Analysis

  • max time kernel
    7s
  • max time network
    41s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 00:24

Errors

Reason
Machine shutdown

General

  • Target

    ComputerRaper.exe

  • Size

    85.4MB

  • MD5

    bdb24ed9f869fcd462b316148514fc5b

  • SHA1

    83935122b626378a3149e9036cd751514add4b52

  • SHA256

    83875ea85b183c609c5ddcd92afe62265745192a417b80524f12741fc028aca0

  • SHA512

    12fdb77a75debeacbc4b98cac45d09a7bcc378bd9bd51bbc035838b99c1d595660d5c0961a2d041b2e8359f3b5b096f589d39453ada9874436411b94b8b0d611

  • SSDEEP

    1572864:NUkskQ1oOZrCqix58TkbajhXBFEQT9VotzcJ97:N/NQbCbmXXEUvoM97

Malware Config

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Badrabbit family
  • Chimera

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Chimera family
  • CryptoLocker

    Ransomware family with multiple variants.

  • Cryptolocker family
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 19 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 6 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ComputerRaper.exe
    "C:\Users\Admin\AppData\Local\Temp\ComputerRaper.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Roaming\AgentTesla.exe
      "C:\Users\Admin\AppData\Roaming\AgentTesla.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1008
    • C:\Users\Admin\AppData\Roaming\HawkEye.exe
      "C:\Users\Admin\AppData\Roaming\HawkEye.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2948
    • C:\Users\Admin\AppData\Roaming\butterflyondesktop.exe
      "C:\Users\Admin\AppData\Roaming\butterflyondesktop.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4992
      • C:\Users\Admin\AppData\Local\Temp\is-9DHTO.tmp\butterflyondesktop.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-9DHTO.tmp\butterflyondesktop.tmp" /SL5="$70044,2719719,54272,C:\Users\Admin\AppData\Roaming\butterflyondesktop.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4304
    • C:\Users\Admin\AppData\Roaming\$uckyLocker.exe
      "C:\Users\Admin\AppData\Roaming\$uckyLocker.exe"
      2⤵
      • Executes dropped EXE
      • Sets desktop wallpaper using registry
      • System Location Discovery: System Language Discovery
      PID:5028
    • C:\Users\Admin\AppData\Roaming\7ev3n.exe
      "C:\Users\Admin\AppData\Roaming\7ev3n.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3076
      • C:\Users\Admin\AppData\Local\system.exe
        "C:\Users\Admin\AppData\Local\system.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3772
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
          4⤵
            PID:4932
          • C:\Windows\SysWOW64\SCHTASKS.exe
            C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:4276
          • C:\windows\SysWOW64\cmd.exe
            C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
            4⤵
              PID:3800
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                5⤵
                  PID:2940
              • C:\windows\SysWOW64\cmd.exe
                C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                4⤵
                  PID:4816
                  • C:\Windows\SysWOW64\reg.exe
                    REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                    5⤵
                      PID:1708
                  • C:\windows\SysWOW64\cmd.exe
                    C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                    4⤵
                      PID:1556
                      • C:\Windows\SysWOW64\reg.exe
                        REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                        5⤵
                          PID:920
                      • C:\windows\SysWOW64\cmd.exe
                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                        4⤵
                          PID:1952
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                            5⤵
                              PID:4124
                          • C:\windows\SysWOW64\cmd.exe
                            C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                            4⤵
                              PID:4408
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                5⤵
                                  PID:3936
                              • C:\windows\SysWOW64\cmd.exe
                                C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                4⤵
                                  PID:3136
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                    5⤵
                                      PID:6040
                              • C:\Users\Admin\AppData\Roaming\Annabelle.exe
                                "C:\Users\Admin\AppData\Roaming\Annabelle.exe"
                                2⤵
                                • Executes dropped EXE
                                PID:4868
                                • C:\Windows\SYSTEM32\vssadmin.exe
                                  vssadmin delete shadows /all /quiet
                                  3⤵
                                  • Interacts with shadow copies
                                  PID:5864
                                • C:\Windows\SYSTEM32\vssadmin.exe
                                  vssadmin delete shadows /all /quiet
                                  3⤵
                                  • Interacts with shadow copies
                                  PID:5676
                                • C:\Windows\SYSTEM32\vssadmin.exe
                                  vssadmin delete shadows /all /quiet
                                  3⤵
                                  • Interacts with shadow copies
                                  PID:5964
                                • C:\Windows\SYSTEM32\NetSh.exe
                                  NetSh Advfirewall set allprofiles state off
                                  3⤵
                                  • Modifies Windows Firewall
                                  PID:4088
                              • C:\Users\Admin\AppData\Roaming\BadRabbit.exe
                                "C:\Users\Admin\AppData\Roaming\BadRabbit.exe"
                                2⤵
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of WriteProcessMemory
                                PID:1992
                                • C:\Windows\SysWOW64\rundll32.exe
                                  C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                  3⤵
                                  • Loads dropped DLL
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:4688
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /c schtasks /Delete /F /TN rhaegal
                                    4⤵
                                      PID:1860
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /Delete /F /TN rhaegal
                                        5⤵
                                          PID:5520
                                      • C:\Windows\SysWOW64\cmd.exe
                                        /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 355692445 && exit"
                                        4⤵
                                          PID:3516
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 355692445 && exit"
                                            5⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:6004
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 00:43:00
                                          4⤵
                                            PID:5220
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 00:43:00
                                              5⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:4532
                                          • C:\Windows\C033.tmp
                                            "C:\Windows\C033.tmp" \\.\pipe\{2E7869C2-1E8F-48CA-A883-5EDB41C0B178}
                                            4⤵
                                              PID:5256
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
                                              4⤵
                                                PID:5908
                                              • C:\Windows\SysWOW64\cmd.exe
                                                /c schtasks /Delete /F /TN drogon
                                                4⤵
                                                  PID:5744
                                            • C:\Users\Admin\AppData\Roaming\Birele.exe
                                              "C:\Users\Admin\AppData\Roaming\Birele.exe"
                                              2⤵
                                              • Modifies WinLogon for persistence
                                              • Executes dropped EXE
                                              • Impair Defenses: Safe Mode Boot
                                              • Adds Run key to start application
                                              • System Location Discovery: System Language Discovery
                                              PID:1100
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM explorer.exe
                                                3⤵
                                                • Kills process with taskkill
                                                PID:4084
                                            • C:\Users\Admin\AppData\Roaming\Cerber5.exe
                                              "C:\Users\Admin\AppData\Roaming\Cerber5.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Enumerates connected drives
                                              • System Location Discovery: System Language Discovery
                                              PID:544
                                              • C:\Windows\SysWOW64\netsh.exe
                                                C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
                                                3⤵
                                                • Modifies Windows Firewall
                                                PID:3124
                                              • C:\Windows\SysWOW64\netsh.exe
                                                C:\Windows\system32\netsh.exe advfirewall reset
                                                3⤵
                                                • Modifies Windows Firewall
                                                PID:3156
                                            • C:\Users\Admin\AppData\Roaming\CoronaVirus.exe
                                              "C:\Users\Admin\AppData\Roaming\CoronaVirus.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              PID:4696
                                            • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                              "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Adds Run key to start application
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of WriteProcessMemory
                                              PID:2612
                                              • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w0000021C
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:2368
                                            • C:\Users\Admin\AppData\Roaming\CryptoWall.exe
                                              "C:\Users\Admin\AppData\Roaming\CryptoWall.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: MapViewOfSection
                                              • Suspicious use of WriteProcessMemory
                                              PID:3852
                                              • C:\Windows\SysWOW64\explorer.exe
                                                "C:\Windows\syswow64\explorer.exe"
                                                3⤵
                                                • Drops startup file
                                                • Adds Run key to start application
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: MapViewOfSection
                                                PID:448
                                                • C:\Windows\SysWOW64\svchost.exe
                                                  -k netsvcs
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2012
                                            • C:\Users\Admin\AppData\Roaming\DeriaLock.exe
                                              "C:\Users\Admin\AppData\Roaming\DeriaLock.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              PID:3760
                                            • C:\Users\Admin\AppData\Roaming\Dharma.exe
                                              "C:\Users\Admin\AppData\Roaming\Dharma.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              PID:4100
                                            • C:\Users\Admin\AppData\Roaming\Fantom.exe
                                              "C:\Users\Admin\AppData\Roaming\Fantom.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              PID:1456
                                            • C:\Users\Admin\AppData\Roaming\GandCrab.exe
                                              "C:\Users\Admin\AppData\Roaming\GandCrab.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              PID:4936
                                            • C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe
                                              "C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe"
                                              2⤵
                                                PID:2408
                                              • C:\Users\Admin\AppData\Roaming\Krotten.exe
                                                "C:\Users\Admin\AppData\Roaming\Krotten.exe"
                                                2⤵
                                                  PID:2964
                                                • C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe
                                                  "C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe"
                                                  2⤵
                                                    PID:2616
                                                  • C:\Users\Admin\AppData\Roaming\NotPetya.exe
                                                    "C:\Users\Admin\AppData\Roaming\NotPetya.exe"
                                                    2⤵
                                                      PID:4372
                                                    • C:\Users\Admin\AppData\Roaming\Petya.A.exe
                                                      "C:\Users\Admin\AppData\Roaming\Petya.A.exe"
                                                      2⤵
                                                        PID:4488
                                                      • C:\Users\Admin\AppData\Roaming\PolyRansom.exe
                                                        "C:\Users\Admin\AppData\Roaming\PolyRansom.exe"
                                                        2⤵
                                                          PID:4576
                                                          • C:\Users\Admin\WUcgcggI\DyswYAQE.exe
                                                            "C:\Users\Admin\WUcgcggI\DyswYAQE.exe"
                                                            3⤵
                                                              PID:5508
                                                            • C:\ProgramData\AEAUEQUs\soEUUsYM.exe
                                                              "C:\ProgramData\AEAUEQUs\soEUUsYM.exe"
                                                              3⤵
                                                                PID:5580
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\PolyRansom"
                                                                3⤵
                                                                  PID:5680
                                                                  • C:\Users\Admin\AppData\Roaming\PolyRansom.exe
                                                                    C:\Users\Admin\AppData\Roaming\PolyRansom
                                                                    4⤵
                                                                      PID:1812
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                    3⤵
                                                                    • Modifies registry key
                                                                    PID:6036
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                    3⤵
                                                                    • Modifies registry key
                                                                    PID:6028
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                    3⤵
                                                                    • Modifies registry key
                                                                    PID:6020
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mmEUoscI.bat" "C:\Users\Admin\AppData\Roaming\PolyRansom.exe""
                                                                    3⤵
                                                                      PID:6092
                                                                  • C:\Users\Admin\AppData\Roaming\PowerPoint.exe
                                                                    "C:\Users\Admin\AppData\Roaming\PowerPoint.exe"
                                                                    2⤵
                                                                      PID:3232
                                                                      • C:\Users\Admin\AppData\Local\Temp\sys3.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\\sys3.exe
                                                                        3⤵
                                                                          PID:2720
                                                                      • C:\Users\Admin\AppData\Roaming\RedBoot.exe
                                                                        "C:\Users\Admin\AppData\Roaming\RedBoot.exe"
                                                                        2⤵
                                                                          PID:5892
                                                                        • C:\Users\Admin\AppData\Roaming\RedEye.exe
                                                                          "C:\Users\Admin\AppData\Roaming\RedEye.exe"
                                                                          2⤵
                                                                            PID:6124
                                                                            • C:\Windows\SYSTEM32\vssadmin.exe
                                                                              vssadmin delete shadows /all /quiet
                                                                              3⤵
                                                                              • Interacts with shadow copies
                                                                              PID:5432
                                                                            • C:\Windows\SYSTEM32\vssadmin.exe
                                                                              vssadmin delete shadows /all /quiet
                                                                              3⤵
                                                                              • Interacts with shadow copies
                                                                              PID:4672
                                                                            • C:\Windows\SYSTEM32\vssadmin.exe
                                                                              vssadmin delete shadows /all /quiet
                                                                              3⤵
                                                                              • Interacts with shadow copies
                                                                              PID:5076
                                                                            • C:\Windows\SYSTEM32\NetSh.exe
                                                                              NetSh Advfirewall set allprofiles state off
                                                                              3⤵
                                                                              • Modifies Windows Firewall
                                                                              PID:5800
                                                                          • C:\Users\Admin\AppData\Roaming\Rensenware.exe
                                                                            "C:\Users\Admin\AppData\Roaming\Rensenware.exe"
                                                                            2⤵
                                                                              PID:4588
                                                                            • C:\Users\Admin\AppData\Roaming\Rokku.exe
                                                                              "C:\Users\Admin\AppData\Roaming\Rokku.exe"
                                                                              2⤵
                                                                                PID:5468
                                                                            • C:\Windows\system32\LogonUI.exe
                                                                              "LogonUI.exe" /flags:0x4 /state0:0xa392c855 /state1:0x41c64e6d
                                                                              1⤵
                                                                                PID:5556

                                                                              Network

                                                                              MITRE ATT&CK Enterprise v15

                                                                              Replay Monitor

                                                                              Loading Replay Monitor...

                                                                              Downloads

                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\icudtl.dat.62D7BA854C61DA17F04364138306B5BAA2766D5690753EE4D8F5B86020388CC2

                                                                                Filesize

                                                                                16B

                                                                                MD5

                                                                                0a9cfa02e05a43c3dc4b1f9fe6f5556c

                                                                                SHA1

                                                                                79111ee05a76be93fd56be59b58489d8ef6962c6

                                                                                SHA256

                                                                                39524dbcab80e58111f93acc259f1ad62a16110b87bb8b374451bffbcd3457a6

                                                                                SHA512

                                                                                b0f6ef3b7b62589a9e109f27af4e4ddbc2599e92745fefb171ab9c5cac54fc81819b83ecdd36fd453fd4ab09059d0b72aea24531ff77be9b4ee3b1c9eef7b338

                                                                              • C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_US\YOUR_FILES_ARE_ENCRYPTED.HTML.62D7BA854C61DA17F04364138306B5BAA2766D5690753EE4D8F5B86020388CC2

                                                                                Filesize

                                                                                4KB

                                                                                MD5

                                                                                853c5cd4db6d935717a53a50820fb8e0

                                                                                SHA1

                                                                                5b74065e920db2d7d22e74069c9e72c88b8e95cc

                                                                                SHA256

                                                                                c6d1714a5a6893409e8b3b9940f7ee1489acce74a184a101faa402cd211f5f06

                                                                                SHA512

                                                                                6903ffb0f3ca9656969cd10d72c74d7db585365dc72eeba8ff479069659bbf88ae651c4065844d5209aedef9f1dd41a9adbf11184b71c43620904c6f5e9738f9

                                                                              • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                                                                                Filesize

                                                                                4KB

                                                                                MD5

                                                                                e454844b50388dbc6fbb7aaba07e1332

                                                                                SHA1

                                                                                704e012d5366a8f270833a55f6296b2992a784e2

                                                                                SHA256

                                                                                f09877e5ee1f6e067528341435064823dc0c1ca1b8e32546d7fec2f0eb0e918b

                                                                                SHA512

                                                                                5f7c3c91cd744a677f334f1e38962784aab63b290d54aafa9396126649964eb2c340634c50ff022028bac9bcf8f114fcc254e22e100288b3a3065581db7c6c99

                                                                              • C:\ProgramData\AEAUEQUs\soEUUsYM.exe

                                                                                Filesize

                                                                                200KB

                                                                                MD5

                                                                                70aff22820d5831b22154d8b0d25b2e3

                                                                                SHA1

                                                                                1a59cfabd99ab933b09d7996b5af4c7c1dff72e7

                                                                                SHA256

                                                                                fe30c8008962fb2c3e065dd5c17266683ea904bb4bdf6870feb37e75e69c8cfc

                                                                                SHA512

                                                                                ccdada4aa38bcb35efa0566b62c23b9133f92941d266436e153eecd8deff58fb2b52eb106570e20edc73f333fafcdf4f36b78f260cb5c4c3b2744d2390788a35

                                                                              • C:\ProgramData\Microsoft\Windows\SystemData\S-1-5-21-2878641211-696417878-3864914810-1000\ReadOnly\LockScreen_O\LockScreen___1280_0720_notdimmed.jpg

                                                                                Filesize

                                                                                262KB

                                                                                MD5

                                                                                b5a72e6858a81624a2cee304ff3af1c0

                                                                                SHA1

                                                                                b980f55cd0aadfcdec56cd6585d6e3b263aade0d

                                                                                SHA256

                                                                                58276922ba7ac25acedb100d01453c14ae7b8990c057595da68c2e2354702875

                                                                                SHA512

                                                                                9c23b71e324e6aa7767de064809375d7ada7c678327433af4016d8a95c71dc2ee6012a067bda87cdfec4676adf64dfe93a056202d990c4774cebae275fa2f974

                                                                              • C:\Users\Admin\AppData\Local\Temp\is-9DHTO.tmp\butterflyondesktop.tmp

                                                                                Filesize

                                                                                688KB

                                                                                MD5

                                                                                c765336f0dcf4efdcc2101eed67cd30c

                                                                                SHA1

                                                                                fa0279f59738c5aa3b6b20106e109ccd77f895a7

                                                                                SHA256

                                                                                c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

                                                                                SHA512

                                                                                06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

                                                                              • C:\Users\Admin\AppData\Local\Temp\systm.txt

                                                                                Filesize

                                                                                45B

                                                                                MD5

                                                                                8fcca01e206307217ed9887f2f2f6d0b

                                                                                SHA1

                                                                                d1799bc509d781dd030834a3da1bcbe941ca979c

                                                                                SHA256

                                                                                b48d5d1e1f5adf9cc38025a94df37f3a41549cd08fd14cf0ace5d67d2bd14ac7

                                                                                SHA512

                                                                                6c8854439b9ff024c13edee933cef9d800e9d8c577e4335c70b1effa042a0bd8edafab03ba4801e9697fc43b72a9f347fb78dcd0749364711a6f92ca5ff50e8a

                                                                              • C:\Users\Admin\AppData\Local\system.exe

                                                                                Filesize

                                                                                315KB

                                                                                MD5

                                                                                5ff135f767de6f021c19980ca1e0166e

                                                                                SHA1

                                                                                c7ae6e1fc1caf99f71832806d08b50f73fb0de29

                                                                                SHA256

                                                                                8108966fb52114ef364735a6aa10c4451211cd92aab095c9d391e18adccc3a0d

                                                                                SHA512

                                                                                a516b64b7aba99df36daa767438c5175a84f6387566856be573c610a2a70aa4b996694f0aa1e4eb6e9fc451d25a7a6fcde4e81eb757bd6d1411e86b66c2ac38c

                                                                              • C:\Users\Admin\AppData\Roaming\$uckyLocker.exe

                                                                                Filesize

                                                                                414KB

                                                                                MD5

                                                                                c850f942ccf6e45230169cc4bd9eb5c8

                                                                                SHA1

                                                                                51c647e2b150e781bd1910cac4061a2cee1daf89

                                                                                SHA256

                                                                                86e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f

                                                                                SHA512

                                                                                2b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9

                                                                              • C:\Users\Admin\AppData\Roaming\7ev3n.exe

                                                                                Filesize

                                                                                315KB

                                                                                MD5

                                                                                9f8bc96c96d43ecb69f883388d228754

                                                                                SHA1

                                                                                61ed25a706afa2f6684bb4d64f69c5fb29d20953

                                                                                SHA256

                                                                                7d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5

                                                                                SHA512

                                                                                550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6

                                                                              • C:\Users\Admin\AppData\Roaming\AgentTesla.exe

                                                                                Filesize

                                                                                2.8MB

                                                                                MD5

                                                                                cce284cab135d9c0a2a64a7caec09107

                                                                                SHA1

                                                                                e4b8f4b6cab18b9748f83e9fffd275ef5276199e

                                                                                SHA256

                                                                                18aab0e981eee9e4ef8e15d4b003b14b3a1b0bfb7233fade8ee4b6a22a5abbb9

                                                                                SHA512

                                                                                c45d021295871447ce60250ff9cbeba2b2a16a23371530da077d6235cfe5005f10fa228071542df3621462d913ad2f58236dc0c0cb390779eef86a10bba8429f

                                                                              • C:\Users\Admin\AppData\Roaming\Annabelle.exe

                                                                                Filesize

                                                                                15.9MB

                                                                                MD5

                                                                                0f743287c9911b4b1c726c7c7edcaf7d

                                                                                SHA1

                                                                                9760579e73095455fcbaddfe1e7e98a2bb28bfe0

                                                                                SHA256

                                                                                716335ba5cd1e7186c40295b199190e2b6655e48f1c1cbe12139ba67faa5e1ac

                                                                                SHA512

                                                                                2a6dd6288303700ef9cb06ae1efeb1e121c89c97708e5ecd15ed9b2a35d0ecff03d8da58b30daeadad89bd38dc4649521ada149fb457408e5a2bdf1512f88677

                                                                              • C:\Users\Admin\AppData\Roaming\BadRabbit.exe

                                                                                Filesize

                                                                                431KB

                                                                                MD5

                                                                                fbbdc39af1139aebba4da004475e8839

                                                                                SHA1

                                                                                de5c8d858e6e41da715dca1c019df0bfb92d32c0

                                                                                SHA256

                                                                                630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da

                                                                                SHA512

                                                                                74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87

                                                                              • C:\Users\Admin\AppData\Roaming\Birele.exe

                                                                                Filesize

                                                                                116KB

                                                                                MD5

                                                                                41789c704a0eecfdd0048b4b4193e752

                                                                                SHA1

                                                                                fb1e8385691fa3293b7cbfb9b2656cf09f20e722

                                                                                SHA256

                                                                                b2dcfdf9e7b09f2aa5004668370e77982963ace820e7285b2e264a294441da23

                                                                                SHA512

                                                                                76391ac85fdc3be75441fcd6e19bed08b807d3946c7281c647f16a3be5388f7be307e6323fac8502430a4a6d800d52a88709592a49011ecc89de4f19102435ea

                                                                              • C:\Users\Admin\AppData\Roaming\Cerber5.exe

                                                                                Filesize

                                                                                313KB

                                                                                MD5

                                                                                fe1bc60a95b2c2d77cd5d232296a7fa4

                                                                                SHA1

                                                                                c07dfdea8da2da5bad036e7c2f5d37582e1cf684

                                                                                SHA256

                                                                                b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d

                                                                                SHA512

                                                                                266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89

                                                                              • C:\Users\Admin\AppData\Roaming\CoronaVirus.exe

                                                                                Filesize

                                                                                1.0MB

                                                                                MD5

                                                                                055d1462f66a350d9886542d4d79bc2b

                                                                                SHA1

                                                                                f1086d2f667d807dbb1aa362a7a809ea119f2565

                                                                                SHA256

                                                                                dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0

                                                                                SHA512

                                                                                2c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1

                                                                              • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

                                                                                Filesize

                                                                                338KB

                                                                                MD5

                                                                                04fb36199787f2e3e2135611a38321eb

                                                                                SHA1

                                                                                65559245709fe98052eb284577f1fd61c01ad20d

                                                                                SHA256

                                                                                d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9

                                                                                SHA512

                                                                                533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444

                                                                              • C:\Users\Admin\AppData\Roaming\CryptoWall.exe

                                                                                Filesize

                                                                                132KB

                                                                                MD5

                                                                                919034c8efb9678f96b47a20fa6199f2

                                                                                SHA1

                                                                                747070c74d0400cffeb28fbea17b64297f14cfbd

                                                                                SHA256

                                                                                e036d68b8f8b7afc6c8b6252876e1e290f11a26d4ad18ac6f310662845b2c734

                                                                                SHA512

                                                                                745a81c50bbfd62234edb9788c83a22e0588c5d25c00881901923a02d7096c71ef5f0cd5b73f92ad974e5174de064b0c5ea8044509039aab14b2aed83735a7c4

                                                                              • C:\Users\Admin\AppData\Roaming\DeriaLock.exe

                                                                                Filesize

                                                                                484KB

                                                                                MD5

                                                                                0a7b70efba0aa93d4bc0857b87ac2fcb

                                                                                SHA1

                                                                                01a6c963b2f5f36ff21a1043587dcf921ae5f5cd

                                                                                SHA256

                                                                                4f5bff64160044d9a769ab277ff85ba954e2a2e182c6da4d0672790cf1d48309

                                                                                SHA512

                                                                                2033f9637b8d023242c93f54c140dd561592a3380a15a9fdc8ebfa33385ff4fc569d66c846a01b4ac005f0521b3c219e87f4b1ed2a83557f9d95fa066ad25e14

                                                                              • C:\Users\Admin\AppData\Roaming\Dharma.exe

                                                                                Filesize

                                                                                11.5MB

                                                                                MD5

                                                                                928e37519022745490d1af1ce6f336f7

                                                                                SHA1

                                                                                b7840242393013f2c4c136ac7407e332be075702

                                                                                SHA256

                                                                                6fb303dd8ba36381948127d44bd8541e4a1ab8af07b46526ace08458f2498850

                                                                                SHA512

                                                                                8040195ab2b2e15c9d5ffa13a47a61c709738d1cf5e2108e848fedf3408e5bad5f2fc5f523f170f6a80cb33a4f5612d3d60dd343d028e55cfc08cd2f6ed2947c

                                                                              • C:\Users\Admin\AppData\Roaming\Fantom.exe

                                                                                Filesize

                                                                                261KB

                                                                                MD5

                                                                                7d80230df68ccba871815d68f016c282

                                                                                SHA1

                                                                                e10874c6108a26ceedfc84f50881824462b5b6b6

                                                                                SHA256

                                                                                f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b

                                                                                SHA512

                                                                                64d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540

                                                                              • C:\Users\Admin\AppData\Roaming\GandCrab.exe

                                                                                Filesize

                                                                                291KB

                                                                                MD5

                                                                                e6b43b1028b6000009253344632e69c4

                                                                                SHA1

                                                                                e536b70e3ffe309f7ae59918da471d7bf4cadd1c

                                                                                SHA256

                                                                                bfb9db791b8250ffa8ebc48295c5dbbca757a5ed3bbb01de12a871b5cd9afd5a

                                                                                SHA512

                                                                                07da214314673407a7d3978ee6e1d20bf1e02f135bf557e86b50489ecc146014f2534515c1b613dba96e65489d8c82caaa8ed2e647684d61e5e86bd3e8251adf

                                                                              • C:\Users\Admin\AppData\Roaming\HawkEye.exe

                                                                                Filesize

                                                                                232KB

                                                                                MD5

                                                                                60fabd1a2509b59831876d5e2aa71a6b

                                                                                SHA1

                                                                                8b91f3c4f721cb04cc4974fc91056f397ae78faa

                                                                                SHA256

                                                                                1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

                                                                                SHA512

                                                                                3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

                                                                              • C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe

                                                                                Filesize

                                                                                211KB

                                                                                MD5

                                                                                b805db8f6a84475ef76b795b0d1ed6ae

                                                                                SHA1

                                                                                7711cb4873e58b7adcf2a2b047b090e78d10c75b

                                                                                SHA256

                                                                                f5d002bfe80b48386a6c99c41528931b7f5df736cd34094463c3f85dde0180bf

                                                                                SHA512

                                                                                62a2c329b43d186c4c602c5f63efc8d2657aa956f21184334263e4f6d0204d7c31f86bda6e85e65e3b99b891c1630d805b70997731c174f6081ecc367ccf9416

                                                                              • C:\Users\Admin\AppData\Roaming\Krotten.exe

                                                                                Filesize

                                                                                53KB

                                                                                MD5

                                                                                87ccd6f4ec0e6b706d65550f90b0e3c7

                                                                                SHA1

                                                                                213e6624bff6064c016b9cdc15d5365823c01f5f

                                                                                SHA256

                                                                                e79f164ccc75a5d5c032b4c5a96d6ad7604faffb28afe77bc29b9173fa3543e4

                                                                                SHA512

                                                                                a72403d462e2e2e181dbdabfcc02889f001387943571391befed491aaecba830b0869bdd4d82bca137bd4061bbbfb692871b1b4622c4a7d9f16792c60999c990

                                                                              • C:\Users\Admin\AppData\Roaming\Locky.AZ.exe

                                                                                Filesize

                                                                                181KB

                                                                                MD5

                                                                                0826df3aaa157edff9c0325f298850c2

                                                                                SHA1

                                                                                ed35b02fa029f1e724ed65c2de5de6e5c04f7042

                                                                                SHA256

                                                                                2e4319ff62c03a539b2b2f71768a0cfc0adcaedbcca69dbf235081fe2816248b

                                                                                SHA512

                                                                                af6c5734fd02b9ad3f202e95f9ff4368cf0dfdaffe0d9a88b781b196a0a3c44eef3d8f7c329ec6e3cbcd3e6ab7c49df7d715489539e631506ca1ae476007a6a6

                                                                              • C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe

                                                                                Filesize

                                                                                1.4MB

                                                                                MD5

                                                                                63210f8f1dde6c40a7f3643ccf0ff313

                                                                                SHA1

                                                                                57edd72391d710d71bead504d44389d0462ccec9

                                                                                SHA256

                                                                                2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f

                                                                                SHA512

                                                                                87a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11

                                                                              • C:\Users\Admin\AppData\Roaming\NotPetya.exe

                                                                                Filesize

                                                                                390KB

                                                                                MD5

                                                                                5b7e6e352bacc93f7b80bc968b6ea493

                                                                                SHA1

                                                                                e686139d5ed8528117ba6ca68fe415e4fb02f2be

                                                                                SHA256

                                                                                63545fa195488ff51955f09833332b9660d18f8afb16bdf579134661962e548a

                                                                                SHA512

                                                                                9d24af0cb00fb8a5e61e9d19cd603b5541a22ae6229c2acf498447e0e7d4145fee25c8ab9d5d5f18f554e6cbf8ca56b7ca3144e726d7dfd64076a42a25b3dfb6

                                                                              • C:\Users\Admin\AppData\Roaming\Petya.A.exe

                                                                                Filesize

                                                                                225KB

                                                                                MD5

                                                                                af2379cc4d607a45ac44d62135fb7015

                                                                                SHA1

                                                                                39b6d40906c7f7f080e6befa93324dddadcbd9fa

                                                                                SHA256

                                                                                26b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739

                                                                                SHA512

                                                                                69899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99

                                                                              • C:\Users\Admin\AppData\Roaming\PolyRansom.exe

                                                                                Filesize

                                                                                220KB

                                                                                MD5

                                                                                3ed3fb296a477156bc51aba43d825fc0

                                                                                SHA1

                                                                                9caa5c658b1a88fee149893d3a00b34a8bb8a1a6

                                                                                SHA256

                                                                                1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423

                                                                                SHA512

                                                                                dc3d6e409cee4d54f48d1a25912243d07e2f800578c8e0e348ce515a047ecf5fa3089b46284e0956bbced345957a000eecdc082e6f3060971759d70a14c1c97e

                                                                              • C:\Users\Admin\AppData\Roaming\PowerPoint.exe

                                                                                Filesize

                                                                                136KB

                                                                                MD5

                                                                                70108103a53123201ceb2e921fcfe83c

                                                                                SHA1

                                                                                c71799a6a6d09ee758b04cdf90a4ab76fbd2a7e3

                                                                                SHA256

                                                                                9c3f8df80193c085912c9950c58051ae77c321975784cc069ceacd4f57d5861d

                                                                                SHA512

                                                                                996701c65eee7f781c2d22dce63f4a95900f36b97a99dcf833045bce239a08b3c2f6326b3a808431cdab92d59161dd80763e44126578e160d79b7095175d276b

                                                                              • C:\Users\Admin\AppData\Roaming\RedBoot.exe

                                                                                Filesize

                                                                                1.2MB

                                                                                MD5

                                                                                e0340f456f76993fc047bc715dfdae6a

                                                                                SHA1

                                                                                d47f6f7e553c4bc44a2fe88c2054de901390b2d7

                                                                                SHA256

                                                                                1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887

                                                                                SHA512

                                                                                cac10c675d81630eefca49b2ac4cc83f3eb29115ee28a560db4d6c33f70bf24980e48bb48ce20375349736e3e6b23a1ca504b9367917328853fffc5539626bbc

                                                                              • C:\Users\Admin\AppData\Roaming\RedEye.exe

                                                                                Filesize

                                                                                10.6MB

                                                                                MD5

                                                                                e9e5596b42f209cc058b55edc2737a80

                                                                                SHA1

                                                                                f30232697b3f54e58af08421da697262c99ec48b

                                                                                SHA256

                                                                                9ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305

                                                                                SHA512

                                                                                e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7

                                                                              • C:\Users\Admin\AppData\Roaming\Rensenware.exe

                                                                                Filesize

                                                                                96KB

                                                                                MD5

                                                                                60335edf459643a87168da8ed74c2b60

                                                                                SHA1

                                                                                61f3e01174a6557f9c0bfc89ae682d37a7e91e2e

                                                                                SHA256

                                                                                7bf5623f0a10dfa148a35bebd899b7758612f1693d2a9910f716cf15a921a76a

                                                                                SHA512

                                                                                b4e5e4d4f0b4a52243d6756c66b4fe6f4b39e64df7790072046e8a3dadad3a1be30b8689a1bab8257cc35cb4df652888ddf62b4e1fccb33e1bbf1f5416d73efb

                                                                              • C:\Users\Admin\AppData\Roaming\Rokku.exe

                                                                                Filesize

                                                                                666KB

                                                                                MD5

                                                                                97512f4617019c907cd0f88193039e7c

                                                                                SHA1

                                                                                24cfa261ee30f697e7d1e2215eee1c21eebf4579

                                                                                SHA256

                                                                                438888ef36bad1079af79daf152db443b4472c5715a7b3da0ba24cc757c53499

                                                                                SHA512

                                                                                cfbb8dd91434f917d507cb919aa7e6b16b7b2056d56185f6ad5b6149e05629325cdb3df907f58bb3f634b17a9989bf5b6d6b81f5396a3a556431742ed742ac4a

                                                                              • C:\Users\Admin\AppData\Roaming\butterflyondesktop.exe

                                                                                Filesize

                                                                                2.8MB

                                                                                MD5

                                                                                1535aa21451192109b86be9bcc7c4345

                                                                                SHA1

                                                                                1af211c686c4d4bf0239ed6620358a19691cf88c

                                                                                SHA256

                                                                                4641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6

                                                                                SHA512

                                                                                1762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da

                                                                              • C:\Users\Admin\Desktop\READ_IT.txt

                                                                                Filesize

                                                                                1KB

                                                                                MD5

                                                                                c50440f3e9eefa1857e73728bcff0d53

                                                                                SHA1

                                                                                789d0847aaaa1f17fbfccfc5a7a968fad8d2959f

                                                                                SHA256

                                                                                40b87abbbe14d39543fb4f0b11ecb28ff92d36e24efb46c2ee02d7401348ccd7

                                                                                SHA512

                                                                                f40bea96adbb0d97c135bfd37e489ed0db262b84dd98ed759d9d3f58cf62d65cb176c0a3ea56b7ff29d1d67e959746f2a19614db3ec461ad2bbdbedd079f9758

                                                                              • C:\Users\Admin\Documents\DisconnectUnprotect.xlsx.crypt.RedEye.ANNABELLE

                                                                                Filesize

                                                                                16B

                                                                                MD5

                                                                                52488ef3f42a79048b8cbb5503816741

                                                                                SHA1

                                                                                56651900d95ee36de389c29b7a7e6dedbb421eff

                                                                                SHA256

                                                                                9ce5f9abb2fb204df9fc5db071bdfe0fefeb86da178d8c7b8e4ea29784c48154

                                                                                SHA512

                                                                                d42a0c76a4d24d930a9b6ee15205a02a6edec97ca16e9febc6eb47d05ff7d6f2af7c3d430d416bf464dc561289428d412acc856718aa5ead58de51b1e8facd5e

                                                                              • C:\Users\Admin\WUcgcggI\DyswYAQE.exe

                                                                                Filesize

                                                                                182KB

                                                                                MD5

                                                                                ef76a7c9b86cd9e6af56e197fe7d8efc

                                                                                SHA1

                                                                                42cc899a0e95bf61e03a999a0455b76e063fb9f7

                                                                                SHA256

                                                                                a5ce282d8fe5285d9e50dd0d8d89f1b57fa85f89bcdb1d07341d177a13e2058f

                                                                                SHA512

                                                                                b6d84682a9e257d0fd157179348a6b3d848227e6017b8971889ff0cfc20bf09e9f697f285334f8848facf962801b3764c18bfdae65eda3665f7538878488f45f

                                                                              • C:\Windows\C033.tmp

                                                                                Filesize

                                                                                60KB

                                                                                MD5

                                                                                347ac3b6b791054de3e5720a7144a977

                                                                                SHA1

                                                                                413eba3973a15c1a6429d9f170f3e8287f98c21c

                                                                                SHA256

                                                                                301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

                                                                                SHA512

                                                                                9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

                                                                              • C:\Windows\infpub.dat

                                                                                Filesize

                                                                                401KB

                                                                                MD5

                                                                                c29d6253d89ee9c0c872dd377a7a8454

                                                                                SHA1

                                                                                46be3800684f6b208e0a8c7b120ef8614c22c4b0

                                                                                SHA256

                                                                                03f4198a279ea4c36a62cd271d3b2d796547013548666006fbef45e20bb920cb

                                                                                SHA512

                                                                                50141de5e0a827688251161353932b677c85e0d6e6831293c9a0044543e541fe8bd4e62fa403abc06df9d220fd843aa58ff9cc37abf46be3e06ae14905c24a5e

                                                                              • memory/448-171-0x00000000013C0000-0x00000000013E5000-memory.dmp

                                                                                Filesize

                                                                                148KB

                                                                              • memory/448-228-0x00000000013C0000-0x00000000013E5000-memory.dmp

                                                                                Filesize

                                                                                148KB

                                                                              • memory/1008-75-0x0000000004840000-0x0000000004856000-memory.dmp

                                                                                Filesize

                                                                                88KB

                                                                              • memory/1008-197-0x00000000049A0000-0x00000000049BA000-memory.dmp

                                                                                Filesize

                                                                                104KB

                                                                              • memory/1008-78-0x00000000049A0000-0x00000000049BA000-memory.dmp

                                                                                Filesize

                                                                                104KB

                                                                              • memory/1100-984-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                Filesize

                                                                                224KB

                                                                              • memory/1100-113-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                Filesize

                                                                                224KB

                                                                              • memory/1100-124-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                Filesize

                                                                                224KB

                                                                              • memory/1456-549-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-525-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-269-0x00000000022E0000-0x0000000002312000-memory.dmp

                                                                                Filesize

                                                                                200KB

                                                                              • memory/1456-277-0x0000000004960000-0x0000000004992000-memory.dmp

                                                                                Filesize

                                                                                200KB

                                                                              • memory/1456-535-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-551-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-547-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-545-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-543-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-541-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-539-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-533-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-531-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-529-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-527-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-537-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-523-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-521-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-519-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-517-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-515-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1456-514-0x0000000004960000-0x000000000498B000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1812-1252-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                Filesize

                                                                                228KB

                                                                              • memory/2012-203-0x0000000000B10000-0x0000000000B35000-memory.dmp

                                                                                Filesize

                                                                                148KB

                                                                              • memory/2016-0-0x00007FFF166E3000-0x00007FFF166E5000-memory.dmp

                                                                                Filesize

                                                                                8KB

                                                                              • memory/2016-1-0x0000000000AB0000-0x0000000006026000-memory.dmp

                                                                                Filesize

                                                                                85.5MB

                                                                              • memory/2016-783-0x00007FFF166E3000-0x00007FFF166E5000-memory.dmp

                                                                                Filesize

                                                                                8KB

                                                                              • memory/2408-268-0x00000000001D0000-0x000000000020C000-memory.dmp

                                                                                Filesize

                                                                                240KB

                                                                              • memory/2720-985-0x000000002AA00000-0x000000002AA24000-memory.dmp

                                                                                Filesize

                                                                                144KB

                                                                              • memory/2948-68-0x0000000010000000-0x0000000010010000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/2948-45-0x0000000001070000-0x0000000001080000-memory.dmp

                                                                                Filesize

                                                                                64KB

                                                                              • memory/3232-784-0x000000002AA00000-0x000000002AA24000-memory.dmp

                                                                                Filesize

                                                                                144KB

                                                                              • memory/3760-196-0x00000000054C0000-0x0000000005516000-memory.dmp

                                                                                Filesize

                                                                                344KB

                                                                              • memory/3760-175-0x00000000051F0000-0x000000000528C000-memory.dmp

                                                                                Filesize

                                                                                624KB

                                                                              • memory/3760-174-0x00000000008C0000-0x0000000000942000-memory.dmp

                                                                                Filesize

                                                                                520KB

                                                                              • memory/4576-824-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                Filesize

                                                                                228KB

                                                                              • memory/4576-1052-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                Filesize

                                                                                228KB

                                                                              • memory/4688-177-0x0000000000B50000-0x0000000000BB8000-memory.dmp

                                                                                Filesize

                                                                                416KB

                                                                              • memory/4688-499-0x0000000000B50000-0x0000000000BB8000-memory.dmp

                                                                                Filesize

                                                                                416KB

                                                                              • memory/4688-185-0x0000000000B50000-0x0000000000BB8000-memory.dmp

                                                                                Filesize

                                                                                416KB

                                                                              • memory/4696-1493-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                Filesize

                                                                                1.4MB

                                                                              • memory/4696-150-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                Filesize

                                                                                1.4MB

                                                                              • memory/4868-1494-0x000001A9FDE60000-0x000001A9FF3EE000-memory.dmp

                                                                                Filesize

                                                                                21.6MB

                                                                              • memory/4868-112-0x000001A9FA910000-0x000001A9FB904000-memory.dmp

                                                                                Filesize

                                                                                16.0MB

                                                                              • memory/4992-41-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                Filesize

                                                                                80KB

                                                                              • memory/5028-77-0x0000000005930000-0x000000000593A000-memory.dmp

                                                                                Filesize

                                                                                40KB

                                                                              • memory/5028-59-0x0000000005880000-0x0000000005912000-memory.dmp

                                                                                Filesize

                                                                                584KB

                                                                              • memory/5028-58-0x0000000005F50000-0x00000000064F4000-memory.dmp

                                                                                Filesize

                                                                                5.6MB

                                                                              • memory/5028-57-0x0000000000F60000-0x0000000000FCE000-memory.dmp

                                                                                Filesize

                                                                                440KB

                                                                              • memory/5468-1107-0x0000000000400000-0x000000000058D000-memory.dmp

                                                                                Filesize

                                                                                1.6MB

                                                                              • memory/5508-1110-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                Filesize

                                                                                188KB

                                                                              • memory/5508-1050-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                Filesize

                                                                                188KB

                                                                              • memory/5580-1109-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                                Filesize

                                                                                204KB

                                                                              • memory/5580-1051-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                                Filesize

                                                                                204KB

                                                                              • memory/5892-823-0x00000000004B0000-0x000000000073E000-memory.dmp

                                                                                Filesize

                                                                                2.6MB

                                                                              • memory/5892-1128-0x00000000004B0000-0x000000000073E000-memory.dmp

                                                                                Filesize

                                                                                2.6MB

                                                                              • memory/6124-1387-0x0000013A6B3F0000-0x0000013A6C406000-memory.dmp

                                                                                Filesize

                                                                                16.1MB

                                                                              • memory/6124-1118-0x0000013A68170000-0x0000013A68C0C000-memory.dmp

                                                                                Filesize

                                                                                10.6MB

                                                                              • memory/6124-1388-0x0000013A69020000-0x0000013A69026000-memory.dmp

                                                                                Filesize

                                                                                24KB