Admin\AppData\Roaming\Avoid.exe

MD5 20d2c71d6d9daf4499ffc4a5d164f1c3
SHA1 38e5dcd93f25386d05a34a5b26d3fba1bf02f7c8
SHA256 3ac8cc58dcbceaec3dab046aea050357e0e2248d30b0804c738c9a5b037c220d
SHA512 8ffd56fb3538eb60da2dde9e3d6eee0dac8419c61532e9127f47c4351b6e53e01143af92b2e26b521e23cdbbf15d7a358d3757431e572e37a1eede57c7d39704

C:\Users\Admin\AppData\Roaming\ChilledWindows.exe

MD5 6a4853cd0584dc90067e15afb43c4962
SHA1 ae59bbb123e98dc8379d08887f83d7e52b1b47fc
SHA256 ccb9502bf8ba5becf8b758ca04a5625c30b79e2d10d2677cc43ae4253e1288ec
SHA512 feb223e0de9bd64e32dc4f3227e175b58196b5e614bca8c2df0bbca2442a564e39d66bcd465154149dc7ebbd3e1ca644ed09d9a9174b52236c76e7388cb9d996

C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe

MD5 bc1e7d033a999c4fd006109c24599f4d
SHA1 b927f0fc4a4232a023312198b33272e1a6d79cec
SHA256 13adae722719839af8102f98730f3af1c5a56b58069bfce8995acd2123628401
SHA512 f5d9b8c1fd9239894ec9c075542bff0bcef79871f31038e627ae257b8c1db9070f4d124448a78e60ccc8bc12f138102a54825e9d7647cd34832984c7c24a6276

memory/5856-207-0x00000000009B0000-0x0000000000E14000-memory.dmp

C:\Users\Admin\AppData\Roaming\CrazyNCS.exe

MD5 d043ba91e42e0d9a68c9866f002e8a21
SHA1 e9f177e1c57db0a15d1dc6b3e6c866d38d85b17c
SHA256 6820c71df417e434c5ad26438c901c780fc5a80b28a466821b47d20b8424ef08
SHA512 3e9783646e652e9482b3e7648fb0a5f7c8b6c386bbc373d5670d750f6f99f6137b5501e21332411609cbcc0c20f829ab8705c2835e2756455f6754c9975ac6bd

C:\Users\Admin\AppData\Roaming\Curfun.exe

MD5 0b3b2dff5503cb032acd11d232a3af55
SHA1 6efc31c1d67f70cf77c319199ac39f70d5a7fa95
SHA256 ef878461a149024f3065121ff4e165731ecabef1b94b0b3ed2eda010ad39202b
SHA512 484014d65875e706f7e5e5f54c2045d620e5cce5979bf7f37b45c613e6d948719c0b8e466df5d8908706133ce4c4b71a11b804417831c9dbaf72b6854231ea17

C:\Users\Admin\AppData\Roaming\Flasher.exe

MD5 9254ca1da9ff8ad492ca5fa06ca181c6
SHA1 70fa62e6232eae52467d29cf1c1dacb8a7aeab90
SHA256 30676ad5dc94c3fec3d77d87439b2bf0a1aaa7f01900b68002a06f11caee9ce6
SHA512 a84fbbdea4e743f3e41878b9cf6db219778f1479aa478100718af9fc8d7620fc7a3295507e11df39c7863cb896f946514e50368db480796b6603c8de5580685a

C:\Users\Admin\AppData\Roaming\DesktopBoom.exe

MD5 f0a661d33aac3a3ce0c38c89bec52f89
SHA1 709d6465793675208f22f779f9e070ed31d81e61
SHA256 c20e78ce9028299d566684d35b1230d055e5ea0e9b94d0aff58f650e0468778a
SHA512 57cdb3c38f2e90d03e6dc1f9d8d1131d40d3919f390bb1783343c82465461319e70483dc3cd3efdbd9a62dfc88d74fc706f05d760ffd8506b16fd7686e414443

memory/5920-240-0x000000001BDC0000-0x000000001BE66000-memory.dmp

C:\Users\Admin\AppData\Roaming\Launcher.exe

MD5 7506eb94c661522aff09a5c96d6f182b
SHA1 329bbdb1f877942d55b53b1d48db56a458eb2310
SHA256 d5b962dfe37671b5134f0b741a662610b568c2b5374010ee92b5b7857d87872c
SHA512 d815a9391ef3d508b89fc221506b95f4c92d586ec38f26aec0f239750f34cf398eed3d818fa439f6aa6ed3b30f555a1903d93eeeec133b80849a4aa6685ec070

C:\Users\Admin\AppData\Roaming\Hydra.exe

MD5 b2eca909a91e1946457a0b36eaf90930
SHA1 3200c4e4d0d4ece2b2aadb6939be59b91954bcfa
SHA256 0b6c0af51cde971b3e5f8aa204f8205418ab8c180b79a5ac1c11a6e0676f0f7c
SHA512 607d20e4a46932c7f4d9609ef9451e2303cd79e7c4778fe03f444e7dc800d6de7537fd2648c7c476b9f098588dc447e8c39d8b21cd528d002dfa513a19c6ebbf

memory/5920-263-0x000000001C350000-0x000000001C81E000-memory.dmp

memory/5920-271-0x000000001C920000-0x000000001C9BC000-memory.dmp

C:\Users\Admin\AppData\Roaming\Popup.exe

MD5 9c3e9e30d51489a891513e8a14d931e4
SHA1 4e5a5898389eef8f464dee04a74f3b5c217b7176
SHA256 f8f7b5f20ca57c61df6dc8ff49f2f5f90276a378ec17397249fdc099a6e1dcd8
SHA512 bf45677b7dd6c67ad350ec6ecad5bc3f04dea179fae0ff0a695c69f7de919476dd7a69c25b04c8530a35119e4933f4a8c327ed6dcef892b1114dfd7e494a19a7

C:\Users\Admin\AppData\Roaming\Melting.exe

MD5 833619a4c9e8c808f092bf477af62618
SHA1 b4a0efa26f790e991cb17542c8e6aeb5030d1ebf
SHA256 92a284981c7ca33f1af45ce61738479fbcbb5a4111f5498e2cb54931c8a36c76
SHA512 4f231fc16339d568b5cf9353133aeae835eb262dab68bc80d92f37b43df64dce4fae0e913cbaa3bb61351a759aeecf9d280bc5779b0853c980559a654d6cca11

C:\Users\Admin\AppData\Roaming\ScreenScrew.exe

MD5 e87a04c270f98bb6b5677cc789d1ad1d
SHA1 8c14cb338e23d4a82f6310d13b36729e543ff0ca
SHA256 e03520794f00fb39ef3cfff012f72a5d03c60f89de28dbe69016f6ed151b5338
SHA512 8784f4d42908e54ecedfb06b254992c63920f43a27903ccedd336daaeed346db44e1f40e7db971735da707b5b32206be1b1571bc0d6a2d6eb90bbf9d1f69de13

memory/1572-292-0x0000000000160000-0x0000000000170000-memory.dmp

C:\Users\Admin\AppData\Roaming\rickroll.exe

MD5 0ec108e32c12ca7648254cf9718ad8d5
SHA1 78e07f54eeb6af5191c744ebb8da83dad895eca1
SHA256 48b08ea78124ca010784d9f0faae751fc4a0c72c0e7149ded81fc03819f5d723
SHA512 1129e685f5dd0cb2fa22ef4fe5da3f1e2632e890333ce17d3d06d04a4097b4d9f4ca7d242611ffc9e26079900945cf04ab6565a1c322e88e161f1929d18a2072

memory/5920-319-0x00000000016D0000-0x00000000016D8000-memory.dmp

memory/5920-320-0x000000001CBD0000-0x000000001CC1C000-memory.dmp

memory/1572-321-0x0000000004A40000-0x0000000004AD2000-memory.dmp

C:\Users\Admin\AppData\Roaming\Time.exe

MD5 9d0d2fcb45b1ff9555711b47e0cd65e5
SHA1 958f29a99cbb135c92c5d1cdffb9462be35ee9fd
SHA256 dc476ae39effdd80399b6e36f1fde92c216a5bbdb6b8b2a7ecbe753e91e4c993
SHA512 8fd4ce4674cd52a3c925149945a7a50a139302be17f6ee3f30271ebe1aa6d92bcb15a017dca989cd837a5d23cd56eaacc6344dc7730234a4629186976c857ca9

memory/1572-316-0x0000000004F50000-0x00000000054F4000-memory.dmp

C:\Users\Admin\AppData\Roaming\Trololo.exe

MD5 b6d61b516d41e209b207b41d91e3b90d
SHA1 e50d4b7bf005075cb63d6bd9ad48c92a00ee9444
SHA256 3d0efd55bde5fb7a73817940bac2a901d934b496738b7c5cab7ea0f6228e28fe
SHA512 3217fc904e4c71b399dd273786634a6a6c19064a9bf96960df9b3357001c12b9547813412173149f6185eb5d300492d290342ec955a8347c6f9dcac338c136da

C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

MD5 7050d5ae8acfbe560fa11073fef8185d
SHA1 5bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256 cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512 a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

memory/1572-351-0x0000000004A20000-0x0000000004A2A000-memory.dmp

C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe

MD5 6e49c75f701aa059fa6ed5859650b910
SHA1 ccb7898c509c3a1de96d2010d638f6a719f6f400
SHA256 f91f02fd27ada64f36f6df59a611fef106ff7734833dea825d0612e73bdfb621
SHA512 ccd1b581a29de52d2313a97eb3c3b32b223dba1e7a49c83f7774b374bc2d16b13fba9566de6762883f3b64ed8e80327b454e5d32392af2a032c22653fed0fff8

memory/6068-369-0x0000000000930000-0x00000000009EC000-memory.dmp

C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe

MD5 515198a8dfa7825f746d5921a4bc4db9
SHA1 e1da0b7f046886c1c4ff6993f7f98ee9a1bc90ae
SHA256 0fda176b199295f72fafc3bc25cefa27fa44ed7712c3a24ca2409217e430436d
SHA512 9e47037fe40b79ebf056a9c6279e318d85da9cd7e633230129d77a1b8637ecbafc60be38dd21ca9077ebfcb9260d87ff7fcc85b8699b3135148fe956972de3e8

memory/5160-389-0x0000000000400000-0x00000000006BC000-memory.dmp

C:\Users\Admin\AppData\Roaming\RedBoot.exe

MD5 e0340f456f76993fc047bc715dfdae6a
SHA1 d47f6f7e553c4bc44a2fe88c2054de901390b2d7
SHA256 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887
SHA512 cac10c675d81630eefca49b2ac4cc83f3eb29115ee28a560db4d6c33f70bf24980e48bb48ce20375349736e3e6b23a1ca504b9367917328853fffc5539626bbc

C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe

MD5 bd65d387482def1fe00b50406f731763
SHA1 d06a2ba2e29228f443f97d1dd3a8da5dd7df5903
SHA256 1ab7375550516d7445c47fd9b551ed864f227401a14ff3f1ff0d70caca3bd997
SHA512 351ecd109c4d49bc822e8ade73a9516c4a531ebcda63546c155e677dcff19708068dc588b2fcf30cad086238e8b206fc5f349d37dda02d3c3a8d9b570d92e4d9

C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe

MD5 e263c5b306480143855655233f76dc5a
SHA1 e7dcd6c23c72209ee5aa0890372de1ce52045815
SHA256 1f69810b8fe71e30a8738278adf09dd982f7de0ab9891d296ce7ea61b3fa4f69
SHA512 e95981eae02d0a8bf44493c64cca8b7e50023332e91d75164735a1d0e38138f358100c93633ff3a0652e1c12a5155cba77d81e01027422d7d5f71000eafb4113

memory/5856-414-0x000000001CCE0000-0x000000001CCEE000-memory.dmp

memory/5856-413-0x00000000217B0000-0x00000000217E8000-memory.dmp

C:\Users\Admin\AppData\Roaming\RedEye.exe

MD5 e9e5596b42f209cc058b55edc2737a80
SHA1 f30232697b3f54e58af08421da697262c99ec48b
SHA256 9ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305
SHA512 e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7

memory/3648-424-0x0000000005340000-0x00000000053DC000-memory.dmp

memory/3648-423-0x00000000009F0000-0x0000000000A62000-memory.dmp

C:\Users\Admin\30845522\assembler.exe

MD5 7e3cea1f686207563c8369f64ea28e5b
SHA1 a1736fd61555841396b0406d5c9ca55c4b6cdf41
SHA256 2a5305369edb9c2d7354b2f210e91129e4b8c546b0adf883951ea7bf7ee0f2b2
SHA512 4629bc32094bdb030e6c9be247068e7295599203284cb95921c98fcbe3ac60286670be7e5ee9f0374a4017286c7af9db211bd831e3ea871d31a509d7bbc1d6a3

C:\Users\Admin\AppData\Roaming\Rokku.exe

MD5 97512f4617019c907cd0f88193039e7c
SHA1 24cfa261ee30f697e7d1e2215eee1c21eebf4579
SHA256 438888ef36bad1079af79daf152db443b4472c5715a7b3da0ba24cc757c53499
SHA512 cfbb8dd91434f917d507cb919aa7e6b16b7b2056d56185f6ad5b6149e05629325cdb3df907f58bb3f634b17a9989bf5b6d6b81f5396a3a556431742ed742ac4a

memory/4312-474-0x0000000000400000-0x000000000058D000-memory.dmp

C:\Users\Admin\AppData\Roaming\SporaRansomware.exe

MD5 4a4a6d26e6c8a7df0779b00a42240e7b
SHA1 8072bada086040e07fa46ce8c12bf7c453c0e286
SHA256 7ad9ed23a91643b517e82ad5740d24eca16bcae21cfe1c0da78ee80e0d1d3f02
SHA512 c7a7b15d8dbf8e8f8346a4dab083bb03565050281683820319906da4d23b97b39e88f841b30fc8bd690c179a8a54870238506ca60c0f533d34ac11850cdc1a95

C:\Users\Admin\AppData\Roaming\u.wry

MD5 cf1416074cd7791ab80a18f9e7e219d9
SHA1 276d2ec82c518d887a8a3608e51c56fa28716ded
SHA256 78e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df
SHA512 0bb0843a90edacaf1407e6a7273a9fbb896701635e4d9467392b7350ad25a1bec0c1ceef36737b4af5e5841936f4891436eded0533aa3d74c9a54efa42f024c5

memory/6140-589-0x0000000000400000-0x0000000000431000-memory.dmp

memory/6072-588-0x0000000000400000-0x0000000000464000-memory.dmp

C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe

MD5 dbfbf254cfb84d991ac3860105d66fc6
SHA1 893110d8c8451565caa591ddfccf92869f96c242
SHA256 68b0e1932f3b4439865be848c2d592d5174dbdbaab8f66104a0e5b28c928ee0c
SHA512 5e9ccdf52ebdb548c3fa22f22dd584e9a603ca1163a622db5707dbcc5d01e4835879dcfd28cb1589cbb25aed00f352f7a0a0962b1f38b68fc7d6693375e7666d

memory/932-664-0x0000000000B80000-0x0000000000C2C000-memory.dmp

C:\Users\Admin\AppData\Roaming\msg\m_finnish.wnry

MD5 35c2f97eea8819b1caebd23fee732d8f
SHA1 e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA256 1adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512 908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf

memory/5160-733-0x0000000000400000-0x00000000006BC000-memory.dmp

memory/5296-771-0x0000000000D50000-0x0000000000FDE000-memory.dmp

memory/6924-772-0x0000000000400000-0x000000000044F000-memory.dmp

C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\decoder.dll

MD5 3531cf7755b16d38d5e9e3c43280e7d2
SHA1 19981b17ae35b6e9a0007551e69d3e50aa1afffe
SHA256 76133e832c15aa5cbc49fb3ba09e0b8dd467c307688be2c9e85e79d3bf62c089
SHA512 7b053ba2cf92ef2431b98b2a06bd56340dad94de36d11e326a80cd61b9acb378ac644ac407cf970f4ef8333b8d3fb4ff40b18bb41ec5aee49d79a6a2adcf28fd

C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi

MD5 27bc9540828c59e1ca1997cf04f6c467
SHA1 bfa6d1ce9d4df8beba2bedf59f86a698de0215f3
SHA256 05c18698c3dc3b2709afd3355ad5b91a60b2121a52e5fcc474e4e47fb8e95e2a
SHA512 a3ae822116cddb52d859de7ffc958541bb47c355a835c5129aade9cc0e5fba3ff25387061deb5b55b5694a535f09fe8669485282eb6e7c818cc7092eb3392848

C:\Users\Admin\AppData\Roaming\7ev3n.exe

MD5 9f8bc96c96d43ecb69f883388d228754
SHA1 61ed25a706afa2f6684bb4d64f69c5fb29d20953
SHA256 7d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5
SHA512 550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6

C:\Users\Admin\AppData\Roaming\$uckyLocker.exe

MD5 c850f942ccf6e45230169cc4bd9eb5c8
SHA1 51c647e2b150e781bd1910cac4061a2cee1daf89
SHA256 86e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f
SHA512 2b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 4d92cd9b6cce57bcc02f7250cbfa431d
SHA1 c63187cb723e7325d70adb1a38ae3b72f5f49708
SHA256 22878d854e100f121dcc0c932d1bb1dbfb880e34093fa99e97561a368af5bc16
SHA512 d051d9f2c8e2d96533960a1f6d0a762bf879d976771490835e080572c27b04353f3c88cbe88a7230306fe2907793ca092a4441d875d0a00505c142d3c60ffa04

memory/1112-803-0x0000000000BD0000-0x0000000000C3E000-memory.dmp

memory/4312-802-0x0000000000400000-0x000000000058D000-memory.dmp

memory/3916-666-0x000002785E1E0000-0x000002785E1F7000-memory.dmp

memory/3824-665-0x000002D4E22C0000-0x000002D4E22D7000-memory.dmp

memory/3504-663-0x0000000008E60000-0x0000000008E77000-memory.dmp

memory/3504-662-0x0000000008E60000-0x0000000008E77000-memory.dmp

memory/3504-661-0x0000000008E60000-0x0000000008E77000-memory.dmp

memory/3504-660-0x0000000008E60000-0x0000000008E77000-memory.dmp

memory/3504-659-0x0000000008E60000-0x0000000008E77000-memory.dmp

memory/2876-658-0x000001C8FF8E0000-0x000001C8FF8F7000-memory.dmp

memory/932-654-0x00000000005F0000-0x00000000008B9000-memory.dmp

memory/932-653-0x0000000000410000-0x00000000004CE000-memory.dmp

C:\Users\Admin\AppData\Roaming\Xyeta.exe

MD5 9d15a3b314600b4c08682b0202700ee7
SHA1 208e79cdb96328d5929248bb8a4dd622cf0684d1
SHA256 3ab3833e31e4083026421c641304369acfd31b957b78af81f3c6ef4968ef0e15
SHA512 9916397b782aaafa68eb6a781ea9a0db27f914035dd586142c818ccbd7e69036896767bedba97489d5100de262a554cf14bcdf4a24edda2c5d37217b265398d3

memory/5536-648-0x0000016332910000-0x0000016332927000-memory.dmp

memory/4224-641-0x000001D995F90000-0x000001D995FA7000-memory.dmp

memory/3308-640-0x0000023A95BD0000-0x0000023A95BE7000-memory.dmp

memory/5224-639-0x0000010D7E4B0000-0x0000010D7E4C7000-memory.dmp

memory/6060-638-0x0000027022700000-0x0000027022717000-memory.dmp

memory/6012-637-0x0000017E80370000-0x0000017E80387000-memory.dmp

memory/5900-636-0x000002091C190000-0x000002091C1A7000-memory.dmp

memory/5936-635-0x00000247D44E0000-0x00000247D44F7000-memory.dmp

memory/1764-634-0x000001F792500000-0x000001F792517000-memory.dmp

memory/5536-633-0x0000016332910000-0x0000016332927000-memory.dmp

memory/1948-632-0x0000000000BF0000-0x0000000000C07000-memory.dmp

memory/3136-631-0x0000023984BF0000-0x0000023984C07000-memory.dmp

memory/5688-630-0x0000018A56C60000-0x0000018A56C77000-memory.dmp

memory/5784-629-0x000000001CB60000-0x000000001CB77000-memory.dmp

memory/4496-628-0x0000000000630000-0x0000000000647000-memory.dmp

memory/5364-627-0x000001C584730000-0x000001C584747000-memory.dmp

memory/5920-624-0x000000001CB00000-0x000000001CB17000-memory.dmp

memory/5564-622-0x0000000021800000-0x0000000021817000-memory.dmp

memory/1644-619-0x000001E621960000-0x000001E621977000-memory.dmp

memory/4076-617-0x000001F481100000-0x000001F481117000-memory.dmp

memory/3980-616-0x000001B3B7C20000-0x000001B3B7C37000-memory.dmp

memory/932-657-0x00000000009D0000-0x0000000000B71000-memory.dmp

memory/3916-615-0x000002785E1E0000-0x000002785E1F7000-memory.dmp

memory/3824-614-0x000002D4E22C0000-0x000002D4E22D7000-memory.dmp

memory/3504-612-0x0000000008E60000-0x0000000008E77000-memory.dmp

memory/932-656-0x0000000000170000-0x0000000000200000-memory.dmp

memory/2876-610-0x000001C8FF8E0000-0x000001C8FF8F7000-memory.dmp

memory/2828-655-0x000001F76CE60000-0x000001F76CE77000-memory.dmp

memory/2828-609-0x000001F76CE60000-0x000001F76CE77000-memory.dmp

memory/1752-608-0x0000000000400000-0x0000000000417000-memory.dmp

memory/1752-607-0x0000000000400000-0x0000000000417000-memory.dmp

memory/4604-596-0x0000000000400000-0x0000000000432000-memory.dmp

memory/5144-626-0x0000000000880000-0x0000000000897000-memory.dmp

memory/5920-625-0x000000001CB00000-0x000000001CB17000-memory.dmp

memory/5856-623-0x0000000001410000-0x0000000001427000-memory.dmp

memory/3188-621-0x0000018399DE0000-0x0000018399DF7000-memory.dmp

memory/2960-620-0x0000024EA6740000-0x0000024EA6757000-memory.dmp

memory/2696-618-0x000001C07F7D0000-0x000001C07F7E7000-memory.dmp

memory/3624-613-0x00000181BAA90000-0x00000181BAAA7000-memory.dmp

memory/2884-611-0x0000024B088A0000-0x0000024B088B7000-memory.dmp

memory/5252-598-0x0000000000400000-0x0000000000432000-memory.dmp

memory/6064-597-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4528-595-0x0000000000400000-0x00000000004A4000-memory.dmp

memory/6000-581-0x0000000000400000-0x0000000000452000-memory.dmp

memory/5788-580-0x0000000000400000-0x00000000004A6000-memory.dmp

C:\Users\Admin\AppData\Roaming\@[email protected]

MD5 7e6b6da7c61fcb66f3f30166871def5b
SHA1 00f699cf9bbc0308f6e101283eca15a7c566d4f9
SHA256 4a25d98c121bb3bd5b54e0b6a5348f7b09966bffeec30776e5a731813f05d49e
SHA512 e5a56137f325904e0c7de1d0df38745f733652214f0cdb6ef173fa0743a334f95bed274df79469e270c9208e6bdc2e6251ef0cdd81af20fa1897929663e2c7d3

C:\Users\Admin\AppData\Roaming\@[email protected]

MD5 7bf2b57f2a205768755c07f238fb32cc
SHA1 45356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256 b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA512 91a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9

memory/1092-575-0x0000000000400000-0x0000000000412000-memory.dmp

memory/5444-559-0x0000000000400000-0x000000000049B000-memory.dmp

C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe

MD5 84c82835a5d21bbcf75a61706d8ab549
SHA1 5ff465afaabcbf0150d1a3ab2c2e74f3a4426467
SHA256 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
SHA512 90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244

memory/1092-547-0x0000000000400000-0x0000000000412000-memory.dmp

memory/5312-542-0x0000000010000000-0x0000000010012000-memory.dmp

memory/1092-541-0x0000000000400000-0x0000000000412000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 433b4315bd1f6622c14fbf274ee90e43
SHA1 0917c1d8769494c5931fce74244d0c56c7c49589
SHA256 a51ff1599f6b730a2ea5a3d1a5a433f3861c6acad7053040511bd4bf62aefbef
SHA512 7580f3abea95756f86a04c8aeefe0f5314583ea9eef50583aa6597eb63411b894ee716eb02e934aa976d9e5702fcd5d44894c62ae93af8469a7e3fb5bc3e3228

memory/5252-524-0x0000000000400000-0x0000000000432000-memory.dmp

memory/1932-523-0x0000000000400000-0x0000000000407200-memory.dmp

C:\Users\Admin\AppData\Roaming\Annabelle.exe

MD5 4c46666f2f66f766f7bbebbfc0668a63
SHA1 e6894215b52e25770d7063a9fc9e724bb1b81aa5
SHA256 2a914484988c88abde4b1d0ddbbda31b830ef6e95c2e834979b48f51febb290b
SHA512 7c6559d1328796c95596dea73a033182876f69db17b9e9c5e9708e518ffd283759593fe45a01a7cb1fa22e25695f7e5ff4df676f44801fbaaf259da89c526143

C:\Users\Admin\AppData\Roaming\ViraLock.exe

MD5 8803d517ac24b157431d8a462302b400
SHA1 b56afcad22e8cda4d0e2a98808b8e8c5a1059d4e
SHA256 418395efd269bc6534e02c92cb2c568631ada6e54bc55ade4e4a5986605ff786
SHA512 38fdfe0bc873e546b05a8680335526eec61ccc8cf3f37c60eee0bc83ec54570077f1dc1da26142488930eabcc21cb7a33c1b545a194cbfb4c87e430c4b2bfb50

C:\Users\Admin\AppData\Roaming\UIWIX.exe

MD5 a933a1a402775cfa94b6bee0963f4b46
SHA1 18aa7b02f933c753989ba3d16698a5ee3a4d9420
SHA256 146581f0b3fbe00026ee3ebe68797b0e57f39d1d8aecc99fdc3290e9cfadc4fc
SHA512 d83da3c97ffd78c42f49b7bfb50525e7c964004b4b7d9cba839c0d8bf3a5fe0424be3b3782e33c57debc6b13b5420a3fa096643c8b7376b3accfb1bc4e7d7368

C:\Users\Admin\AppData\Roaming\WannaCry.exe

MD5 5c7fb0927db37372da25f270708103a2
SHA1 120ed9279d85cbfa56e5b7779ffa7162074f7a29
SHA256 be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844
SHA512 a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206

C:\Users\Admin\AppData\Roaming\Satana.exe

MD5 46bfd4f1d581d7c0121d2b19a005d3df
SHA1 5b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256 683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512 b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5

C:\Users\Admin\AppData\Roaming\Seftad.exe

MD5 86a3a3ce16360e01933d71d0bf1f2c37
SHA1 af54089e3601c742d523b507b3a0793c2b6e60be
SHA256 2ebe23ba9897d9c127b9c0a737ba63af8d0bcd76ec866610cc0b5de2f62b87bd
SHA512 65a3571cf5b057d2c3ce101346947679f162018fa5eadf79c5a6af6c0a3bc9b12731ff13f27629b14983ef8bc73fa9782cc0a9e6c44b0ffc2627da754c324d6e

memory/3136-478-0x0000023983DA0000-0x000002398483C000-memory.dmp

C:\Users\Admin\AppData\Roaming\satan.exe

MD5 c9c341eaf04c89933ed28cbc2739d325
SHA1 c5b7d47aef3bd33a24293138fcba3a5ff286c2a8
SHA256 1a0a2fd546e3c05e15b2db3b531cb8e8755641f5f1c17910ce2fb7bbce2a05b7
SHA512 7cfa6ec0be0f5ae80404c6c709a6fd00ca10a18b6def5ca746611d0d32a9552f7961ab0ebf8a336b27f7058d700205be7fcc859a30d7d185aa9457267090f99b

C:\Users\Admin\AppData\Roaming\Rensenware.exe

MD5 60335edf459643a87168da8ed74c2b60
SHA1 61f3e01174a6557f9c0bfc89ae682d37a7e91e2e
SHA256 7bf5623f0a10dfa148a35bebd899b7758612f1693d2a9910f716cf15a921a76a
SHA512 b4e5e4d4f0b4a52243d6756c66b4fe6f4b39e64df7790072046e8a3dadad3a1be30b8689a1bab8257cc35cb4df652888ddf62b4e1fccb33e1bbf1f5416d73efb

memory/3648-455-0x00000000055F0000-0x0000000005646000-memory.dmp

C:\Users\Admin\30845522\protect.exe

MD5 fd414666a5b2122c3d9e3e380cf225ed
SHA1 de139747b42a807efa8a2dcc1a8304f9a29b862d
SHA256 e61a8382f7293e40cb993ddcbcaa53a4e5f07a3d6b6a1bfe5377a1a74a8dcac6
SHA512 9ab2163d7deff29c202ed88dba36d5b28f6c67e647a0cadb3d03cc725796e19e5f298c04b1c8523d1d1ee4307e1a5d6f8156fa4021627d6ca1bbd0830695ae05

memory/5296-411-0x0000000000D50000-0x0000000000FDE000-memory.dmp

C:\Users\Admin\AppData\Roaming\Vista.exe

MD5 faa6cb3e816adaeaabf2930457c79c33
SHA1 6539de41b48d271bf4237e6eb09b0ee40f9a2140
SHA256 6680317e6eaa04315b47aaadd986262cd485c8a4bd843902f4c779c858a3e31b
SHA512 58859556771203d736ee991b651a6a409de7e3059c2afe81d4545864295c383f75cfbabf3cffaa0c412a6ec27bf939f0893c28152f53512c7885e597db8d2c66

memory/5856-356-0x000000001CCA0000-0x000000001CCA8000-memory.dmp

memory/7560-1049-0x0000000000400000-0x0000000000432000-memory.dmp

C:\Users\Admin\AppData\Roaming\Cerber5.exe

MD5 fe1bc60a95b2c2d77cd5d232296a7fa4
SHA1 c07dfdea8da2da5bad036e7c2f5d37582e1cf684
SHA256 b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d
SHA512 266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89

memory/8072-1089-0x0000000000400000-0x0000000000438000-memory.dmp

C:\Users\Admin\AppData\Roaming\CryptoWall.exe

MD5 919034c8efb9678f96b47a20fa6199f2
SHA1 747070c74d0400cffeb28fbea17b64297f14cfbd
SHA256 e036d68b8f8b7afc6c8b6252876e1e290f11a26d4ad18ac6f310662845b2c734
SHA512 745a81c50bbfd62234edb9788c83a22e0588c5d25c00881901923a02d7096c71ef5f0cd5b73f92ad974e5174de064b0c5ea8044509039aab14b2aed83735a7c4

C:\Users\Admin\AppData\Roaming\USCC5-A8ETZ-TXTXH-TGTOY.KEY

MD5 4808305339755ab137530a7f6307aff2
SHA1 12a8aaef6f50c0d889889a5a55e31107b02af13e
SHA256 fca286628850d0fea62e99b7822adebc46e7038f77acd827c3b58f74c56ac97e
SHA512 1c17d3eef94f18bf2ae1cb2a6fc4b4ed74fa35526313ab4a6ac30ea8cae94938e287953055b582ec03ff64df0f41f1c081e46970b8ecc3d64c2ac5686302f60b

memory/7024-1118-0x0000000000400000-0x000000000056F000-memory.dmp

memory/7840-1163-0x000002396E760000-0x000002396F754000-memory.dmp

C:\Users\Admin\AppData\Roaming\DeriaLock.exe

MD5 0a7b70efba0aa93d4bc0857b87ac2fcb
SHA1 01a6c963b2f5f36ff21a1043587dcf921ae5f5cd
SHA256 4f5bff64160044d9a769ab277ff85ba954e2a2e182c6da4d0672790cf1d48309
SHA512 2033f9637b8d023242c93f54c140dd561592a3380a15a9fdc8ebfa33385ff4fc569d66c846a01b4ac005f0521b3c219e87f4b1ed2a83557f9d95fa066ad25e14

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

MD5 04fb36199787f2e3e2135611a38321eb
SHA1 65559245709fe98052eb284577f1fd61c01ad20d
SHA256 d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512 533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444

C:\Users\Admin\AppData\Roaming\CoronaVirus.exe

MD5 055d1462f66a350d9886542d4d79bc2b
SHA1 f1086d2f667d807dbb1aa362a7a809ea119f2565
SHA256 dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0
SHA512 2c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1

C:\Users\Admin\AppData\Roaming\Birele.exe

MD5 41789c704a0eecfdd0048b4b4193e752
SHA1 fb1e8385691fa3293b7cbfb9b2656cf09f20e722
SHA256 b2dcfdf9e7b09f2aa5004668370e77982963ace820e7285b2e264a294441da23
SHA512 76391ac85fdc3be75441fcd6e19bed08b807d3946c7281c647f16a3be5388f7be307e6323fac8502430a4a6d800d52a88709592a49011ecc89de4f19102435ea

C:\Users\Admin\AppData\Roaming\BadRabbit.exe

MD5 fbbdc39af1139aebba4da004475e8839
SHA1 de5c8d858e6e41da715dca1c019df0bfb92d32c0
SHA256 630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da
SHA512 74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87

memory/6924-1053-0x0000000000400000-0x000000000044F000-memory.dmp

memory/7560-1033-0x0000000000400000-0x0000000000432000-memory.dmp

memory/7120-1250-0x0000000000DE0000-0x0000000000E62000-memory.dmp

C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe

MD5 b805db8f6a84475ef76b795b0d1ed6ae
SHA1 7711cb4873e58b7adcf2a2b047b090e78d10c75b
SHA256 f5d002bfe80b48386a6c99c41528931b7f5df736cd34094463c3f85dde0180bf
SHA512 62a2c329b43d186c4c602c5f63efc8d2657aa956f21184334263e4f6d0204d7c31f86bda6e85e65e3b99b891c1630d805b70997731c174f6081ecc367ccf9416

C:\Users\Admin\AppData\Roaming\Krotten.exe

MD5 87ccd6f4ec0e6b706d65550f90b0e3c7
SHA1 213e6624bff6064c016b9cdc15d5365823c01f5f
SHA256 e79f164ccc75a5d5c032b4c5a96d6ad7604faffb28afe77bc29b9173fa3543e4
SHA512 a72403d462e2e2e181dbdabfcc02889f001387943571391befed491aaecba830b0869bdd4d82bca137bd4061bbbfb692871b1b4622c4a7d9f16792c60999c990

C:\Users\Admin\AppData\Roaming\NotPetya.exe

MD5 5b7e6e352bacc93f7b80bc968b6ea493
SHA1 e686139d5ed8528117ba6ca68fe415e4fb02f2be
SHA256 63545fa195488ff51955f09833332b9660d18f8afb16bdf579134661962e548a
SHA512 9d24af0cb00fb8a5e61e9d19cd603b5541a22ae6229c2acf498447e0e7d4145fee25c8ab9d5d5f18f554e6cbf8ca56b7ca3144e726d7dfd64076a42a25b3dfb6

C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe

MD5 63210f8f1dde6c40a7f3643ccf0ff313
SHA1 57edd72391d710d71bead504d44389d0462ccec9
SHA256 2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f
SHA512 87a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11

C:\Users\Admin\AppData\Roaming\Locky.AZ.exe

MD5 0826df3aaa157edff9c0325f298850c2
SHA1 ed35b02fa029f1e724ed65c2de5de6e5c04f7042
SHA256 2e4319ff62c03a539b2b2f71768a0cfc0adcaedbcca69dbf235081fe2816248b
SHA512 af6c5734fd02b9ad3f202e95f9ff4368cf0dfdaffe0d9a88b781b196a0a3c44eef3d8f7c329ec6e3cbcd3e6ab7c49df7d715489539e631506ca1ae476007a6a6

C:\Users\Admin\AppData\Roaming\GandCrab.exe

MD5 e6b43b1028b6000009253344632e69c4
SHA1 e536b70e3ffe309f7ae59918da471d7bf4cadd1c
SHA256 bfb9db791b8250ffa8ebc48295c5dbbca757a5ed3bbb01de12a871b5cd9afd5a
SHA512 07da214314673407a7d3978ee6e1d20bf1e02f135bf557e86b50489ecc146014f2534515c1b613dba96e65489d8c82caaa8ed2e647684d61e5e86bd3e8251adf

C:\Users\Admin\AppData\Roaming\Fantom.exe

MD5 7d80230df68ccba871815d68f016c282
SHA1 e10874c6108a26ceedfc84f50881824462b5b6b6
SHA256 f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b
SHA512 64d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540

C:\Users\Admin\AppData\Roaming\Dharma.exe

MD5 928e37519022745490d1af1ce6f336f7
SHA1 b7840242393013f2c4c136ac7407e332be075702
SHA256 6fb303dd8ba36381948127d44bd8541e4a1ab8af07b46526ace08458f2498850
SHA512 8040195ab2b2e15c9d5ffa13a47a61c709738d1cf5e2108e848fedf3408e5bad5f2fc5f523f170f6a80cb33a4f5612d3d60dd343d028e55cfc08cd2f6ed2947c

memory/7096-1362-0x00000000049B0000-0x00000000049E2000-memory.dmp

memory/7096-1361-0x00000000024D0000-0x0000000002502000-memory.dmp

memory/3136-1490-0x000002399ED20000-0x000002399FD36000-memory.dmp

memory/7472-1359-0x00000000006E0000-0x000000000071C000-memory.dmp

memory/3136-1611-0x0000023984C10000-0x0000023984C16000-memory.dmp

C:\Users\Admin\Downloads\FUCKPCS\ac\nc123.exe

MD5 597de376b1f80c06d501415dd973dcec
SHA1 629c9649ced38fd815124221b80c9d9c59a85e74
SHA256 f47e3555461472f23ab4766e4d5b6f6fd260e335a6abc31b860e569a720a5446
SHA512 072565912208e97cc691e1a102e32fd6c243b5a3f8047a159e97aabbe302bddc36f3c52cecde3b506151bc89e0f3b5acf6552a82d83dac6e0180c873d36d3f6b

C:\Users\Admin\Downloads\FUCKPCS\ac\EVER\SearchHost.exe

MD5 8add121fa398ebf83e8b5db8f17b45e0
SHA1 c8107e5c5e20349a39d32f424668139a36e6cfd0
SHA256 35c4a6c1474eb870eec901cef823cc4931919a4e963c432ce9efbb30c2d8a413
SHA512 8f81c4552ff561eea9802e5319adcd6c7e5bdd1dc4c91e56fda6bdc9b7e8167b222500a0aee5cf27b0345d1c19ac9fa95ae4fd58d4c359a5232bcf86f03d2273

memory/4256-1750-0x0000000000400000-0x0000000000432000-memory.dmp

memory/8036-1749-0x0000000000400000-0x0000000000B02000-memory.dmp

C:\Users\Admin\Downloads\FUCKPCS\ac\mssql2.exe

MD5 3371847d0dfb1ca62c858ab2367c190b
SHA1 6c952ebd4cd3ea75d493be4121d638babbf7be0c
SHA256 3f8db969a2707aec5b1b14d0583bad8a95e12da5c7bbaae8f60d6251b2fcd81c
SHA512 1c0b7bfefdd65556ec97bc85ed95fef44c540ebebb1aebadbb9c321112d207017704525041bdb51a8c762d3d22b9c9060f66317409b9753b4a84553b05f15079

C:\Users\Admin\Downloads\FUCKPCS\ac\mssql.exe

MD5 60532781a04a2ef676ce0e4e9771d6d3
SHA1 f9d766cd65e2ba0c253eff3bee3c93159318d6d5
SHA256 173d624a3a49fa57b3ed6874345da4ae128582418278a4fe67241e9f2c497927
SHA512 03b3dd99f45764a2e024f3a7db6de7cecc96735bec2d7eddb8b1cc600565ca18afc202faf90a929f4ecc650c00c2c4187100631da06298646177fb817f9b4a06

memory/7528-1648-0x0000000000400000-0x0000000000432000-memory.dmp

memory/8072-1650-0x0000000000400000-0x0000000000438000-memory.dmp

memory/6464-1649-0x0000000000400000-0x0000000000431000-memory.dmp

C:\Users\Admin\lAAkUkoo\GsQsMwEw.inf

MD5 cb29fc560fb14b7c8b817adaeecc962f
SHA1 52a34e459709eeed27039f5af59dbcb55dee20f0
SHA256 46ed980eda89965787d10645f3742d36256fa4740dedad125d458bccc6b4dcde
SHA512 0ce884bb8bd3825658e07014c34b7b352850c319c3ad31a13e286f27957e0c82078323e32d6d914d4beb2811a06798e51a75bbec45fbc3b8bc878490da0ab494

C:\$Recycle.Bin\S-1-5-21-3350944739-639801879-157714471-1000\SNYYYGCIKK-MANUAL.txt

MD5 c066b4a51c8b6d84787a1c9ca2253991
SHA1 055ce576091b76c674ee8ae9f5d457d29912f51e
SHA256 0cd462d19cbba9494c1e5944a7bca0430cc02982e7ee0791ee917040a269829b
SHA512 dbff8d9069f12de307ab5b4256d4ef0242ba0107b9afa93abd04656000f6e5f5a541354f1057937fb43b7e21e49cecce87177e15ee7306f389c43f39d949ce5e

memory/4256-2110-0x0000000000400000-0x0000000000432000-memory.dmp

C:\Users\Admin\Downloads\FUCKPCS\esww.exe

MD5 a15e27c1999ef0a45f3241e8866b6f63
SHA1 2011e282ab610cfe3a51f4ace0cd528c19caf75f
SHA256 15fd7d83e58ccd478a79186dc6c5758353979ae1abe816bd436b260717d45fc2
SHA512 cec0a32b6546aaf727ae49964a8414213428f36692ff93629cbdd41ac6e8a8c940bfa45fe038910d9a5f2d8310c25079d5d2782c326758dd7189693a1d286b24

C:\Users\Admin\Documents\MountCopy.mpp.locked

MD5 553dda8f9d6b50d4b2087d9b908e5ac5
SHA1 b5f9dbf4646ab7aea0fdadd4ce6e528b96f5a57b
SHA256 8288480cd94c59fce9ac64396943716caf1d0d20b21e459fed07abc490117909
SHA512 5c9a0d9e19ef8cc5994957b947cf8a6b0cc3997ea7f0535bed223866d7ccd26622ac1a9e72d46802af81b30fb204f5b4d36ff96158afa5e13b7feab89e7c1eb4

C:\g6QpgrhJDdQZeF0\README_HOW_TO_UNLOCK.HTML

MD5 c784d96ca311302c6f2f8f0bee8c725b
SHA1 dc68b518ce0eef4f519f9127769e3e3fa8edce46
SHA256 a7836550412b0e0963d16d8442b894a1148326b86d119e4d30f1b11956380ef0
SHA512 f97891dc3c3f15b9bc3446bc9d5913431f374aa54cced33d2082cf14d173a8178e29a8d9487c2a1ab87d2f6abf37e915f69f45c0d8b747ad3f17970645c35d98

C:\g6QpgrhJDdQZeF0\README_HOW_TO_UNLOCK.TXT

MD5 04b892b779d04f3a906fde1a904d98bb
SHA1 1a0d6cb6f921bc06ba9547a84b872ef61eb7e8a5
SHA256 eb22c6ecfd4d7d0fcea5063201ccf5e7313780e007ef47cca01f1369ee0e6be0
SHA512 e946aa4ac3ec9e5a178eac6f4c63a98f46bc85bed3efd6a53282d87aa56e53b4c11bb0d1c58c6c670f9f4ad9952b5e7fd1bb310a8bd7b5b04e7c607d1b74238a

C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{02DF0BA2-5EF7-45D1-A2DC-4755B8EDCF07}.session

MD5 e692cae87d1ae9e4b9c947df72885685
SHA1 72c9a4fa91d7d8382917c5da68b05118f6a58c16
SHA256 ac952b222aa93ab5620a1f0f2db210852367b8249a231c0a69abe50d7090e500
SHA512 7e3ed431f9c78d1aba6cecd609f15e34100cca8e84e631b929f73aa9d307c2a4a0eb5be85d1e751ef97d89ef8249a17470da369ab4b942aa4003de8f54ec5400

memory/8036-4110-0x0000000000400000-0x0000000000B02000-memory.dmp

memory/7528-7098-0x0000000000400000-0x0000000000432000-memory.dmp

C:\Program Files\7-Zip\7z.dll.id-0B6F06A8.[[email protected]].ncov

MD5 59971e11b082d6704ae3e387ab0631a4
SHA1 abb8633b7d9728bc4b39f4919d1f52576ada3003
SHA256 13fa4957b28a3d538f1d14f8de4d1419fff445147c55c17934ff52e064474b55
SHA512 005a0ed53f4f2a78a105e48fe43126cf034ed548f63b55e6af531d43c1e9c1692374d8c7dbaa90b8f195744ae1c3c862545070a7c24d693fe08ddd2c41a07c99

memory/50312-21337-0x0000000000400000-0x0000000000432000-memory.dmp

memory/13904-21761-0x0000000000400000-0x0000000000439000-memory.dmp

C:\Users\Admin\AppData\Roaming\Nople.exe

MD5 7d595027f9fdd0451b069c0c65f2a6e4
SHA1 a4556275c6c45e19d5b784612c68b3ad90892537
SHA256 d2518df72d5cce230d98a435977d9283b606a5a4cafe8cd596641f96d8555254
SHA512 b8f37ecc78affa30a0c7c00409f2db1e2fd031f16c530a8c1d4b4bffaa5d55ac235b11540c8a611ae1a90b748b04498e3954cfb1529236937ef693c6b20e893b

C:\Users\Admin\AppData\Roaming\MadMan.exe

MD5 a56d479405b23976f162f3a4a74e48aa
SHA1 f4f433b3f56315e1d469148bdfd835469526262f
SHA256 17d81134a5957fb758b9d69a90b033477a991c8b0f107d9864dc790ca37e6a23
SHA512 f5594cde50ca5235f7759c9350d4054d7a61b5e61a197dffc04eb8cdef368572e99d212dd406ad296484b5f0f880bdc5ec9e155781101d15083c1564738a900a