Analysis

  • max time kernel
    141s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 06:14

Errors

Reason
Machine shutdown

General

Malware Config

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-493223053-2004649691-1575712786-1000\QOENU-MANUAL.txt

Family

gandcrab

Ransom Note
---= GANDCRAB V5.2 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE ARE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .QOENU The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/c1f2c8f0bcff494d | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/c1f2c8f0bcff494d

Signatures

  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Gandcrab family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • ASPack v2.12-2.42 5 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Modifies file permissions 1 TTPs 1 IoCs
  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Program crash 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 2 IoCs
  • Modifies registry key 1 TTPs 6 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of FindShellTrayWindow 56 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/J0F9V6
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3ec546f8,0x7ffc3ec54708,0x7ffc3ec54718
      2⤵
        PID:2052
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:2
        2⤵
          PID:4920
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2044
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:8
          2⤵
            PID:3532
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
            2⤵
              PID:4880
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
              2⤵
                PID:4980
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:1
                2⤵
                  PID:1868
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:8
                  2⤵
                    PID:4984
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4972
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:1
                    2⤵
                      PID:1268
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:1
                      2⤵
                        PID:4484
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:1
                        2⤵
                          PID:2832
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:1
                          2⤵
                            PID:1496
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:1
                            2⤵
                              PID:3360
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5872 /prefetch:8
                              2⤵
                                PID:1784
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:1
                                2⤵
                                  PID:3836
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3940 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3608
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,5521799083461787893,14443914676689455195,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5780 /prefetch:2
                                  2⤵
                                    PID:32116
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:5104
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:1520
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:1424
                                      • C:\Users\Admin\Downloads\FUCKPCS\freehacks.exe
                                        "C:\Users\Admin\Downloads\FUCKPCS\freehacks.exe"
                                        1⤵
                                          PID:1788
                                          • C:\Users\Admin\AppData\Roaming\Avoid.exe
                                            "C:\Users\Admin\AppData\Roaming\Avoid.exe"
                                            2⤵
                                              PID:4648
                                            • C:\Users\Admin\AppData\Roaming\ChilledWindows.exe
                                              "C:\Users\Admin\AppData\Roaming\ChilledWindows.exe"
                                              2⤵
                                                PID:4240
                                              • C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe
                                                "C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe"
                                                2⤵
                                                  PID:1380
                                                • C:\Users\Admin\AppData\Roaming\CrazyNCS.exe
                                                  "C:\Users\Admin\AppData\Roaming\CrazyNCS.exe"
                                                  2⤵
                                                    PID:3420
                                                  • C:\Users\Admin\AppData\Roaming\Curfun.exe
                                                    "C:\Users\Admin\AppData\Roaming\Curfun.exe"
                                                    2⤵
                                                      PID:3084
                                                    • C:\Users\Admin\AppData\Roaming\DesktopBoom.exe
                                                      "C:\Users\Admin\AppData\Roaming\DesktopBoom.exe"
                                                      2⤵
                                                        PID:436
                                                      • C:\Users\Admin\AppData\Roaming\Flasher.exe
                                                        "C:\Users\Admin\AppData\Roaming\Flasher.exe"
                                                        2⤵
                                                          PID:3452
                                                        • C:\Users\Admin\AppData\Roaming\Hydra.exe
                                                          "C:\Users\Admin\AppData\Roaming\Hydra.exe"
                                                          2⤵
                                                            PID:1684
                                                          • C:\Users\Admin\AppData\Roaming\Launcher.exe
                                                            "C:\Users\Admin\AppData\Roaming\Launcher.exe"
                                                            2⤵
                                                              PID:4824
                                                            • C:\Users\Admin\AppData\Roaming\Melting.exe
                                                              "C:\Users\Admin\AppData\Roaming\Melting.exe"
                                                              2⤵
                                                                PID:868
                                                              • C:\Users\Admin\AppData\Roaming\Popup.exe
                                                                "C:\Users\Admin\AppData\Roaming\Popup.exe"
                                                                2⤵
                                                                  PID:1620
                                                                • C:\Users\Admin\AppData\Roaming\rickroll.exe
                                                                  "C:\Users\Admin\AppData\Roaming\rickroll.exe"
                                                                  2⤵
                                                                    PID:2244
                                                                  • C:\Users\Admin\AppData\Roaming\ScreenScrew.exe
                                                                    "C:\Users\Admin\AppData\Roaming\ScreenScrew.exe"
                                                                    2⤵
                                                                      PID:2564
                                                                    • C:\Users\Admin\AppData\Roaming\Time.exe
                                                                      "C:\Users\Admin\AppData\Roaming\Time.exe"
                                                                      2⤵
                                                                        PID:5152
                                                                      • C:\Users\Admin\AppData\Roaming\Trololo.exe
                                                                        "C:\Users\Admin\AppData\Roaming\Trololo.exe"
                                                                        2⤵
                                                                          PID:5412
                                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                                            taskkill.exe /f /im explorer.exe
                                                                            3⤵
                                                                            • Kills process with taskkill
                                                                            PID:3976
                                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                                            taskkill.exe /f /im taskmgr.exe
                                                                            3⤵
                                                                            • Kills process with taskkill
                                                                            PID:5148
                                                                        • C:\Users\Admin\AppData\Roaming\Vista.exe
                                                                          "C:\Users\Admin\AppData\Roaming\Vista.exe"
                                                                          2⤵
                                                                            PID:5472
                                                                          • C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe
                                                                            "C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe"
                                                                            2⤵
                                                                              PID:5576
                                                                            • C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe
                                                                              "C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe"
                                                                              2⤵
                                                                                PID:5672
                                                                              • C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe
                                                                                "C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe"
                                                                                2⤵
                                                                                  PID:5768
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 5768 -s 1204
                                                                                    3⤵
                                                                                    • Program crash
                                                                                    PID:6072
                                                                                • C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe"
                                                                                  2⤵
                                                                                    PID:5832
                                                                                  • C:\Users\Admin\AppData\Roaming\RedBoot.exe
                                                                                    "C:\Users\Admin\AppData\Roaming\RedBoot.exe"
                                                                                    2⤵
                                                                                      PID:5892
                                                                                      • C:\Users\Admin\38382560\protect.exe
                                                                                        "C:\Users\Admin\38382560\protect.exe"
                                                                                        3⤵
                                                                                          PID:6112
                                                                                        • C:\Users\Admin\38382560\assembler.exe
                                                                                          "C:\Users\Admin\38382560\assembler.exe" -f bin "C:\Users\Admin\38382560\boot.asm" -o "C:\Users\Admin\38382560\boot.bin"
                                                                                          3⤵
                                                                                            PID:5112
                                                                                          • C:\Users\Admin\38382560\overwrite.exe
                                                                                            "C:\Users\Admin\38382560\overwrite.exe" "C:\Users\Admin\38382560\boot.bin"
                                                                                            3⤵
                                                                                              PID:6248
                                                                                          • C:\Users\Admin\AppData\Roaming\RedEye.exe
                                                                                            "C:\Users\Admin\AppData\Roaming\RedEye.exe"
                                                                                            2⤵
                                                                                              PID:5980
                                                                                              • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                vssadmin delete shadows /all /quiet
                                                                                                3⤵
                                                                                                • Interacts with shadow copies
                                                                                                PID:7288
                                                                                              • C:\Windows\SYSTEM32\NetSh.exe
                                                                                                NetSh Advfirewall set allprofiles state off
                                                                                                3⤵
                                                                                                • Modifies Windows Firewall
                                                                                                PID:7932
                                                                                            • C:\Users\Admin\AppData\Roaming\Rensenware.exe
                                                                                              "C:\Users\Admin\AppData\Roaming\Rensenware.exe"
                                                                                              2⤵
                                                                                                PID:1624
                                                                                                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
                                                                                                  dw20.exe -x -s 872
                                                                                                  3⤵
                                                                                                    PID:724
                                                                                                • C:\Users\Admin\AppData\Roaming\Rokku.exe
                                                                                                  "C:\Users\Admin\AppData\Roaming\Rokku.exe"
                                                                                                  2⤵
                                                                                                    PID:628
                                                                                                    • C:\Windows\SysWOW64\net.exe
                                                                                                      "C:\Windows\System32\net.exe" stop swprv
                                                                                                      3⤵
                                                                                                        PID:7080
                                                                                                        • C:\Windows\SysWOW64\net1.exe
                                                                                                          C:\Windows\system32\net1 stop swprv
                                                                                                          4⤵
                                                                                                            PID:33852
                                                                                                      • C:\Users\Admin\AppData\Roaming\satan.exe
                                                                                                        "C:\Users\Admin\AppData\Roaming\satan.exe"
                                                                                                        2⤵
                                                                                                          PID:5396
                                                                                                          • C:\Users\Admin\AppData\Roaming\satan.exe
                                                                                                            "C:\Users\Admin\AppData\Roaming\satan.exe"
                                                                                                            3⤵
                                                                                                              PID:5012
                                                                                                              • C:\Users\Admin\AppData\Roaming\Enge\woequ.exe
                                                                                                                "C:\Users\Admin\AppData\Roaming\Enge\woequ.exe"
                                                                                                                4⤵
                                                                                                                  PID:5788
                                                                                                                  • C:\Users\Admin\AppData\Roaming\Enge\woequ.exe
                                                                                                                    "C:\Users\Admin\AppData\Roaming\Enge\woequ.exe"
                                                                                                                    5⤵
                                                                                                                      PID:5452
                                                                                                                      • C:\Windows\System32\vssadmin.exe
                                                                                                                        "C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet
                                                                                                                        6⤵
                                                                                                                        • Interacts with shadow copies
                                                                                                                        PID:4028
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_ed29474a.bat"
                                                                                                                    4⤵
                                                                                                                      PID:5840
                                                                                                                • C:\Users\Admin\AppData\Roaming\Satana.exe
                                                                                                                  "C:\Users\Admin\AppData\Roaming\Satana.exe"
                                                                                                                  2⤵
                                                                                                                    PID:5456
                                                                                                                  • C:\Users\Admin\AppData\Roaming\Seftad.exe
                                                                                                                    "C:\Users\Admin\AppData\Roaming\Seftad.exe"
                                                                                                                    2⤵
                                                                                                                      PID:5688
                                                                                                                    • C:\Users\Admin\AppData\Roaming\SporaRansomware.exe
                                                                                                                      "C:\Users\Admin\AppData\Roaming\SporaRansomware.exe"
                                                                                                                      2⤵
                                                                                                                        PID:5652
                                                                                                                        • C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                          "C:\Windows\System32\wbem\WMIC.exe" process call create "cmd.exe /c vssadmin.exe delete shadows /all /quiet & bcdedit.exe /set {default} recoveryenabled no & bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures"
                                                                                                                          3⤵
                                                                                                                            PID:5132
                                                                                                                        • C:\Users\Admin\AppData\Roaming\ViraLock.exe
                                                                                                                          "C:\Users\Admin\AppData\Roaming\ViraLock.exe"
                                                                                                                          2⤵
                                                                                                                            PID:6204
                                                                                                                            • C:\Users\Admin\vKAUYEsc\xyIAEwgE.exe
                                                                                                                              "C:\Users\Admin\vKAUYEsc\xyIAEwgE.exe"
                                                                                                                              3⤵
                                                                                                                                PID:6524
                                                                                                                                • C:\ProgramData\LCYkoMQw\jqoUMAEY.exe
                                                                                                                                  "C:\ProgramData\LCYkoMQw\jqoUMAEY.exe"
                                                                                                                                  4⤵
                                                                                                                                    PID:52112
                                                                                                                                • C:\ProgramData\LCYkoMQw\jqoUMAEY.exe
                                                                                                                                  "C:\ProgramData\LCYkoMQw\jqoUMAEY.exe"
                                                                                                                                  3⤵
                                                                                                                                    PID:6628
                                                                                                                                    • C:\Users\Admin\vKAUYEsc\xyIAEwgE.exe
                                                                                                                                      "C:\Users\Admin\vKAUYEsc\xyIAEwgE.exe"
                                                                                                                                      4⤵
                                                                                                                                        PID:19904
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\ViraLock"
                                                                                                                                      3⤵
                                                                                                                                        PID:6656
                                                                                                                                        • C:\Users\Admin\AppData\Roaming\ViraLock.exe
                                                                                                                                          C:\Users\Admin\AppData\Roaming\ViraLock
                                                                                                                                          4⤵
                                                                                                                                            PID:3568
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                          3⤵
                                                                                                                                          • Modifies registry key
                                                                                                                                          PID:6756
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                          3⤵
                                                                                                                                          • Modifies registry key
                                                                                                                                          PID:6788
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                          3⤵
                                                                                                                                          • Modifies registry key
                                                                                                                                          PID:6924
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fMokIUUM.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""
                                                                                                                                          3⤵
                                                                                                                                            PID:7112
                                                                                                                                        • C:\Users\Admin\AppData\Roaming\WannaCry.exe
                                                                                                                                          "C:\Users\Admin\AppData\Roaming\WannaCry.exe"
                                                                                                                                          2⤵
                                                                                                                                            PID:6308
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c 89501731826429.bat
                                                                                                                                              3⤵
                                                                                                                                                PID:6488
                                                                                                                                            • C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe
                                                                                                                                              "C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe"
                                                                                                                                              2⤵
                                                                                                                                                PID:6852
                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                  attrib +h .
                                                                                                                                                  3⤵
                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                  PID:6088
                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                  icacls . /grant Everyone:F /T /C /Q
                                                                                                                                                  3⤵
                                                                                                                                                  • Modifies file permissions
                                                                                                                                                  PID:5704
                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                  attrib +h +s F:\$RECYCLE
                                                                                                                                                  3⤵
                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                  PID:6480
                                                                                                                                              • C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe
                                                                                                                                                "C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe"
                                                                                                                                                2⤵
                                                                                                                                                  PID:6104
                                                                                                                                                  • C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                    "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe SETUPEXEDIR=C:\Users\Admin\AppData\Roaming\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "
                                                                                                                                                    3⤵
                                                                                                                                                      PID:5564
                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Xyeta.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Xyeta.exe"
                                                                                                                                                    2⤵
                                                                                                                                                      PID:6224
                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 6224 -s 448
                                                                                                                                                        3⤵
                                                                                                                                                        • Program crash
                                                                                                                                                        PID:6916
                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\$uckyLocker.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\$uckyLocker.exe"
                                                                                                                                                      2⤵
                                                                                                                                                        PID:5828
                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\7ev3n.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\7ev3n.exe"
                                                                                                                                                        2⤵
                                                                                                                                                          PID:4272
                                                                                                                                                          • C:\Users\Admin\AppData\Local\system.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\system.exe"
                                                                                                                                                            3⤵
                                                                                                                                                              PID:6160
                                                                                                                                                              • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                                                                                                C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f
                                                                                                                                                                4⤵
                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                PID:4196
                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\BadRabbit.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\BadRabbit.exe"
                                                                                                                                                            2⤵
                                                                                                                                                              PID:6208
                                                                                                                                                              • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:5640
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 07:12:00
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:8080
                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                        schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 07:12:00
                                                                                                                                                                        5⤵
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:3496
                                                                                                                                                                    • C:\Windows\E8B5.tmp
                                                                                                                                                                      "C:\Windows\E8B5.tmp" \\.\pipe\{6203F8DA-E740-4824-9FD8-44A5DF263184}
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:6764
                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Cerber5.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Cerber5.exe"
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:5928
                                                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                        C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                                                        PID:1504
                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:7120
                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w00000220
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:5008
                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\DeriaLock.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\DeriaLock.exe"
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:6680
                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Dharma.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\Dharma.exe"
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:5420
                                                                                                                                                                              • C:\Users\Admin\Downloads\FUCKPCS\ac\nc123.exe
                                                                                                                                                                                "C:\Users\Admin\Downloads\FUCKPCS\ac\nc123.exe"
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:5556
                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\GandCrab.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\GandCrab.exe"
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:2148
                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe"
                                                                                                                                                                                  2⤵
                                                                                                                                                                                    PID:1768
                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\NotPetya.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\NotPetya.exe"
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:7376
                                                                                                                                                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                        "C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #1
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:6200
                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\PowerPoint.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\PowerPoint.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:22988
                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Bumerang.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\Bumerang.exe"
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:22924
                                                                                                                                                                                          • C:\Windows\System32\WScript.exe
                                                                                                                                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\HeadTail.vbs"
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:13960
                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Heap41A.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\Heap41A.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:8440
                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mantas.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\Mantas.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:18620
                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Nople.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\Nople.exe"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:10328
                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5768 -ip 5768
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:5464
                                                                                                                                                                                                  • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                                                                    C:\Windows\system32\AUDIODG.EXE 0x3e0 0x4ac
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:5604
                                                                                                                                                                                                    • C:\Windows\System32\vssadmin.exe
                                                                                                                                                                                                      "C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                                                                      PID:6320
                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 6224 -ip 6224
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:232
                                                                                                                                                                                                      • C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                        C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:6952
                                                                                                                                                                                                        • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                                          C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:7752
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                            • Modifies registry key
                                                                                                                                                                                                            PID:7864
                                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                            schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 1546225113 && exit"
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                            PID:8628
                                                                                                                                                                                                          • C:\Windows\System32\mshta.exe
                                                                                                                                                                                                            "C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:15476
                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                              PID:10280
                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                              PID:13188

                                                                                                                                                                                                            Network

                                                                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                            Replay Monitor

                                                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                                                            Downloads

                                                                                                                                                                                                            • C:\$Recycle.Bin\S-1-5-21-493223053-2004649691-1575712786-1000\QOENU-MANUAL.txt

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              8KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              83efdb7b0f15caffac9bd455f8d77c33

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              b6bef7b9894af6157f3fe609baefd24206a0913b

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              cdfaed3e9b9ec9ad2e8d09ea7d88c042fdbd086dc004afc3aaa2d1ba1ab0ff8d

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              83235ada47d14f577497c1273937c98c2037e9a45aab9dceeb9a438498daf461c188ca6101c129cd2a5bf9378c5271a7ca635e657fe579c332fbc253fbac4cc4

                                                                                                                                                                                                            • C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.E783F001648351399D4C370CC6FB3D56D7D8829C83F8A8178CB5711ADB4B2BD7

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              32KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              2086cdc5dccc83057a8f0903211e09c8

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              26ebae34961492cff882faf2038de6de22aa4a41

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              24b6a0b3a121edf896c07b2ae0eee07db7541948244188e3fe24b2892c287b7f

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              6b4623b021e9b2b012fc0e8a6204ba472380366e9771714b7ff7555bbb30c522a0fe994e8e5f09fdc98d8123b75cd7fab219f116967a7b8530a83be2775e3384

                                                                                                                                                                                                            • C:\Users\Admin\38382560\assembler.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              589KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              7e3cea1f686207563c8369f64ea28e5b

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              a1736fd61555841396b0406d5c9ca55c4b6cdf41

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              2a5305369edb9c2d7354b2f210e91129e4b8c546b0adf883951ea7bf7ee0f2b2

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              4629bc32094bdb030e6c9be247068e7295599203284cb95921c98fcbe3ac60286670be7e5ee9f0374a4017286c7af9db211bd831e3ea871d31a509d7bbc1d6a3

                                                                                                                                                                                                            • C:\Users\Admin\38382560\protect.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              837KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              fd414666a5b2122c3d9e3e380cf225ed

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              de139747b42a807efa8a2dcc1a8304f9a29b862d

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              e61a8382f7293e40cb993ddcbcaa53a4e5f07a3d6b6a1bfe5377a1a74a8dcac6

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              9ab2163d7deff29c202ed88dba36d5b28f6c67e647a0cadb3d03cc725796e19e5f298c04b1c8523d1d1ee4307e1a5d6f8156fa4021627d6ca1bbd0830695ae05

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              152B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              d7cb450b1315c63b1d5d89d98ba22da5

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              694005cd9e1a4c54e0b83d0598a8a0c089df1556

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              152B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              37f660dd4b6ddf23bc37f5c823d1c33a

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              1c35538aa307a3e09d15519df6ace99674ae428b

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\temp-index

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              288B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              6a419491438715ad4928631a273bf0d1

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              529be01026cda9fa6d95d7723665e4c30f366f1c

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              9a4398f7af2f48f4aa8f89bbeb67e2e19cfc9efdeec42f412cb8980dd23640c7

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              45185c6a03906cb16d1277448a7a54b0405b42166dae22c70ead608a2504aba9ee1bae2d030b173d59f8f142d218cf78ebd1e76cef33a380e9cd824270a0fc52

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              6KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              22741e4a424ce4022a7e510e4e55d259

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              e22e2636a5c4966ba4d325e3188a60a1574a6da4

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              7299cc6f0924a046cd3701882f28881d72d9200702ab0bc21667c9bd5f72f9b3

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              c8c900356a8ccd8fa190842e4e9ea6281df43a87e28f9194ea83bafbfea521b56e073c77e32cfe099bd9611ee2463b1f125c71c323c38ce9ead17f8dddaea9c9

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              5KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              62b4907caf2304d41245c70f8b1b4982

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              d27230b3b24f99e7bfe9a1d63947d10ba2309d3f

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              fdf0d77b02452604eb6af5f39bffa809265ad8e22aebb27aa690bf1f8bed5bb9

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              15da2ae0aba23d0e4dad7b6e9b926900a94c4492db6b20e22ffbc8af2b723f214950b3bd361fceadcfa1f5de5cc80864d365dbb3153a63842c84445a0243f33f

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              6KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              3b8b4137a16800c3a4170c80173069d7

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              68323db21afbfae4acd8f866010bd5409914bb14

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              7440436a1e60b5fe0208818b3abd1f23fe7ce35e970a42953ca729bac603531e

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              a80abf048665f56a9c6937041bdb1835975d5aa33485311af40ccc45bc6f09e9ed0fa5f2f2ca3eecbeec241c819a1e3114b5f06eb4d3b3883f6a360cb39c05bd

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              6KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              f2d884d3f1c4eb45961784dff4dae249

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              6d0b7aa2e9602beba1c23f612e23743717cdabde

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              59e798869bc9b9c86bcbde0bd737453043f750dbb247770a7cc5cda92cc49073

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              ba8cedf8c99ca06c8f46435238211e49f251cca6f3939d24316c1396a34d5a628b38235260859c004bd390472e3082ac570c9bda8947d6021b1ebc50b70adaa2

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              16B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              46295cac801e5d4857d09837238a6394

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              16B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              206702161f94c5cd39fadd03f4014d98

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              10KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              b8e73f01d7b93b5790a2c17ac3ebe91b

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              7427fb1d039ee4aacc5c61d5027d29f4fa1df0c5

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              ecd4fc488b3c718bf372f0e175a82dab942d8729bf0674affc70b319881a21fd

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              cf3ca535294b679925977722f3af138e01331d9fb68a43754bc95ecae3cc6aefbf6cb215352b86139413cf98563f980a3f15d3ba1a8d61a89071a5b360c2b1f3

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              10KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              b54e7faf876efa17d44ae5607518ac6e

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              ee2b5557ea6a2fa2a1383da2ed92753e01c10565

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              2ebbfac786b5840d7d77dbb6f37fae209b06054d124fc7fce55b738be679e6ee

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              84cf12464d3a22293028ec53c2c7bfd62b72bcfb41f0209da095c4449ac6ef305e1cb8ba68cbcb166b558bb318a355dbfa3ec34ff5aa127c1cbb718434a46518

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              9KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              7050d5ae8acfbe560fa11073fef8185d

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              5bc38e77ff06785fe0aec5a345c4ccd15752560e

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\eeIgcUwQ.bat

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              112B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              bae1095f340720d965898063fede1273

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\7ev3n.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              315KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              9f8bc96c96d43ecb69f883388d228754

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              61ed25a706afa2f6684bb4d64f69c5fb29d20953

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              7d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Annabelle.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              10.3MB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              db4074bbd05ce2b81fbae2ac9dc077e2

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              763647061d541c3ca85fca4d91e6e9170265ea05

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              4d1e5581c32b1942756b815d15aadcc8d9cb84e25a66b9cffcda3a8220d5a862

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              6f13bcda75c0b6ee9ce645b1cef24fd9c2d61476256ab4c01c7663b7853fc8cbfc85c00b559f21ed7deee77075ae269a10ec580d73986e91fd00bcd9701573c1

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Avoid.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              248KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              20d2c71d6d9daf4499ffc4a5d164f1c3

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              38e5dcd93f25386d05a34a5b26d3fba1bf02f7c8

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              3ac8cc58dcbceaec3dab046aea050357e0e2248d30b0804c738c9a5b037c220d

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              8ffd56fb3538eb60da2dde9e3d6eee0dac8419c61532e9127f47c4351b6e53e01143af92b2e26b521e23cdbbf15d7a358d3757431e572e37a1eede57c7d39704

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Cerber5.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              313KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              fe1bc60a95b2c2d77cd5d232296a7fa4

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              c07dfdea8da2da5bad036e7c2f5d37582e1cf684

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ChilledWindows.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4.4MB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              6a4853cd0584dc90067e15afb43c4962

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              ae59bbb123e98dc8379d08887f83d7e52b1b47fc

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              ccb9502bf8ba5becf8b758ca04a5625c30b79e2d10d2677cc43ae4253e1288ec

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              feb223e0de9bd64e32dc4f3227e175b58196b5e614bca8c2df0bbca2442a564e39d66bcd465154149dc7ebbd3e1ca644ed09d9a9174b52236c76e7388cb9d996

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              68KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              bc1e7d033a999c4fd006109c24599f4d

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              b927f0fc4a4232a023312198b33272e1a6d79cec

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              13adae722719839af8102f98730f3af1c5a56b58069bfce8995acd2123628401

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              f5d9b8c1fd9239894ec9c075542bff0bcef79871f31038e627ae257b8c1db9070f4d124448a78e60ccc8bc12f138102a54825e9d7647cd34832984c7c24a6276

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\CrazyNCS.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              122KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              d043ba91e42e0d9a68c9866f002e8a21

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              e9f177e1c57db0a15d1dc6b3e6c866d38d85b17c

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              6820c71df417e434c5ad26438c901c780fc5a80b28a466821b47d20b8424ef08

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              3e9783646e652e9482b3e7648fb0a5f7c8b6c386bbc373d5670d750f6f99f6137b5501e21332411609cbcc0c20f829ab8705c2835e2756455f6754c9975ac6bd

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\CryptoWall.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              132KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              919034c8efb9678f96b47a20fa6199f2

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              747070c74d0400cffeb28fbea17b64297f14cfbd

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              e036d68b8f8b7afc6c8b6252876e1e290f11a26d4ad18ac6f310662845b2c734

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              745a81c50bbfd62234edb9788c83a22e0588c5d25c00881901923a02d7096c71ef5f0cd5b73f92ad974e5174de064b0c5ea8044509039aab14b2aed83735a7c4

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Curfun.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              138KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              0b3b2dff5503cb032acd11d232a3af55

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              6efc31c1d67f70cf77c319199ac39f70d5a7fa95

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              ef878461a149024f3065121ff4e165731ecabef1b94b0b3ed2eda010ad39202b

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              484014d65875e706f7e5e5f54c2045d620e5cce5979bf7f37b45c613e6d948719c0b8e466df5d8908706133ce4c4b71a11b804417831c9dbaf72b6854231ea17

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\DesktopBoom.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              1.1MB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              f0a661d33aac3a3ce0c38c89bec52f89

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              709d6465793675208f22f779f9e070ed31d81e61

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              c20e78ce9028299d566684d35b1230d055e5ea0e9b94d0aff58f650e0468778a

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              57cdb3c38f2e90d03e6dc1f9d8d1131d40d3919f390bb1783343c82465461319e70483dc3cd3efdbd9a62dfc88d74fc706f05d760ffd8506b16fd7686e414443

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Fagot.a.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              373KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              30cdab5cf1d607ee7b34f44ab38e9190

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              d4823f90d14eba0801653e8c970f47d54f655d36

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              1517527c1d705a6ebc6ec9194aa95459e875ac3902a9f4aab3bf24b6a6f8407f

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              b465f3b734beaea3951ff57759f13971649b549fafca71342b52d7e74949e152c0fbafe2df40354fc00b5dc8c767f3f5c6940e4ba308888e4395d8fd21e402b3

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Flasher.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              246KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              9254ca1da9ff8ad492ca5fa06ca181c6

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              70fa62e6232eae52467d29cf1c1dacb8a7aeab90

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              30676ad5dc94c3fec3d77d87439b2bf0a1aaa7f01900b68002a06f11caee9ce6

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              a84fbbdea4e743f3e41878b9cf6db219778f1479aa478100718af9fc8d7620fc7a3295507e11df39c7863cb896f946514e50368db480796b6603c8de5580685a

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Hydra.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              43KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              b2eca909a91e1946457a0b36eaf90930

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              3200c4e4d0d4ece2b2aadb6939be59b91954bcfa

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              0b6c0af51cde971b3e5f8aa204f8205418ab8c180b79a5ac1c11a6e0676f0f7c

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              607d20e4a46932c7f4d9609ef9451e2303cd79e7c4778fe03f444e7dc800d6de7537fd2648c7c476b9f098588dc447e8c39d8b21cd528d002dfa513a19c6ebbf

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              211KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              b805db8f6a84475ef76b795b0d1ed6ae

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              7711cb4873e58b7adcf2a2b047b090e78d10c75b

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              f5d002bfe80b48386a6c99c41528931b7f5df736cd34094463c3f85dde0180bf

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              62a2c329b43d186c4c602c5f63efc8d2657aa956f21184334263e4f6d0204d7c31f86bda6e85e65e3b99b891c1630d805b70997731c174f6081ecc367ccf9416

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Launcher.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              197KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              7506eb94c661522aff09a5c96d6f182b

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              329bbdb1f877942d55b53b1d48db56a458eb2310

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              d5b962dfe37671b5134f0b741a662610b568c2b5374010ee92b5b7857d87872c

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              d815a9391ef3d508b89fc221506b95f4c92d586ec38f26aec0f239750f34cf398eed3d818fa439f6aa6ed3b30f555a1903d93eeeec133b80849a4aa6685ec070

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Melting.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              12KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              833619a4c9e8c808f092bf477af62618

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              b4a0efa26f790e991cb17542c8e6aeb5030d1ebf

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              92a284981c7ca33f1af45ce61738479fbcbb5a4111f5498e2cb54931c8a36c76

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              4f231fc16339d568b5cf9353133aeae835eb262dab68bc80d92f37b43df64dce4fae0e913cbaa3bb61351a759aeecf9d280bc5779b0853c980559a654d6cca11

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              131KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              bd65d387482def1fe00b50406f731763

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              d06a2ba2e29228f443f97d1dd3a8da5dd7df5903

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              1ab7375550516d7445c47fd9b551ed864f227401a14ff3f1ff0d70caca3bd997

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              351ecd109c4d49bc822e8ade73a9516c4a531ebcda63546c155e677dcff19708068dc588b2fcf30cad086238e8b206fc5f349d37dda02d3c3a8d9b570d92e4d9

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Nople.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              50KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              7d595027f9fdd0451b069c0c65f2a6e4

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              a4556275c6c45e19d5b784612c68b3ad90892537

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              d2518df72d5cce230d98a435977d9283b606a5a4cafe8cd596641f96d8555254

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              b8f37ecc78affa30a0c7c00409f2db1e2fd031f16c530a8c1d4b4bffaa5d55ac235b11540c8a611ae1a90b748b04498e3954cfb1529236937ef693c6b20e893b

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\NotPetya.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              390KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              5b7e6e352bacc93f7b80bc968b6ea493

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              e686139d5ed8528117ba6ca68fe415e4fb02f2be

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              63545fa195488ff51955f09833332b9660d18f8afb16bdf579134661962e548a

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              9d24af0cb00fb8a5e61e9d19cd603b5541a22ae6229c2acf498447e0e7d4145fee25c8ab9d5d5f18f554e6cbf8ca56b7ca3144e726d7dfd64076a42a25b3dfb6

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Petya.A.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              225KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              af2379cc4d607a45ac44d62135fb7015

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              39b6d40906c7f7f080e6befa93324dddadcbd9fa

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              26b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              69899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Popup.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              373KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              9c3e9e30d51489a891513e8a14d931e4

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              4e5a5898389eef8f464dee04a74f3b5c217b7176

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              f8f7b5f20ca57c61df6dc8ff49f2f5f90276a378ec17397249fdc099a6e1dcd8

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              bf45677b7dd6c67ad350ec6ecad5bc3f04dea179fae0ff0a695c69f7de919476dd7a69c25b04c8530a35119e4933f4a8c327ed6dcef892b1114dfd7e494a19a7

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\RedBoot.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              1.2MB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              e0340f456f76993fc047bc715dfdae6a

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              d47f6f7e553c4bc44a2fe88c2054de901390b2d7

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              cac10c675d81630eefca49b2ac4cc83f3eb29115ee28a560db4d6c33f70bf24980e48bb48ce20375349736e3e6b23a1ca504b9367917328853fffc5539626bbc

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\RedEye.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              10.6MB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              e9e5596b42f209cc058b55edc2737a80

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              f30232697b3f54e58af08421da697262c99ec48b

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              9ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Rensenware.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              96KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              60335edf459643a87168da8ed74c2b60

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              61f3e01174a6557f9c0bfc89ae682d37a7e91e2e

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              7bf5623f0a10dfa148a35bebd899b7758612f1693d2a9910f716cf15a921a76a

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              b4e5e4d4f0b4a52243d6756c66b4fe6f4b39e64df7790072046e8a3dadad3a1be30b8689a1bab8257cc35cb4df652888ddf62b4e1fccb33e1bbf1f5416d73efb

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Rokku.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              666KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              97512f4617019c907cd0f88193039e7c

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              24cfa261ee30f697e7d1e2215eee1c21eebf4579

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              438888ef36bad1079af79daf152db443b4472c5715a7b3da0ba24cc757c53499

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              cfbb8dd91434f917d507cb919aa7e6b16b7b2056d56185f6ad5b6149e05629325cdb3df907f58bb3f634b17a9989bf5b6d6b81f5396a3a556431742ed742ac4a

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Satana.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              49KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              46bfd4f1d581d7c0121d2b19a005d3df

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              5b063298bbd1670b4d39e1baef67f854b8dcba9d

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ScreenScrew.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              111KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              e87a04c270f98bb6b5677cc789d1ad1d

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              8c14cb338e23d4a82f6310d13b36729e543ff0ca

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              e03520794f00fb39ef3cfff012f72a5d03c60f89de28dbe69016f6ed151b5338

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              8784f4d42908e54ecedfb06b254992c63920f43a27903ccedd336daaeed346db44e1f40e7db971735da707b5b32206be1b1571bc0d6a2d6eb90bbf9d1f69de13

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Seftad.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              48KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              86a3a3ce16360e01933d71d0bf1f2c37

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              af54089e3601c742d523b507b3a0793c2b6e60be

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              2ebe23ba9897d9c127b9c0a737ba63af8d0bcd76ec866610cc0b5de2f62b87bd

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              65a3571cf5b057d2c3ce101346947679f162018fa5eadf79c5a6af6c0a3bc9b12731ff13f27629b14983ef8bc73fa9782cc0a9e6c44b0ffc2627da754c324d6e

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\SporaRansomware.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              24KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              4a4a6d26e6c8a7df0779b00a42240e7b

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              8072bada086040e07fa46ce8c12bf7c453c0e286

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              7ad9ed23a91643b517e82ad5740d24eca16bcae21cfe1c0da78ee80e0d1d3f02

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              c7a7b15d8dbf8e8f8346a4dab083bb03565050281683820319906da4d23b97b39e88f841b30fc8bd690c179a8a54870238506ca60c0f533d34ac11850cdc1a95

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Time.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              111KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              9d0d2fcb45b1ff9555711b47e0cd65e5

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              958f29a99cbb135c92c5d1cdffb9462be35ee9fd

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              dc476ae39effdd80399b6e36f1fde92c216a5bbdb6b8b2a7ecbe753e91e4c993

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              8fd4ce4674cd52a3c925149945a7a50a139302be17f6ee3f30271ebe1aa6d92bcb15a017dca989cd837a5d23cd56eaacc6344dc7730234a4629186976c857ca9

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Trololo.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              3.0MB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              b6d61b516d41e209b207b41d91e3b90d

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              e50d4b7bf005075cb63d6bd9ad48c92a00ee9444

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              3d0efd55bde5fb7a73817940bac2a901d934b496738b7c5cab7ea0f6228e28fe

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              3217fc904e4c71b399dd273786634a6a6c19064a9bf96960df9b3357001c12b9547813412173149f6185eb5d300492d290342ec955a8347c6f9dcac338c136da

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\UIWIX.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              211KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              a933a1a402775cfa94b6bee0963f4b46

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              18aa7b02f933c753989ba3d16698a5ee3a4d9420

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              146581f0b3fbe00026ee3ebe68797b0e57f39d1d8aecc99fdc3290e9cfadc4fc

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              d83da3c97ffd78c42f49b7bfb50525e7c964004b4b7d9cba839c0d8bf3a5fe0424be3b3782e33c57debc6b13b5420a3fa096643c8b7376b3accfb1bc4e7d7368

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\US8A5-B2XOT-RTXTX-HTKTR.LST

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              3KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              ef764dd7e869db529a473b603e1e5df6

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              d0699e22c41e79115984bea92d8f8d7f5356ebf6

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              3a9391557679ce4643ac37423bf9ff8c112a36b3ef4378a017a37cb107d71d49

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              6d8b5846e81fcb3b32c10257301eb498ed90fa03c873cbe6b882bb122bd13be82f53ef37bce82a242eb37faada76866e03c6dadcb4f0a3057d80d0fc137ceab2

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ViraLock.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              194KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              8803d517ac24b157431d8a462302b400

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              b56afcad22e8cda4d0e2a98808b8e8c5a1059d4e

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              418395efd269bc6534e02c92cb2c568631ada6e54bc55ade4e4a5986605ff786

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              38fdfe0bc873e546b05a8680335526eec61ccc8cf3f37c60eee0bc83ec54570077f1dc1da26142488930eabcc21cb7a33c1b545a194cbfb4c87e430c4b2bfb50

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Vista.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              1.9MB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              faa6cb3e816adaeaabf2930457c79c33

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              6539de41b48d271bf4237e6eb09b0ee40f9a2140

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              6680317e6eaa04315b47aaadd986262cd485c8a4bd843902f4c779c858a3e31b

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              58859556771203d736ee991b651a6a409de7e3059c2afe81d4545864295c383f75cfbabf3cffaa0c412a6ec27bf939f0893c28152f53512c7885e597db8d2c66

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\WannaCry.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              224KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              5c7fb0927db37372da25f270708103a2

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              120ed9279d85cbfa56e5b7779ffa7162074f7a29

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              3.4MB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              84c82835a5d21bbcf75a61706d8ab549

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              5ff465afaabcbf0150d1a3ab2c2e74f3a4426467

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              728KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              6e49c75f701aa059fa6ed5859650b910

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              ccb7898c509c3a1de96d2010d638f6a719f6f400

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              f91f02fd27ada64f36f6df59a611fef106ff7734833dea825d0612e73bdfb621

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              ccd1b581a29de52d2313a97eb3c3b32b223dba1e7a49c83f7774b374bc2d16b13fba9566de6762883f3b64ed8e80327b454e5d32392af2a032c22653fed0fff8

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              760KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              515198a8dfa7825f746d5921a4bc4db9

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              e1da0b7f046886c1c4ff6993f7f98ee9a1bc90ae

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              0fda176b199295f72fafc3bc25cefa27fa44ed7712c3a24ca2409217e430436d

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              9e47037fe40b79ebf056a9c6279e318d85da9cd7e633230129d77a1b8637ecbafc60be38dd21ca9077ebfcb9260d87ff7fcc85b8699b3135148fe956972de3e8

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              1010KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              27bc9540828c59e1ca1997cf04f6c467

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              bfa6d1ce9d4df8beba2bedf59f86a698de0215f3

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              05c18698c3dc3b2709afd3355ad5b91a60b2121a52e5fcc474e4e47fb8e95e2a

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              a3ae822116cddb52d859de7ffc958541bb47c355a835c5129aade9cc0e5fba3ff25387061deb5b55b5694a535f09fe8669485282eb6e7c818cc7092eb3392848

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              2.4MB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              dbfbf254cfb84d991ac3860105d66fc6

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              893110d8c8451565caa591ddfccf92869f96c242

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              68b0e1932f3b4439865be848c2d592d5174dbdbaab8f66104a0e5b28c928ee0c

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              5e9ccdf52ebdb548c3fa22f22dd584e9a603ca1163a622db5707dbcc5d01e4835879dcfd28cb1589cbb25aed00f352f7a0a0962b1f38b68fc7d6693375e7666d

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              424KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              e263c5b306480143855655233f76dc5a

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              e7dcd6c23c72209ee5aa0890372de1ce52045815

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              1f69810b8fe71e30a8738278adf09dd982f7de0ab9891d296ce7ea61b3fa4f69

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              e95981eae02d0a8bf44493c64cca8b7e50023332e91d75164735a1d0e38138f358100c93633ff3a0652e1c12a5155cba77d81e01027422d7d5f71000eafb4113

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\rickroll.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              129KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              0ec108e32c12ca7648254cf9718ad8d5

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              78e07f54eeb6af5191c744ebb8da83dad895eca1

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              48b08ea78124ca010784d9f0faae751fc4a0c72c0e7149ded81fc03819f5d723

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              1129e685f5dd0cb2fa22ef4fe5da3f1e2632e890333ce17d3d06d04a4097b4d9f4ca7d242611ffc9e26079900945cf04ab6565a1c322e88e161f1929d18a2072

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\satan.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              184KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              c9c341eaf04c89933ed28cbc2739d325

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              c5b7d47aef3bd33a24293138fcba3a5ff286c2a8

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              1a0a2fd546e3c05e15b2db3b531cb8e8755641f5f1c17910ce2fb7bbce2a05b7

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              7cfa6ec0be0f5ae80404c6c709a6fd00ca10a18b6def5ca746611d0d32a9552f7961ab0ebf8a336b27f7058d700205be7fcc859a30d7d185aa9457267090f99b

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\u.wry

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              236KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              cf1416074cd7791ab80a18f9e7e219d9

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              276d2ec82c518d887a8a3608e51c56fa28716ded

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              78e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              0bb0843a90edacaf1407e6a7273a9fbb896701635e4d9467392b7350ad25a1bec0c1ceef36737b4af5e5841936f4891436eded0533aa3d74c9a54efa42f024c5

                                                                                                                                                                                                            • C:\Users\Admin\Downloads\FUCKPCS\FMkk.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              311KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              2fb56b4fbfab06f66c5cac055131cf79

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              cdcd9fd87f2e3d0b8f919c2587f939342249602a

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              93f3d4e6527ca963343b02a3c2cbdddb856b75ad7d22cfa150ef970f4559f75b

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              d06209a3d3ba000c1187ac394caff1ce6ace17009118be428bade140d488ae39a34f1a5c934d868b2baf2c835c42bea2bceba9932d36968e6944edf4caf07ee3

                                                                                                                                                                                                            • C:\Users\Admin\Downloads\FUCKPCS\XMIY.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              245KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              2ea1f8a6ffbb61a0f79df1416bebe10f

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              bab4d4094dc92f0c79489ad070bf4acd2d1f4bda

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              3711c3d52a2df4f23f29b187c9d0efa5ef288970abaffa1647c8809b94b80e71

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              7fde71cc80e9fd284f8f927ddae4ae1a4177412c6323e9d91bd5d98dcb992da0711752b1c3fcf6ec0ac589eb28d65ea79d2c3f7cba19467b0bb7eff6b439121c

                                                                                                                                                                                                            • C:\Users\Admin\Downloads\FUCKPCS\ac\mssql.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              5.6MB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              dd2cee2c93de3bb4214edf8b4870ba7e

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              a2c2f49c51d23d6ee136e8bdb6b6caa179778a13

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              2ed73f3af0466c00ee0cb2cd923b6ff2910745bbf6ceeb50007e290f744e7eb9

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              d3e63e8e91f4f331069acb76fe9b915e3dc3c8bd8208bb2734c9fd47be52af521d4ce3154b22982cfd6574a6a3222311a6a430c2c320e4a9460d6f2401121e00

                                                                                                                                                                                                            • C:\Users\Admin\Downloads\FUCKPCS\ac\nc123.exe

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              125KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              597de376b1f80c06d501415dd973dcec

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              629c9649ced38fd815124221b80c9d9c59a85e74

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              f47e3555461472f23ab4766e4d5b6f6fd260e335a6abc31b860e569a720a5446

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              072565912208e97cc691e1a102e32fd6c243b5a3f8047a159e97aabbe302bddc36f3c52cecde3b506151bc89e0f3b5acf6552a82d83dac6e0180c873d36d3f6b

                                                                                                                                                                                                            • memory/436-519-0x0000000002A20000-0x0000000002A37000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/436-547-0x0000000002A20000-0x0000000002A37000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/628-469-0x0000000000400000-0x000000000058D000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              1.6MB

                                                                                                                                                                                                            • memory/868-546-0x0000027675080000-0x0000027675097000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/868-520-0x0000027675080000-0x0000027675097000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/1212-543-0x00000269F6300000-0x00000269F6317000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/1212-526-0x00000269F6300000-0x00000269F6317000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/1380-215-0x000000001C680000-0x000000001C688000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              32KB

                                                                                                                                                                                                            • memory/1380-518-0x000000001CBE0000-0x000000001CBF7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/1380-207-0x000000001C1B0000-0x000000001C67E000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4.8MB

                                                                                                                                                                                                            • memory/1380-204-0x000000001BC00000-0x000000001BCA6000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              664KB

                                                                                                                                                                                                            • memory/1380-221-0x000000001C940000-0x000000001C98C000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              304KB

                                                                                                                                                                                                            • memory/1380-208-0x000000001C7E0000-0x000000001C87C000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              624KB

                                                                                                                                                                                                            • memory/1380-548-0x000000001CBE0000-0x000000001CBF7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/1624-525-0x0000000001630000-0x0000000001647000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/1624-541-0x0000000001630000-0x0000000001647000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/1624-29821-0x0000000000400000-0x0000000000B02000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              7.0MB

                                                                                                                                                                                                            • memory/1624-2821-0x0000000000400000-0x0000000000B02000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              7.0MB

                                                                                                                                                                                                            • memory/1684-297-0x0000000005700000-0x0000000005792000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              584KB

                                                                                                                                                                                                            • memory/1684-258-0x0000000000E40000-0x0000000000E50000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              64KB

                                                                                                                                                                                                            • memory/1684-324-0x00000000058C0000-0x00000000058CA000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              40KB

                                                                                                                                                                                                            • memory/1684-287-0x0000000005BD0000-0x0000000006174000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              5.6MB

                                                                                                                                                                                                            • memory/1768-1487-0x0000000000FF0000-0x000000000102C000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              240KB

                                                                                                                                                                                                            • memory/1788-516-0x0000000022360000-0x0000000022377000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/1788-550-0x0000000022360000-0x0000000022377000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/1788-145-0x0000000000C50000-0x0000000001C50000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              16.0MB

                                                                                                                                                                                                            • memory/2244-521-0x0000000000630000-0x0000000000647000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/2244-545-0x0000000000630000-0x0000000000647000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/2340-2781-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              200KB

                                                                                                                                                                                                            • memory/2340-2405-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              200KB

                                                                                                                                                                                                            • memory/2364-554-0x0000020653590000-0x00000206535A7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/2364-512-0x0000020653590000-0x00000206535A7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/2924-502-0x00000251B2020000-0x00000251B2037000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/2960-503-0x000002C7663C0000-0x000002C7663D7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3044-504-0x000002CAF11C0000-0x000002CAF11D7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3276-552-0x000001F4EBFA0000-0x000001F4EBFB7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3276-513-0x000001F4EBFA0000-0x000001F4EBFB7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3292-514-0x000001E19E2F0000-0x000001E19E307000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3488-558-0x0000000008ED0000-0x0000000008EE7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3488-561-0x0000000008ED0000-0x0000000008EE7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3488-560-0x0000000008ED0000-0x0000000008EE7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3488-559-0x0000000008ED0000-0x0000000008EE7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3488-505-0x0000000008ED0000-0x0000000008EE7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3488-562-0x0000000008ED0000-0x0000000008EE7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3568-1089-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              200KB

                                                                                                                                                                                                            • memory/3624-563-0x000001D887450000-0x000001D887467000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3624-506-0x000001D887450000-0x000001D887467000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3812-507-0x0000025A782E0000-0x0000025A782F7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3812-557-0x0000025A782E0000-0x0000025A782F7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3904-556-0x0000022354580000-0x0000022354597000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3904-508-0x0000022354580000-0x0000022354597000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3968-509-0x0000016669BD0000-0x0000016669BE7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3968-555-0x0000016669BD0000-0x0000016669BE7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/3976-527-0x000001EDC6320000-0x000001EDC6337000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/4044-510-0x000001D476D20000-0x000001D476D37000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/4156-511-0x0000029AA0CC0000-0x0000029AA0CD7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/4156-553-0x0000029AA0CC0000-0x0000029AA0CD7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/4240-193-0x0000000000B50000-0x0000000000FB4000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4.4MB

                                                                                                                                                                                                            • memory/4240-517-0x00000000015C0000-0x00000000015D7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/4240-323-0x000000001BD40000-0x000000001BD48000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              32KB

                                                                                                                                                                                                            • memory/4240-357-0x000000001F110000-0x000000001F148000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              224KB

                                                                                                                                                                                                            • memory/4240-358-0x000000001F0B0000-0x000000001F0BE000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              56KB

                                                                                                                                                                                                            • memory/4240-549-0x00000000015C0000-0x00000000015D7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/4648-498-0x0000000000400000-0x00000000004A6000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              664KB

                                                                                                                                                                                                            • memory/4972-515-0x00000181EB770000-0x00000181EB787000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/4972-551-0x00000181EB770000-0x00000181EB787000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5012-490-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              72KB

                                                                                                                                                                                                            • memory/5012-486-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              72KB

                                                                                                                                                                                                            • memory/5012-479-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              72KB

                                                                                                                                                                                                            • memory/5148-528-0x00000215CBC50000-0x00000215CBC67000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5372-1345-0x00000000049A0000-0x00000000049D2000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              200KB

                                                                                                                                                                                                            • memory/5372-1344-0x00000000024C0000-0x00000000024F2000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              200KB

                                                                                                                                                                                                            • memory/5412-544-0x000000001DAC0000-0x000000001DAD7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5412-522-0x000000001DAC0000-0x000000001DAD7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5420-538-0x0000018E43AA0000-0x0000018E43AB7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5420-531-0x0000018E43AA0000-0x0000018E43AB7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5436-529-0x0000018B74090000-0x0000018B740A7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5436-540-0x0000018B74090000-0x0000018B740A7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5444-530-0x00000251FDD40000-0x00000251FDD57000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5444-539-0x00000251FDD40000-0x00000251FDD57000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5452-501-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5452-500-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5576-361-0x0000000000830000-0x00000000008EC000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              752KB

                                                                                                                                                                                                            • memory/5652-499-0x0000000000400000-0x0000000000407200-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              28KB

                                                                                                                                                                                                            • memory/5672-373-0x0000000000400000-0x00000000006BC000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              2.7MB

                                                                                                                                                                                                            • memory/5672-648-0x0000000000400000-0x00000000006BC000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              2.7MB

                                                                                                                                                                                                            • memory/5732-532-0x0000020A456A0000-0x0000020A456B7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5768-395-0x0000000004D90000-0x0000000004E2C000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              624KB

                                                                                                                                                                                                            • memory/5768-394-0x00000000004A0000-0x0000000000512000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              456KB

                                                                                                                                                                                                            • memory/5768-412-0x00000000050F0000-0x0000000005146000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              344KB

                                                                                                                                                                                                            • memory/5776-523-0x0000019349E40000-0x0000019349E57000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5828-766-0x0000000000FA0000-0x000000000100E000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              440KB

                                                                                                                                                                                                            • memory/5892-398-0x00000000005F0000-0x000000000087E000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              2.6MB

                                                                                                                                                                                                            • memory/5892-697-0x00000000005F0000-0x000000000087E000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              2.6MB

                                                                                                                                                                                                            • memory/5980-542-0x000001DFFDAC0000-0x000001DFFDAD7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5980-445-0x000001DFFB3A0000-0x000001DFFBE3C000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              10.6MB

                                                                                                                                                                                                            • memory/5980-524-0x000001DFFDAC0000-0x000001DFFDAD7000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              92KB

                                                                                                                                                                                                            • memory/5980-1222-0x000001DFFE250000-0x000001DFFF266000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              16.1MB

                                                                                                                                                                                                            • memory/6204-600-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              200KB

                                                                                                                                                                                                            • memory/6204-732-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              200KB

                                                                                                                                                                                                            • memory/6524-647-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              188KB

                                                                                                                                                                                                            • memory/6628-649-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              200KB

                                                                                                                                                                                                            • memory/7020-1017-0x000001926C920000-0x000001926D914000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              16.0MB

                                                                                                                                                                                                            • memory/11608-31055-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              64KB

                                                                                                                                                                                                            • memory/22988-30951-0x000000002AA00000-0x000000002AA24000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              144KB

                                                                                                                                                                                                            • memory/52112-21640-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              200KB