Analysis Overview
SHA256
742e3f0ca6967c947c99cbbff7f3eaa7f5059a1bba1714a20afee3d85312a439
Threat Level: Known bad
The file freehacks.exe was found to be: Known bad.
Malicious Activity Summary
Wannacry
Satana family
Modifies WinLogon for persistence
Gandcrab
HawkEye
Gandcrab family
Hawkeye family
Satana
Wannacry family
Renames multiple (272) files with added filename extension
Deletes shadow copies
Modifies Windows Firewall
Event Triggered Execution: Image File Execution Options Injection
Drops startup file
Reads user/profile data of web browsers
Executes dropped EXE
Credentials from Password Stores: Windows Credential Manager
ASPack v2.12-2.42
Modifies file permissions
Loads dropped DLL
Enumerates connected drives
Adds Run key to start application
System Binary Proxy Execution: Verclsid
Looks up external IP address via web service
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
Writes to the Master Boot Record (MBR)
AutoIT Executable
Suspicious use of NtSetInformationThreadHideFromDebugger
Sets desktop wallpaper using registry
Suspicious use of SetThreadContext
UPX packed file
Drops file in Program Files directory
Drops file in Windows directory
System Location Discovery: System Language Discovery
Unsigned PE
Enumerates physical storage devices
Program crash
Modifies registry key
Suspicious use of UnmapMainImage
Views/modifies file attributes
Suspicious behavior: MapViewOfSection
Kills process with taskkill
Checks processor information in registry
Runs net.exe
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Scheduled Task/Job: Scheduled Task
Suspicious use of WriteProcessMemory
Interacts with shadow copies
Suspicious use of FindShellTrayWindow
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-12-02 09:16
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-12-02 09:16
Reported
2024-12-02 09:18
Platform
win10v2004-20241007-en
Max time kernel
88s
Max time network
103s
Command Line
Signatures
Gandcrab
Gandcrab family
Wannacry
Wannacry family
Deletes shadow copies
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\netsh.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\netsh.exe | N/A |
ASPack v2.12-2.42
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ip-addr.es | N/A | N/A |
| N/A | ip-addr.es | N/A | N/A |
AutoIT Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Roaming\Xyeta.exe |
Interacts with shadow copies
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\vssadmin.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\vssadmin.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\vssadmin.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SYSTEM32\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\taskkill.exe | N/A |
Modifies registry key
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
Runs net.exe
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Views/modifies file attributes
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\freehacks.exe
"C:\Users\Admin\AppData\Local\Temp\freehacks.exe"
C:\Users\Admin\AppData\Roaming\Avoid.exe
"C:\Users\Admin\AppData\Roaming\Avoid.exe"
C:\Users\Admin\AppData\Roaming\ChilledWindows.exe
"C:\Users\Admin\AppData\Roaming\ChilledWindows.exe"
C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe
"C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe"
C:\Users\Admin\AppData\Roaming\CrazyNCS.exe
"C:\Users\Admin\AppData\Roaming\CrazyNCS.exe"
C:\Users\Admin\AppData\Roaming\Curfun.exe
"C:\Users\Admin\AppData\Roaming\Curfun.exe"
C:\Users\Admin\AppData\Roaming\DesktopBoom.exe
"C:\Users\Admin\AppData\Roaming\DesktopBoom.exe"
C:\Users\Admin\AppData\Roaming\Flasher.exe
"C:\Users\Admin\AppData\Roaming\Flasher.exe"
C:\Users\Admin\AppData\Roaming\Hydra.exe
"C:\Users\Admin\AppData\Roaming\Hydra.exe"
C:\Users\Admin\AppData\Roaming\Launcher.exe
"C:\Users\Admin\AppData\Roaming\Launcher.exe"
C:\Users\Admin\AppData\Roaming\rickroll.exe
"C:\Users\Admin\AppData\Roaming\rickroll.exe"
C:\Users\Admin\AppData\Roaming\ScreenScrew.exe
"C:\Users\Admin\AppData\Roaming\ScreenScrew.exe"
C:\Users\Admin\AppData\Roaming\Trololo.exe
"C:\Users\Admin\AppData\Roaming\Trololo.exe"
C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe
"C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe"
C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe
"C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe"
C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe
"C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe"
C:\Users\Admin\AppData\Roaming\RedBoot.exe
"C:\Users\Admin\AppData\Roaming\RedBoot.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2292 -ip 2292
C:\Windows\SYSTEM32\taskkill.exe
taskkill.exe /f /im explorer.exe
C:\Windows\SYSTEM32\taskkill.exe
taskkill.exe /f /im taskmgr.exe
C:\Windows\system32\AUDIODG.EXE
C:\Windows\system32\AUDIODG.EXE 0x508 0x460
C:\Users\Admin\42355084\assembler.exe
"C:\Users\Admin\42355084\assembler.exe" -f bin "C:\Users\Admin\42355084\boot.asm" -o "C:\Users\Admin\42355084\boot.bin"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 1204
C:\Users\Admin\AppData\Roaming\Rensenware.exe
"C:\Users\Admin\AppData\Roaming\Rensenware.exe"
C:\Users\Admin\AppData\Roaming\Rokku.exe
"C:\Users\Admin\AppData\Roaming\Rokku.exe"
C:\Users\Admin\AppData\Roaming\satan.exe
"C:\Users\Admin\AppData\Roaming\satan.exe"
C:\Users\Admin\AppData\Roaming\Satana.exe
"C:\Users\Admin\AppData\Roaming\Satana.exe"
C:\Users\Admin\AppData\Roaming\satan.exe
"C:\Users\Admin\AppData\Roaming\satan.exe"
C:\Users\Admin\AppData\Roaming\Olza\gohix.exe
"C:\Users\Admin\AppData\Roaming\Olza\gohix.exe"
C:\ProgramData\HMooQgwU\DAgksEoM.exe
"C:\ProgramData\HMooQgwU\DAgksEoM.exe"
C:\Users\Admin\42355084\overwrite.exe
"C:\Users\Admin\42355084\overwrite.exe" "C:\Users\Admin\42355084\boot.bin"
C:\Windows\SysWOW64\reg.exe
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PocIMIwc.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""
C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe
"C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe"
C:\Users\Admin\AppData\Roaming\Xyeta.exe
"C:\Users\Admin\AppData\Roaming\Xyeta.exe"
C:\Users\Admin\AppData\Roaming\7ev3n.exe
"C:\Users\Admin\AppData\Roaming\7ev3n.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5912 -ip 5912
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5912 -s 448
C:\Windows\system32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Users\Admin\AppData\Roaming\taskdl.exe
taskdl.exe
C:\Windows\system32\vssvc.exe
C:\Windows\system32\vssvc.exe
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c 115001733129410.bat
C:\Windows\SysWOW64\attrib.exe
attrib +h +s F:\$RECYCLE
C:\Users\Admin\AppData\Roaming\ViraLock.exe
C:\Users\Admin\AppData\Roaming\ViraLock
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe SETUPEXEDIR=C:\Users\Admin\AppData\Roaming\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\ViraLock"
C:\Windows\SysWOW64\reg.exe
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
C:\Windows\SysWOW64\reg.exe
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
C:\Windows\SysWOW64\reg.exe
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pckccIcA.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""
C:\Users\Admin\AppData\Roaming\Annabelle.exe
"C:\Users\Admin\AppData\Roaming\Annabelle.exe"
C:\Windows\SysWOW64\wbem\WMIC.exe
"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
C:\Windows\System32\vssadmin.exe
"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\services\VSS" /v Start /t REG_DWORD /d 4 /f
C:\Windows\SysWOW64\reg.exe
"C:\Windows\System32\reg.exe" add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v DisableSR /t REG_DWORD /d 1 /f
C:\Users\Admin\AppData\Roaming\Cerber5.exe
"C:\Users\Admin\AppData\Roaming\Cerber5.exe"
C:\Users\Admin\AppData\Roaming\CryptoWall.exe
"C:\Users\Admin\AppData\Roaming\CryptoWall.exe"
C:\Windows\SysWOW64\net.exe
"C:\Windows\System32\net.exe" stop vss
C:\Windows\syswow64\MsiExec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 872C2D752991E14D10871977673557AD
C:\Users\Admin\AppData\Roaming\Dharma.exe
"C:\Users\Admin\AppData\Roaming\Dharma.exe"
C:\Users\Admin\AppData\Roaming\Krotten.exe
"C:\Users\Admin\AppData\Roaming\Krotten.exe"
C:\Windows\SysWOW64\cmd.exe
/c schtasks /Delete /F /TN rhaegal
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop vss
C:\Windows\SYSTEM32\vssadmin.exe
vssadmin delete shadows /all /quiet
C:\Windows\SYSTEM32\vssadmin.exe
vssadmin delete shadows /all /quiet
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop swprv
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #1
C:\Windows\SysWOW64\cmd.exe
/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2766519108 && exit"
C:\Windows\SysWOW64\cscript.exe
cscript //nologo c.vbs
C:\Windows\SysWOW64\netsh.exe
C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
C:\Windows\SysWOW64\cmd.exe
/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 09:08:00
C:\Users\Admin\AppData\Local\Temp\1A1B.tmp
"C:\Users\Admin\AppData\Local\Temp\1A1B.tmp" \\.\pipe\{DF5E66F3-A3AC-4102-B51B-3D50E1016C15}
C:\Windows\system32\vssvc.exe
C:\Windows\system32\vssvc.exe
C:\Windows\SysWOW64\netsh.exe
C:\Windows\system32\netsh.exe advfirewall reset
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop srservice
C:\Windows\SysWOW64\reg.exe
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
C:\Windows\SysWOW64\cscript.exe
cscript.exe //nologo m.vbs
C:\Users\Admin\AppData\Local\Temp\ac\nc123.exe
"C:\Users\Admin\AppData\Local\Temp\ac\nc123.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\USAD2-54HTZ-TZTXH-TFTZY.HTML
C:\Windows\SysWOW64\schtasks.exe
schtasks /Delete /F /TN rhaegal
C:\Users\Admin\AppData\Local\Temp\ac\mssql2.exe
"C:\Users\Admin\AppData\Local\Temp\ac\mssql2.exe"
C:\Windows\SysWOW64\schtasks.exe
schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2766519108 && exit"
C:\Users\Admin\AppData\Roaming\taskdl.exe
taskdl.exe
C:\Windows\SysWOW64\cscript.exe
cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
C:\Windows\SysWOW64\cscript.exe
cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
C:\Windows\SysWOW64\reg.exe
REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
C:\ProgramData\HMooQgwU\DAgksEoM.exe
"C:\ProgramData\HMooQgwU\DAgksEoM.exe"
C:\Windows\SysWOW64\reg.exe
REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
C:\Windows\SysWOW64\reg.exe
REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
C:\Users\Admin\AppData\Roaming\PolyRansom.exe
"C:\Users\Admin\AppData\Roaming\PolyRansom.exe"
C:\Users\Admin\AppData\Roaming\PowerPoint.exe
"C:\Users\Admin\AppData\Roaming\PowerPoint.exe"
C:\Users\Admin\AppData\Local\Temp\sys3.exe
C:\Users\Admin\AppData\Local\Temp\\sys3.exe
C:\Windows\System32\mshta.exe
"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
C:\Windows\syswow64\MsiExec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding DA26D85EA70A746BC2F370519A4CA997
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| BO | 200.87.164.69:9999 | tcp | |
| US | 8.8.8.8:53 | google.com | udp |
| GB | 142.250.187.238:80 | google.com | tcp |
| BO | 200.87.164.69:9999 | tcp | |
| GB | 142.250.187.238:80 | google.com | tcp |
| US | 8.8.8.8:53 | 238.187.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 6pi3jrqjbssfh6gu.onion.pw | udp |
| US | 144.202.70.158:80 | 6pi3jrqjbssfh6gu.onion.pw | tcp |
| US | 8.8.8.8:53 | 158.70.202.144.in-addr.arpa | udp |
| US | 8.8.8.8:53 | blockchain.info | udp |
| US | 104.16.236.243:443 | blockchain.info | tcp |
| US | 8.8.8.8:53 | 243.236.16.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 144.202.70.158:80 | 6pi3jrqjbssfh6gu.onion.pw | tcp |
| US | 8.8.8.8:53 | www.blockchain.com | udp |
| US | 104.17.11.85:443 | www.blockchain.com | tcp |
| US | 144.202.70.158:443 | 6pi3jrqjbssfh6gu.onion.pw | tcp |
| US | 8.8.8.8:53 | 85.11.17.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | r10.i.lencr.org | udp |
| BO | 200.119.204.12:9999 | tcp | |
| US | 95.100.195.186:80 | r10.i.lencr.org | tcp |
| BO | 200.119.204.12:9999 | tcp | |
| US | 8.8.8.8:53 | 186.195.100.95.in-addr.arpa | udp |
| US | 8.8.8.8:53 | jaster.in | udp |
| US | 8.8.8.8:53 | ip-addr.es | udp |
| FR | 188.165.164.184:80 | ip-addr.es | tcp |
| US | 8.8.8.8:53 | 184.164.165.188.in-addr.arpa | udp |
| FR | 188.165.164.184:443 | ip-addr.es | tcp |
| US | 184.164.136.134:80 | tcp | |
| N/A | 10.127.0.1:445 | tcp | |
| US | 8.8.8.8:53 | 125.21.192.23.in-addr.arpa | udp |
| N/A | 10.127.0.1:445 | tcp | |
| N/A | 10.127.0.1:445 | tcp | |
| NL | 20.190.160.14:445 | login.live.com | tcp |
| US | 199.232.210.172:445 | ctldl.windowsupdate.com | tcp |
| N/A | 10.127.0.1:139 | tcp | |
| GB | 142.250.187.238:445 | google.com | tcp |
| GB | 2.23.210.83:445 | ctldl.windowsupdate.com | tcp |
| N/A | 10.127.0.1:139 | tcp | |
| NL | 20.190.160.14:139 | login.live.com | tcp |
| US | 199.232.210.172:139 | ctldl.windowsupdate.com | tcp |
| DE | 131.188.40.189:443 | tcp | |
| N/A | 10.127.0.1:139 | tcp | |
| GB | 142.250.187.238:139 | google.com | tcp |
| GB | 2.23.210.83:139 | ctldl.windowsupdate.com | tcp |
| US | 8.8.8.8:53 | 189.40.188.131.in-addr.arpa | udp |
| US | 8.8.8.8:53 | r10.o.lencr.org | udp |
| GB | 2.18.190.80:80 | r10.o.lencr.org | tcp |
| US | 8.8.8.8:53 | 80.190.18.2.in-addr.arpa | udp |
| BO | 190.186.45.170:9999 | tcp | |
| US | 8.8.8.8:53 | arizonacode.bplaced.net | udp |
| BO | 190.186.45.170:9999 | tcp | |
| DE | 162.55.0.137:80 | arizonacode.bplaced.net | tcp |
| BO | 200.87.164.69:9999 | tcp | |
| FR | 94.247.28.26:2525 | tcp | |
| GB | 142.250.187.238:80 | google.com | tcp |
| US | 144.202.70.158:80 | 6pi3jrqjbssfh6gu.onion.pw | tcp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 137.0.55.162.in-addr.arpa | udp |
| US | 144.202.70.158:443 | 6pi3jrqjbssfh6gu.onion.pw | tcp |
| GB | 142.250.187.238:80 | google.com | tcp |
| US | 95.100.195.186:445 | r10.i.lencr.org | tcp |
| FI | 37.27.61.180:445 | tcp | |
| US | 95.100.195.186:139 | r10.i.lencr.org | tcp |
| BO | 200.87.164.69:9999 | tcp | |
| GB | 142.250.187.238:80 | google.com | tcp |
| US | 144.202.70.158:445 | 6pi3jrqjbssfh6gu.onion.pw | tcp |
| FI | 37.27.61.180:139 | tcp | |
| US | 144.202.70.158:139 | 6pi3jrqjbssfh6gu.onion.pw | tcp |
| US | 8.8.8.8:53 | jaster.in | udp |
| US | 8.8.8.8:53 | synlogosttloeq2pwb4w6zaibacubnedji46bmsd3mhapesyeqa4xpqd.onion | udp |
| US | 8.8.8.8:53 | wtepgfycbrqjavn.net | udp |
| GB | 142.250.187.238:80 | google.com | tcp |
| BO | 200.87.164.69:9999 | tcp | |
| DE | 162.55.0.137:80 | arizonacode.bplaced.net | tcp |
| US | 8.8.8.8:53 | xefgknfqqwlnacj.biz | udp |
| BO | 200.119.204.12:9999 | tcp | |
| FR | 94.247.31.19:8080 | tcp |
Files
memory/4764-0-0x00007FFDBCAD3000-0x00007FFDBCAD5000-memory.dmp
memory/4764-1-0x0000000000CA0000-0x0000000001CA0000-memory.dmp
C:\Users\Admin\AppData\Roaming\Avoid.exe
| MD5 | 20d2c71d6d9daf4499ffc4a5d164f1c3 |
| SHA1 | 38e5dcd93f25386d05a34a5b26d3fba1bf02f7c8 |
| SHA256 | 3ac8cc58dcbceaec3dab046aea050357e0e2248d30b0804c738c9a5b037c220d |
| SHA512 | 8ffd56fb3538eb60da2dde9e3d6eee0dac8419c61532e9127f47c4351b6e53e01143af92b2e26b521e23cdbbf15d7a358d3757431e572e37a1eede57c7d39704 |
C:\Users\Admin\AppData\Roaming\ChilledWindows.exe
| MD5 | 6a4853cd0584dc90067e15afb43c4962 |
| SHA1 | ae59bbb123e98dc8379d08887f83d7e52b1b47fc |
| SHA256 | ccb9502bf8ba5becf8b758ca04a5625c30b79e2d10d2677cc43ae4253e1288ec |
| SHA512 | feb223e0de9bd64e32dc4f3227e175b58196b5e614bca8c2df0bbca2442a564e39d66bcd465154149dc7ebbd3e1ca644ed09d9a9174b52236c76e7388cb9d996 |
C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe
| MD5 | bc1e7d033a999c4fd006109c24599f4d |
| SHA1 | b927f0fc4a4232a023312198b33272e1a6d79cec |
| SHA256 | 13adae722719839af8102f98730f3af1c5a56b58069bfce8995acd2123628401 |
| SHA512 | f5d9b8c1fd9239894ec9c075542bff0bcef79871f31038e627ae257b8c1db9070f4d124448a78e60ccc8bc12f138102a54825e9d7647cd34832984c7c24a6276 |
C:\Users\Admin\AppData\Roaming\CrazyNCS.exe
| MD5 | d043ba91e42e0d9a68c9866f002e8a21 |
| SHA1 | e9f177e1c57db0a15d1dc6b3e6c866d38d85b17c |
| SHA256 | 6820c71df417e434c5ad26438c901c780fc5a80b28a466821b47d20b8424ef08 |
| SHA512 | 3e9783646e652e9482b3e7648fb0a5f7c8b6c386bbc373d5670d750f6f99f6137b5501e21332411609cbcc0c20f829ab8705c2835e2756455f6754c9975ac6bd |
C:\Users\Admin\AppData\Roaming\DesktopBoom.exe
| MD5 | f0a661d33aac3a3ce0c38c89bec52f89 |
| SHA1 | 709d6465793675208f22f779f9e070ed31d81e61 |
| SHA256 | c20e78ce9028299d566684d35b1230d055e5ea0e9b94d0aff58f650e0468778a |
| SHA512 | 57cdb3c38f2e90d03e6dc1f9d8d1131d40d3919f390bb1783343c82465461319e70483dc3cd3efdbd9a62dfc88d74fc706f05d760ffd8506b16fd7686e414443 |
C:\Users\Admin\AppData\Roaming\Curfun.exe
| MD5 | 0b3b2dff5503cb032acd11d232a3af55 |
| SHA1 | 6efc31c1d67f70cf77c319199ac39f70d5a7fa95 |
| SHA256 | ef878461a149024f3065121ff4e165731ecabef1b94b0b3ed2eda010ad39202b |
| SHA512 | 484014d65875e706f7e5e5f54c2045d620e5cce5979bf7f37b45c613e6d948719c0b8e466df5d8908706133ce4c4b71a11b804417831c9dbaf72b6854231ea17 |
C:\Users\Admin\AppData\Roaming\Flasher.exe
| MD5 | 9254ca1da9ff8ad492ca5fa06ca181c6 |
| SHA1 | 70fa62e6232eae52467d29cf1c1dacb8a7aeab90 |
| SHA256 | 30676ad5dc94c3fec3d77d87439b2bf0a1aaa7f01900b68002a06f11caee9ce6 |
| SHA512 | a84fbbdea4e743f3e41878b9cf6db219778f1479aa478100718af9fc8d7620fc7a3295507e11df39c7863cb896f946514e50368db480796b6603c8de5580685a |
memory/1448-79-0x000000001C320000-0x000000001C7EE000-memory.dmp
C:\Users\Admin\AppData\Roaming\Hydra.exe
| MD5 | b2eca909a91e1946457a0b36eaf90930 |
| SHA1 | 3200c4e4d0d4ece2b2aadb6939be59b91954bcfa |
| SHA256 | 0b6c0af51cde971b3e5f8aa204f8205418ab8c180b79a5ac1c11a6e0676f0f7c |
| SHA512 | 607d20e4a46932c7f4d9609ef9451e2303cd79e7c4778fe03f444e7dc800d6de7537fd2648c7c476b9f098588dc447e8c39d8b21cd528d002dfa513a19c6ebbf |
memory/1448-69-0x000000001BDA0000-0x000000001BE46000-memory.dmp
memory/1448-58-0x00000000017F0000-0x0000000001800000-memory.dmp
memory/1476-54-0x00007FFDBCAD0000-0x00007FFDBD591000-memory.dmp
memory/1476-52-0x00000000009E0000-0x0000000000E44000-memory.dmp
C:\Users\Admin\AppData\Roaming\Launcher.exe
| MD5 | 7506eb94c661522aff09a5c96d6f182b |
| SHA1 | 329bbdb1f877942d55b53b1d48db56a458eb2310 |
| SHA256 | d5b962dfe37671b5134f0b741a662610b568c2b5374010ee92b5b7857d87872c |
| SHA512 | d815a9391ef3d508b89fc221506b95f4c92d586ec38f26aec0f239750f34cf398eed3d818fa439f6aa6ed3b30f555a1903d93eeeec133b80849a4aa6685ec070 |
memory/1448-96-0x000000001C900000-0x000000001C99C000-memory.dmp
C:\Users\Admin\AppData\Roaming\Melting.exe
| MD5 | 833619a4c9e8c808f092bf477af62618 |
| SHA1 | b4a0efa26f790e991cb17542c8e6aeb5030d1ebf |
| SHA256 | 92a284981c7ca33f1af45ce61738479fbcbb5a4111f5498e2cb54931c8a36c76 |
| SHA512 | 4f231fc16339d568b5cf9353133aeae835eb262dab68bc80d92f37b43df64dce4fae0e913cbaa3bb61351a759aeecf9d280bc5779b0853c980559a654d6cca11 |
memory/1448-140-0x000000001CA60000-0x000000001CAAC000-memory.dmp
C:\Users\Admin\AppData\Roaming\Time.exe
| MD5 | 9d0d2fcb45b1ff9555711b47e0cd65e5 |
| SHA1 | 958f29a99cbb135c92c5d1cdffb9462be35ee9fd |
| SHA256 | dc476ae39effdd80399b6e36f1fde92c216a5bbdb6b8b2a7ecbe753e91e4c993 |
| SHA512 | 8fd4ce4674cd52a3c925149945a7a50a139302be17f6ee3f30271ebe1aa6d92bcb15a017dca989cd837a5d23cd56eaacc6344dc7730234a4629186976c857ca9 |
memory/1064-158-0x0000000004D30000-0x0000000004DC2000-memory.dmp
C:\Users\Admin\AppData\Roaming\ScreenScrew.exe
| MD5 | e87a04c270f98bb6b5677cc789d1ad1d |
| SHA1 | 8c14cb338e23d4a82f6310d13b36729e543ff0ca |
| SHA256 | e03520794f00fb39ef3cfff012f72a5d03c60f89de28dbe69016f6ed151b5338 |
| SHA512 | 8784f4d42908e54ecedfb06b254992c63920f43a27903ccedd336daaeed346db44e1f40e7db971735da707b5b32206be1b1571bc0d6a2d6eb90bbf9d1f69de13 |
C:\Users\Admin\AppData\Roaming\Trololo.exe
| MD5 | b6d61b516d41e209b207b41d91e3b90d |
| SHA1 | e50d4b7bf005075cb63d6bd9ad48c92a00ee9444 |
| SHA256 | 3d0efd55bde5fb7a73817940bac2a901d934b496738b7c5cab7ea0f6228e28fe |
| SHA512 | 3217fc904e4c71b399dd273786634a6a6c19064a9bf96960df9b3357001c12b9547813412173149f6185eb5d300492d290342ec955a8347c6f9dcac338c136da |
C:\Users\Admin\AppData\Roaming\Vista.exe
| MD5 | faa6cb3e816adaeaabf2930457c79c33 |
| SHA1 | 6539de41b48d271bf4237e6eb09b0ee40f9a2140 |
| SHA256 | 6680317e6eaa04315b47aaadd986262cd485c8a4bd843902f4c779c858a3e31b |
| SHA512 | 58859556771203d736ee991b651a6a409de7e3059c2afe81d4545864295c383f75cfbabf3cffaa0c412a6ec27bf939f0893c28152f53512c7885e597db8d2c66 |
C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe
| MD5 | 6e49c75f701aa059fa6ed5859650b910 |
| SHA1 | ccb7898c509c3a1de96d2010d638f6a719f6f400 |
| SHA256 | f91f02fd27ada64f36f6df59a611fef106ff7734833dea825d0612e73bdfb621 |
| SHA512 | ccd1b581a29de52d2313a97eb3c3b32b223dba1e7a49c83f7774b374bc2d16b13fba9566de6762883f3b64ed8e80327b454e5d32392af2a032c22653fed0fff8 |
C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe
| MD5 | 515198a8dfa7825f746d5921a4bc4db9 |
| SHA1 | e1da0b7f046886c1c4ff6993f7f98ee9a1bc90ae |
| SHA256 | 0fda176b199295f72fafc3bc25cefa27fa44ed7712c3a24ca2409217e430436d |
| SHA512 | 9e47037fe40b79ebf056a9c6279e318d85da9cd7e633230129d77a1b8637ecbafc60be38dd21ca9077ebfcb9260d87ff7fcc85b8699b3135148fe956972de3e8 |
memory/1476-217-0x000000001EFD0000-0x000000001EFD8000-memory.dmp
memory/2944-225-0x0000000000400000-0x00000000006BC000-memory.dmp
C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe
| MD5 | e263c5b306480143855655233f76dc5a |
| SHA1 | e7dcd6c23c72209ee5aa0890372de1ce52045815 |
| SHA256 | 1f69810b8fe71e30a8738278adf09dd982f7de0ab9891d296ce7ea61b3fa4f69 |
| SHA512 | e95981eae02d0a8bf44493c64cca8b7e50023332e91d75164735a1d0e38138f358100c93633ff3a0652e1c12a5155cba77d81e01027422d7d5f71000eafb4113 |
C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe
| MD5 | bd65d387482def1fe00b50406f731763 |
| SHA1 | d06a2ba2e29228f443f97d1dd3a8da5dd7df5903 |
| SHA256 | 1ab7375550516d7445c47fd9b551ed864f227401a14ff3f1ff0d70caca3bd997 |
| SHA512 | 351ecd109c4d49bc822e8ade73a9516c4a531ebcda63546c155e677dcff19708068dc588b2fcf30cad086238e8b206fc5f349d37dda02d3c3a8d9b570d92e4d9 |
C:\Users\Admin\AppData\Roaming\RedBoot.exe
| MD5 | e0340f456f76993fc047bc715dfdae6a |
| SHA1 | d47f6f7e553c4bc44a2fe88c2054de901390b2d7 |
| SHA256 | 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887 |
| SHA512 | cac10c675d81630eefca49b2ac4cc83f3eb29115ee28a560db4d6c33f70bf24980e48bb48ce20375349736e3e6b23a1ca504b9367917328853fffc5539626bbc |
memory/2292-248-0x00000000049B0000-0x0000000004A4C000-memory.dmp
memory/2292-250-0x0000000004D30000-0x0000000004D86000-memory.dmp
memory/2292-247-0x0000000000090000-0x0000000000102000-memory.dmp
memory/2444-252-0x00000000005C0000-0x000000000084E000-memory.dmp
memory/1476-242-0x000000001F030000-0x000000001F03E000-memory.dmp
memory/1476-241-0x000000001F060000-0x000000001F098000-memory.dmp
C:\Users\Admin\AppData\Roaming\RedEye.exe
| MD5 | e9e5596b42f209cc058b55edc2737a80 |
| SHA1 | f30232697b3f54e58af08421da697262c99ec48b |
| SHA256 | 9ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305 |
| SHA512 | e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7 |
C:\Users\Admin\AppData\Roaming\Rensenware.exe
| MD5 | 60335edf459643a87168da8ed74c2b60 |
| SHA1 | 61f3e01174a6557f9c0bfc89ae682d37a7e91e2e |
| SHA256 | 7bf5623f0a10dfa148a35bebd899b7758612f1693d2a9910f716cf15a921a76a |
| SHA512 | b4e5e4d4f0b4a52243d6756c66b4fe6f4b39e64df7790072046e8a3dadad3a1be30b8689a1bab8257cc35cb4df652888ddf62b4e1fccb33e1bbf1f5416d73efb |
C:\Users\Admin\42355084\protect.exe
| MD5 | fd414666a5b2122c3d9e3e380cf225ed |
| SHA1 | de139747b42a807efa8a2dcc1a8304f9a29b862d |
| SHA256 | e61a8382f7293e40cb993ddcbcaa53a4e5f07a3d6b6a1bfe5377a1a74a8dcac6 |
| SHA512 | 9ab2163d7deff29c202ed88dba36d5b28f6c67e647a0cadb3d03cc725796e19e5f298c04b1c8523d1d1ee4307e1a5d6f8156fa4021627d6ca1bbd0830695ae05 |
C:\Users\Admin\AppData\Roaming\Rokku.exe
| MD5 | 97512f4617019c907cd0f88193039e7c |
| SHA1 | 24cfa261ee30f697e7d1e2215eee1c21eebf4579 |
| SHA256 | 438888ef36bad1079af79daf152db443b4472c5715a7b3da0ba24cc757c53499 |
| SHA512 | cfbb8dd91434f917d507cb919aa7e6b16b7b2056d56185f6ad5b6149e05629325cdb3df907f58bb3f634b17a9989bf5b6d6b81f5396a3a556431742ed742ac4a |
C:\Users\Admin\AppData\Roaming\Satana.exe
| MD5 | 46bfd4f1d581d7c0121d2b19a005d3df |
| SHA1 | 5b063298bbd1670b4d39e1baef67f854b8dcba9d |
| SHA256 | 683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96 |
| SHA512 | b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5 |
C:\Users\Admin\AppData\Roaming\satan.exe
| MD5 | c9c341eaf04c89933ed28cbc2739d325 |
| SHA1 | c5b7d47aef3bd33a24293138fcba3a5ff286c2a8 |
| SHA256 | 1a0a2fd546e3c05e15b2db3b531cb8e8755641f5f1c17910ce2fb7bbce2a05b7 |
| SHA512 | 7cfa6ec0be0f5ae80404c6c709a6fd00ca10a18b6def5ca746611d0d32a9552f7961ab0ebf8a336b27f7058d700205be7fcc859a30d7d185aa9457267090f99b |
C:\Users\Admin\42355084\assembler.exe
| MD5 | 7e3cea1f686207563c8369f64ea28e5b |
| SHA1 | a1736fd61555841396b0406d5c9ca55c4b6cdf41 |
| SHA256 | 2a5305369edb9c2d7354b2f210e91129e4b8c546b0adf883951ea7bf7ee0f2b2 |
| SHA512 | 4629bc32094bdb030e6c9be247068e7295599203284cb95921c98fcbe3ac60286670be7e5ee9f0374a4017286c7af9db211bd831e3ea871d31a509d7bbc1d6a3 |
memory/920-331-0x0000027A72540000-0x0000027A72FDC000-memory.dmp
memory/3332-345-0x0000000000400000-0x0000000000412000-memory.dmp
C:\Users\Admin\AppData\Roaming\SporaRansomware.exe
| MD5 | 4a4a6d26e6c8a7df0779b00a42240e7b |
| SHA1 | 8072bada086040e07fa46ce8c12bf7c453c0e286 |
| SHA256 | 7ad9ed23a91643b517e82ad5740d24eca16bcae21cfe1c0da78ee80e0d1d3f02 |
| SHA512 | c7a7b15d8dbf8e8f8346a4dab083bb03565050281683820319906da4d23b97b39e88f841b30fc8bd690c179a8a54870238506ca60c0f533d34ac11850cdc1a95 |
C:\Users\Admin\AppData\Roaming\Olza\gohix.exe
| MD5 | 2fc045985c02043baa02df691a6edd87 |
| SHA1 | f17350f693b09a67f8e6c645a2298cae2d620fee |
| SHA256 | 8236699ec1d4031ae589329887e0852177b6f430469917f2c8e16ec709cbfac3 |
| SHA512 | 530cdeba7c74b7fb8f5a0234ce72314b85656e92a5cfe4afb41a33168a90f7e887f91630ddf2f72d981e2c5cea78727b041e8685948347bac557aed841099f62 |
memory/1336-373-0x0000000000400000-0x0000000000407200-memory.dmp
C:\Users\Admin\AppData\Roaming\WannaCry.exe
| MD5 | 5c7fb0927db37372da25f270708103a2 |
| SHA1 | 120ed9279d85cbfa56e5b7779ffa7162074f7a29 |
| SHA256 | be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844 |
| SHA512 | a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206 |
C:\Users\Admin\AppData\Roaming\ViraLock.exe
| MD5 | 8803d517ac24b157431d8a462302b400 |
| SHA1 | b56afcad22e8cda4d0e2a98808b8e8c5a1059d4e |
| SHA256 | 418395efd269bc6534e02c92cb2c568631ada6e54bc55ade4e4a5986605ff786 |
| SHA512 | 38fdfe0bc873e546b05a8680335526eec61ccc8cf3f37c60eee0bc83ec54570077f1dc1da26142488930eabcc21cb7a33c1b545a194cbfb4c87e430c4b2bfb50 |
C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe
| MD5 | 84c82835a5d21bbcf75a61706d8ab549 |
| SHA1 | 5ff465afaabcbf0150d1a3ab2c2e74f3a4426467 |
| SHA256 | ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa |
| SHA512 | 90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244 |
memory/2956-455-0x0000000000FF0000-0x00000000010FB000-memory.dmp
memory/2956-447-0x0000000000E20000-0x0000000000EBB000-memory.dmp
memory/3236-401-0x0000000000400000-0x0000000000432000-memory.dmp
memory/1128-468-0x0000023704160000-0x0000023704177000-memory.dmp
memory/212-486-0x00000000021B0000-0x00000000021C7000-memory.dmp
C:\Users\Admin\AppData\Roaming\Xyeta.exe
| MD5 | 9d15a3b314600b4c08682b0202700ee7 |
| SHA1 | 208e79cdb96328d5929248bb8a4dd622cf0684d1 |
| SHA256 | 3ab3833e31e4083026421c641304369acfd31b957b78af81f3c6ef4968ef0e15 |
| SHA512 | 9916397b782aaafa68eb6a781ea9a0db27f914035dd586142c818ccbd7e69036896767bedba97489d5100de262a554cf14bcdf4a24edda2c5d37217b265398d3 |
memory/5912-618-0x0000000000400000-0x000000000044F000-memory.dmp
C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\decoder.dll
| MD5 | 3531cf7755b16d38d5e9e3c43280e7d2 |
| SHA1 | 19981b17ae35b6e9a0007551e69d3e50aa1afffe |
| SHA256 | 76133e832c15aa5cbc49fb3ba09e0b8dd467c307688be2c9e85e79d3bf62c089 |
| SHA512 | 7b053ba2cf92ef2431b98b2a06bd56340dad94de36d11e326a80cd61b9acb378ac644ac407cf970f4ef8333b8d3fb4ff40b18bb41ec5aee49d79a6a2adcf28fd |
C:\Users\Admin\AppData\Roaming\7ev3n.exe
| MD5 | 9f8bc96c96d43ecb69f883388d228754 |
| SHA1 | 61ed25a706afa2f6684bb4d64f69c5fb29d20953 |
| SHA256 | 7d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5 |
| SHA512 | 550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6 |
C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi
| MD5 | 27bc9540828c59e1ca1997cf04f6c467 |
| SHA1 | bfa6d1ce9d4df8beba2bedf59f86a698de0215f3 |
| SHA256 | 05c18698c3dc3b2709afd3355ad5b91a60b2121a52e5fcc474e4e47fb8e95e2a |
| SHA512 | a3ae822116cddb52d859de7ffc958541bb47c355a835c5129aade9cc0e5fba3ff25387061deb5b55b5694a535f09fe8669485282eb6e7c818cc7092eb3392848 |
C:\Users\Admin\AppData\Roaming\Annabelle.exe
| MD5 | 62c174d3fbf0855fc55177f4e8248a1b |
| SHA1 | 9983467382641159412a29a39fc942c55c826f49 |
| SHA256 | 6d5bafb5f97a71ce226c2083d6769cca955500af73d056087c9f52e5abb4560c |
| SHA512 | 9315c8ada8d5a4852c464948fd6a99b64369ad01eb47e9b6836a8f763aa09378fc5a9c6ac6f8d88abacf005985d6773cc7a31b528df4965cda3b00776920d98b |
memory/2444-650-0x00000000005C0000-0x000000000084E000-memory.dmp
memory/6020-632-0x0000000000DD0000-0x0000000000E3E000-memory.dmp
C:\Users\Admin\AppData\Roaming\@[email protected]
| MD5 | f97d2e6f8d820dbd3b66f21137de4f09 |
| SHA1 | 596799b75b5d60aa9cd45646f68e9c0bd06df252 |
| SHA256 | 0e5ece918132a2b1a190906e74becb8e4ced36eec9f9d1c70f5da72ac4c6b92a |
| SHA512 | efda21d83464a6a32fdeef93152ffd32a648130754fdd3635f7ff61cc1664f7fc050900f0f871b0ddd3a3846222bf62ab5df8eed42610a76be66fff5f7b4c4c0 |
memory/3372-707-0x0000000000400000-0x000000000058D000-memory.dmp
C:\Users\Admin\AppData\Roaming\@[email protected]
| MD5 | 7bf2b57f2a205768755c07f238fb32cc |
| SHA1 | 45356a9dd616ed7161a3b9192e2f318d0ab5ad10 |
| SHA256 | b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25 |
| SHA512 | 91a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9 |
memory/376-805-0x0000000000400000-0x0000000000432000-memory.dmp
memory/376-828-0x0000000000400000-0x0000000000432000-memory.dmp
memory/920-956-0x0000027A75510000-0x0000027A76526000-memory.dmp
memory/5408-957-0x000002006A360000-0x000002006B354000-memory.dmp
C:\Users\Admin\AppData\Roaming\Cerber5.exe
| MD5 | fe1bc60a95b2c2d77cd5d232296a7fa4 |
| SHA1 | c07dfdea8da2da5bad036e7c2f5d37582e1cf684 |
| SHA256 | b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d |
| SHA512 | 266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89 |
memory/920-1018-0x0000027A733B0000-0x0000027A733B6000-memory.dmp
memory/3744-1023-0x0000000000400000-0x0000000000438000-memory.dmp
C:\Users\Admin\AppData\Roaming\DeriaLock.exe
| MD5 | 0a7b70efba0aa93d4bc0857b87ac2fcb |
| SHA1 | 01a6c963b2f5f36ff21a1043587dcf921ae5f5cd |
| SHA256 | 4f5bff64160044d9a769ab277ff85ba954e2a2e182c6da4d0672790cf1d48309 |
| SHA512 | 2033f9637b8d023242c93f54c140dd561592a3380a15a9fdc8ebfa33385ff4fc569d66c846a01b4ac005f0521b3c219e87f4b1ed2a83557f9d95fa066ad25e14 |
memory/4204-1113-0x0000000000400000-0x000000000056F000-memory.dmp
memory/4552-1156-0x0000000000110000-0x0000000000192000-memory.dmp
C:\Users\Admin\AppData\Roaming\Dharma.exe
| MD5 | 14c828927d4b46b94dd086a8f338f6a5 |
| SHA1 | 4e73ea9f3e97c7e8c086c7bde71cb992b0d9aee5 |
| SHA256 | b210f1456ae00c1f861e502d7f82ebd40f9308cad2d58ce6b7f76c3885f6c7c3 |
| SHA512 | 81cbd07408ea71d87bdb954babac529a00e2733eac1e540e304f722aa8a1106ca59654a818c6a318a77cb1d6d5c2951c7f2e79e70879182a86078e8db9d92157 |
memory/2076-1430-0x0000000000400000-0x0000000000432000-memory.dmp
C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe
| MD5 | 63210f8f1dde6c40a7f3643ccf0ff313 |
| SHA1 | 57edd72391d710d71bead504d44389d0462ccec9 |
| SHA256 | 2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f |
| SHA512 | 87a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11 |
C:\Users\Admin\AppData\Roaming\NotPetya.exe
| MD5 | 5b7e6e352bacc93f7b80bc968b6ea493 |
| SHA1 | e686139d5ed8528117ba6ca68fe415e4fb02f2be |
| SHA256 | 63545fa195488ff51955f09833332b9660d18f8afb16bdf579134661962e548a |
| SHA512 | 9d24af0cb00fb8a5e61e9d19cd603b5541a22ae6229c2acf498447e0e7d4145fee25c8ab9d5d5f18f554e6cbf8ca56b7ca3144e726d7dfd64076a42a25b3dfb6 |
memory/6200-1644-0x00000000049B0000-0x00000000049E2000-memory.dmp
C:\Users\Admin\AppData\Roaming\USAD2-54HTZ-TZTXH-TFTZY.LST
| MD5 | ec778ad3d2589b8a55ef658592dc7591 |
| SHA1 | 8c834da8e9ee489a3afeaf26636102bd41b8b9de |
| SHA256 | 078dc6766d800c38ff40eb14977d96dee71fb8298b416c454e50b238d41366e4 |
| SHA512 | 1f532197af6fa33f68baa8118f98d2525cc6d8e6fc87368138386b8c83d3733c4c8ce1007526563d0a121adc52294cda4b88b0ceb3da91582c19f03ef79003b6 |
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{925951D7-4C16-4987-8C2E-58EF01B1BCD4}.session
| MD5 | 10fc0ebe242b5a816051d93176b98c18 |
| SHA1 | cbe6511aa5a58280c49d4c82b7955d60a2ee7b2d |
| SHA256 | 2d4e5f1543c3d268c58c9258215ed227b11d30f0af45c3af25ffb2ad31eb8bc0 |
| SHA512 | adfc88db67f9d34766cb92eaa892dd06f6399db1f9604a46e1559229e8d55fe7c3ab168496c4f9248768f4079f4c86727d0bbdc8318d7d5bddb346c33179078e |
C:\Users\Admin\AppData\Roaming\USAD2-54HTZ-TZTXH-TFTZY.HTML
| MD5 | deaaf086dd1052538305a0ecd24225b2 |
| SHA1 | 6f8ecfe97dc210b976c28bb9782192c57b27fecb |
| SHA256 | 66f18b2a083c4e89b598f915307f989ef0c7be61011cf64409cfc2fa59a70189 |
| SHA512 | a3029c88e7a03ff7a56e9f1f98abbd82aee41b7a6098016114e4150f61562a7bfd68792ce8d1fe4e5ccab55aacc46d4a000b01be266be674f67997e3aa8dcec3 |
C:\Users\Admin\Documents\ReadReset.ppsm.WNCRY.locked
| MD5 | 553dda8f9d6b50d4b2087d9b908e5ac5 |
| SHA1 | b5f9dbf4646ab7aea0fdadd4ce6e528b96f5a57b |
| SHA256 | 8288480cd94c59fce9ac64396943716caf1d0d20b21e459fed07abc490117909 |
| SHA512 | 5c9a0d9e19ef8cc5994957b947cf8a6b0cc3997ea7f0535bed223866d7ccd26622ac1a9e72d46802af81b30fb204f5b4d36ff96158afa5e13b7feab89e7c1eb4 |
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\tracking.ini
| MD5 | d6fd28eac341342fe37568de91fd573e |
| SHA1 | f55105eff1482ef66b2ec7a1d94ace78d2528dbe |
| SHA256 | ebee7c5ed5a5fa597ea299d22aa7ad61df0dc258afe03b58b52da46f75f6aad9 |
| SHA512 | 38cac53af3c9a10e0eb79ca53473a16bb2fb02b13305d5b5952642247835cd760f657ec074dd9af9813015ddb33d215600289b1207da4f9af336647c9c1aecfd |
memory/7620-2803-0x0000000000400000-0x0000000000432000-memory.dmp
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.2BEAD9CFC7E2258C33225CBC4710820119A0810F043852923177A88F79346476
| MD5 | 9ed6a4e10338e0264d3323400cef8939 |
| SHA1 | 0bf318308a192e317ec78a152e0535e9967d563f |
| SHA256 | a9326a8269c54f52a9bb0e00506b9e71caba0ae83563b58c7f1e91094502862f |
| SHA512 | 40cbeb0619288a35a541e3788bed334b47b662be8939c9a44d9a1e526fa7f0026ce73a0e5361e36bcd18828b32b82af943276fb93b5e58d457fdfab30f0d636d |
C:\$Recycle.Bin\S-1-5-21-3756129449-3121373848-4276368241-1000\HQUIB-MANUAL.txt
| MD5 | e3a98d2f1b933c53b849438b4856cb53 |
| SHA1 | 63376bda6412066c1282f5182880de3c70f103dc |
| SHA256 | 4fd901666b7f18c4dceed3b62ac27f0212513424a9315e244e24d603ce64ade6 |
| SHA512 | 25ce109efa97ea52093917ea5791957e2589ea9e0bf67b4b96f072c7a6b83d3659f6f080fd537fba02f73d4fd4606e1e82e3dae2338eec538ae891dc0ba34ff3 |
C:\Users\Admin\AppData\Local\Temp\ac\mssql2.exe
| MD5 | d0821dd66ddfb5e7acbc57eef54d7358 |
| SHA1 | b9519b0a8ea507e2c4b1b09d3cf755ee4c97c821 |
| SHA256 | 7b33c1db2cd01f831d108b72448280ef2bf9c1927782294f359917622871aba7 |
| SHA512 | c58d23611ebfb528345486c214d7598b5eee21a6118ed8aa83b70424179e2e571175fa6c79a24f009a0387419c225d14a0745724f12eae3513171970a90779fa |
C:\Program Files\7-Zip\7z.dll.id-35318BDF.[[email protected]].ncov
| MD5 | f7c9c13cc0dcd5ad7828d98342c73691 |
| SHA1 | 616fa58ed4bd53abe6a676ca51436c2c10a60459 |
| SHA256 | a0f9932b9f2f0922ba5aa518d2cae9a71a3a053d364d34e6cd9344aad1967f16 |
| SHA512 | 4d4d1749ca3ca6081b13d7b21ab918a5c365c6b844cbaa264561f00e39f18865eacacb1b353d6df3b57f79b068ba3e387d81b12a64a2fb2b598743fde735a053 |
memory/7752-7712-0x0000000000400000-0x0000000000B02000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ac\lydgkhimpjyhfmuy.sys
| MD5 | b2233d1efb0b7a897ea477a66cd08227 |
| SHA1 | 835a198a11c9d106fc6aabe26b9b3e59f6ec68fd |
| SHA256 | 5fd17e3b8827b5bb515343bc4066be0814f6466fb4294501becac284a378c0da |
| SHA512 | 6ca61854db877d767ce587ac3d7526cda8254d937a159fd985e0475d062d07ae83e7ff4f9f42c7e1e1cad5e1f408f6849866aa4e9e48b29d80510e5c695cee37 |
memory/17032-13235-0x0000000000400000-0x0000000000434000-memory.dmp
memory/47908-21330-0x0000000000400000-0x000000000042E000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | fff5429eb52f2b7a62d7b4fe7ab8da55 |
| SHA1 | c5b500bc2dcdfd5e0ff08ced32b67c2d3c2638ff |
| SHA256 | c24dc3fe792370d9ab360a409d9cfe4d826c08c2b0dd98073377341326d0a1fa |
| SHA512 | 97f815b35395236f2743d464496064e391d833bc7117faaa1f3c18cf45b9671ca02eb40392666273fb67b3b7edabac982b3112c7d4c025c6ce1d538b4da720e7 |
memory/7752-30259-0x0000000000400000-0x0000000000B02000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\SooE.exe
| MD5 | 298930e2d03e6744bc902c7ad63d8ff4 |
| SHA1 | 1999a7ada2842536a58c4e1e76cce8fba7355f47 |
| SHA256 | 844a47177a15644f1aa4412ec69c80b829fb543069fec3038fcc623c6c5830ed |
| SHA512 | 18a6ad16ef6ba02330fec807e1ff27211d32295c04b8fb672143a3e6ec666e7c268ecbf2812b3e985609974c9deafff16cb8393c69220f8687b6e7f41cf30c41 |
memory/20468-30450-0x0000000000400000-0x0000000000410000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\wIME.exe
| MD5 | e1ac74b091a004f52ddd69a494cbe1df |
| SHA1 | 51f621c82a548fb3b67be9ea1021a1ab7ffd9c17 |
| SHA256 | c70833df974b6f35b4604b2d9185a8ddf07b6fbf6e8d7f21e5f6e8481fe3d6d4 |
| SHA512 | f87323d749cc9d17c6fb6fe7a744696a7890d9f1ebd73bfe3730e8205fb825fb25717308852a608e7b1e72bcefb7c45d2f85f016e06083eece02a8b82695fae2 |
C:\Users\Admin\AppData\Local\Temp\OEwy.exe
| MD5 | 0f86946151484373ef6e9a343251b5eb |
| SHA1 | d7ec4f668744a2fd0b7124750404a23cd18642e6 |
| SHA256 | a9e5821a525d79e29b9416c03a9f77fe6b2b6b969b4169e31fc2639b4dc73312 |
| SHA512 | aeb21214ff9427a5d7c6f76fee60de43a15772028045f5a83162ba5b77ecd814af530611c0513896f6b449a27c4b947ae9f40ec3ccd489c11557b77308ca2d89 |
C:\Users\Admin\AppData\Roaming\Heap41A.exe
| MD5 | 4f30003916cc70fca3ce6ec3f0ff1429 |
| SHA1 | 7a12afdc041a03da58971a0f7637252ace834353 |
| SHA256 | 746153871f816ece357589b2351818e449b1beecfb21eb75a3305899ce9ae37c |
| SHA512 | e679a0f4b7292aedc9cd3a33cf150312ea0b1d712dd8ae8b719dedf92cc230330862f395e4f8da21c37d55a613d82a07d28b7fe6b5db6009ba8a30396caa5029 |
C:\Users\Admin\FqsUogEI\cOIEMksU.inf
| MD5 | 7985d2bf2c936965507122e10979a5b0 |
| SHA1 | 94e786006549ac8da07e3d34e7028fa23eda5870 |
| SHA256 | eb1ca20a8f8de24a214bebda418c9bcdc1f098f5c73280b6b546e1756ee8688e |
| SHA512 | 26d0a848ae18b24c55cb735ceeb7a590c4e08dba90e78d93572388cbc933677b47816089b0a6a8f7a7413446daf5524cfe53ee84c28e99fee8bba9cb1e9dfdc9 |
memory/15164-30547-0x0000000000400000-0x0000000000410000-memory.dmp
memory/4748-30559-0x0000000000400000-0x000000000042E000-memory.dmp
memory/556-30571-0x0000000000400000-0x0000000000434000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-12-02 09:16
Reported
2024-12-02 09:19
Platform
win7-20240903-en
Max time kernel
17s
Max time network
34s
Command Line
Signatures
Gandcrab
Gandcrab family
HawkEye
Hawkeye family
Modifies WinLogon for persistence
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\Xyeta.exe" | C:\Users\Admin\AppData\Roaming\Xyeta.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\Xyeta.exe" | C:\Users\Admin\AppData\Roaming\Xyeta.exe | N/A |
Satana
Satana family
Wannacry
Wannacry family
Deletes shadow copies
Renames multiple (272) files with added filename extension
Event Triggered Execution: Image File Execution Options Injection
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe | C:\Users\Admin\AppData\Roaming\Xyeta.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "calc.exe" | C:\Users\Admin\AppData\Roaming\Xyeta.exe | N/A |
ASPack v2.12-2.42
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Credentials from Password Stores: Windows Credential Manager
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9bf0c776.exe | C:\Windows\syswow64\explorer.exe | N/A |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\RFSDBRWMX-MANUAL.txt | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6b2043326b2044d56a.lock | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\US3AC-DAXFT-XTXTX-HTOHT-XYYYY.HTML | C:\Users\Admin\AppData\Roaming\SporaRansomware.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SDF8EB.tmp | C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SDF8FF.tmp | C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe | N/A |
Executes dropped EXE
Loads dropped DLL
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Reads user/profile data of web browsers
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*bf0c776 = "C:\\Users\\Admin\\AppData\\Roaming\\9bf0c776.exe" | C:\Windows\syswow64\explorer.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Update Task Scheduler = "\"C:\\Users\\Admin\\AppData\\Roaming\\WannaCry.exe\" /r" | C:\Users\Admin\AppData\Roaming\WannaCry.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\GmoEYggY.exe = "C:\\Users\\Admin\\wyskgMYs\\GmoEYggY.exe" | C:\Users\Admin\AppData\Roaming\ViraLock.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RQEcIwQg.exe = "C:\\ProgramData\\igIEgssk\\RQEcIwQg.exe" | C:\Users\Admin\AppData\Roaming\ViraLock.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\{3AA72D4F-4A3E-65F4-C3E9-D97C02965D68} = "C:\\Users\\Admin\\AppData\\Roaming\\Gona\\okgai.exe" | C:\Windows\system32\taskhost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\GmoEYggY.exe = "C:\\Users\\Admin\\wyskgMYs\\GmoEYggY.exe" | C:\Users\Admin\wyskgMYs\GmoEYggY.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*bf0c77 = "C:\\9bf0c776\\9bf0c776.exe" | C:\Windows\syswow64\explorer.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\9bf0c776 = "C:\\Users\\Admin\\AppData\\Roaming\\9bf0c776.exe" | C:\Windows\syswow64\explorer.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RQEcIwQg.exe = "C:\\ProgramData\\igIEgssk\\RQEcIwQg.exe" | C:\ProgramData\igIEgssk\RQEcIwQg.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\erexru = "C:\\Users\\Admin\\AppData\\Local\\Temp\\!satana!.txt" | C:\Users\Admin\AppData\Roaming\Satana.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\9bf0c77 = "C:\\9bf0c776\\9bf0c776.exe" | C:\Windows\syswow64\explorer.exe | N/A |
Enumerates connected drives
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ip-addr.es | N/A | N/A |
| N/A | myexternalip.com | N/A | N/A |
System Binary Proxy Execution: Verclsid
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\verclsid.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\verclsid.exe | N/A |
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PHYSICALDRIVE0 | C:\Users\Admin\AppData\Roaming\Seftad.exe | N/A |
AutoIT Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Sets desktop wallpaper using registry
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" | C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\taskhost.exe | N/A |
| N/A | N/A | C:\Windows\system32\Dwm.exe | N/A |
| N/A | N/A | C:\Windows\system32\taskhost.exe | N/A |
| N/A | N/A | C:\Windows\system32\Dwm.exe | N/A |
| N/A | N/A | C:\Windows\Explorer.EXE | N/A |
| N/A | N/A | C:\Windows\system32\taskhost.exe | N/A |
| N/A | N/A | C:\Windows\system32\Dwm.exe | N/A |
| N/A | N/A | C:\Windows\Explorer.EXE | N/A |
| N/A | N/A | C:\Windows\system32\taskhost.exe | N/A |
| N/A | N/A | C:\Windows\Explorer.EXE | N/A |
| N/A | N/A | C:\Windows\Explorer.EXE | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3032 set thread context of 888 | N/A | C:\Users\Admin\AppData\Roaming\satan.exe | C:\Users\Admin\AppData\Roaming\satan.exe |
| PID 2404 set thread context of 1792 | N/A | C:\Users\Admin\AppData\Roaming\Gona\okgai.exe | C:\Users\Admin\AppData\Roaming\Gona\okgai.exe |
| PID 1340 set thread context of 1816 | N/A | C:\Users\Admin\AppData\Roaming\Satana.exe | C:\Users\Admin\AppData\Roaming\Satana.exe |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Program Files\BlockResume.mhtml | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\UnpublishBackup.jpeg | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File created | C:\Program Files (x86)\6b2043326b2044d56a.lock | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File created | C:\Program Files (x86)\Microsoft SQL Server Compact Edition\RFSDBRWMX-MANUAL.txt | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File created | C:\Program Files (x86)\Microsoft SQL Server Compact Edition\6b2043326b2044d56a.lock | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File created | C:\Program Files\6b2043326b2044d56a.lock | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\EnterMount.vsdx | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\SkipResolve.3gp2 | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\StepReceive.php | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File created | C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6b2043326b2044d56a.lock | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\CloseClear.dwg | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\ConvertSelect.aif | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\ExitRemove.dib | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\HideRepair.rmi | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\LockPing.xlsb | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\PushSubmit.avi | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\RepairExport.wm | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\ResolveStop.sql | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\ShowDismount.odt | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\SuspendUnlock.ppsx | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\WatchEnable.zip | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\WatchHide.xla | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\WatchRestore.mp3 | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\ClearCheckpoint.vsd | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\EnterResume.xlsb | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\NewJoin.eps | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\SubmitRestart.htm | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\UnprotectStop.mpeg2 | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File created | C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\RFSDBRWMX-MANUAL.txt | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File created | C:\Program Files\RFSDBRWMX-MANUAL.txt | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\CompressTrace.tiff | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\GroupRequest.vsx | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\InvokeUnblock.rm | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\StopCompress.tiff | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\UnpublishUpdate.M2T | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\FormatBackup.mpg | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\FormatInvoke.pps | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\LockCopy.pps | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\ReadInvoke.mhtml | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\ConvertFromEnable.bmp | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\InitializeDisable.xml | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\RegisterDisconnect.vdx | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File created | C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\RFSDBRWMX-MANUAL.txt | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\RemoveHide.vssx | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File opened for modification | C:\Program Files\UnprotectLock.dotx | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File created | C:\Program Files (x86)\RFSDBRWMX-MANUAL.txt | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| File created | C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6b2043326b2044d56a.lock | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\perfc.dat | C:\Users\Admin\AppData\Roaming\NotPetya.exe | N/A |
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Cerber5.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\syswow64\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Launcher.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Hydra.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Avoid.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Vista.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\CryptoWall.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\attrib.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Popup.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\ScreenScrew.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\wyskgMYs\GmoEYggY.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\ProgramData\igIEgssk\RQEcIwQg.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\CoronaVirus.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\CryptoLocker.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\icacls.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\CrazyNCS.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Flasher.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Fantom.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Bezilom.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\ViraLock.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Satana.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\syswow64\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cscript.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\satan.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\WannaCry.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\satan.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Time.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\RedBoot.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\SporaRansomware.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\ViraLock.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\DeriaLock.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cscript.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Curfun.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Satana.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\$uckyLocker.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Birele.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Krotten.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\PowerPoint.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\Seftad.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier | C:\Users\Admin\AppData\Roaming\GandCrab.exe | N/A |
Interacts with shadow copies
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\vssadmin.exe | N/A |
| N/A | N/A | C:\Windows\syswow64\vssadmin.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\taskkill.exe | N/A |
Modifies registry key
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\CryptoWall.exe | N/A |
| N/A | N/A | C:\Windows\syswow64\explorer.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeSystemtimePrivilege | N/A | C:\Users\Admin\AppData\Roaming\Time.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe | N/A |
| Token: SeSystemtimePrivilege | N/A | C:\Users\Admin\AppData\Roaming\Krotten.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\Fantom.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Avoid.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Xyeta.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\ChilledWindows.exe | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Cerber5.exe | N/A |
Suspicious use of WriteProcessMemory
Views/modifies file attributes
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
Processes
C:\Windows\system32\taskhost.exe
"taskhost.exe"
C:\Windows\system32\Dwm.exe
"C:\Windows\system32\Dwm.exe"
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
C:\Users\Admin\AppData\Local\Temp\freehacks.exe
"C:\Users\Admin\AppData\Local\Temp\freehacks.exe"
C:\Users\Admin\AppData\Roaming\Avoid.exe
"C:\Users\Admin\AppData\Roaming\Avoid.exe"
C:\Users\Admin\AppData\Roaming\ChilledWindows.exe
"C:\Users\Admin\AppData\Roaming\ChilledWindows.exe"
C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe
"C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe"
C:\Users\Admin\AppData\Roaming\CrazyNCS.exe
"C:\Users\Admin\AppData\Roaming\CrazyNCS.exe"
C:\Users\Admin\AppData\Roaming\Curfun.exe
"C:\Users\Admin\AppData\Roaming\Curfun.exe"
C:\Users\Admin\AppData\Roaming\DesktopBoom.exe
"C:\Users\Admin\AppData\Roaming\DesktopBoom.exe"
C:\Users\Admin\AppData\Roaming\Flasher.exe
"C:\Users\Admin\AppData\Roaming\Flasher.exe"
C:\Users\Admin\AppData\Roaming\Hydra.exe
"C:\Users\Admin\AppData\Roaming\Hydra.exe"
C:\Users\Admin\AppData\Roaming\Launcher.exe
"C:\Users\Admin\AppData\Roaming\Launcher.exe"
C:\Users\Admin\AppData\Roaming\Melting.exe
"C:\Users\Admin\AppData\Roaming\Melting.exe"
C:\Users\Admin\AppData\Roaming\Popup.exe
"C:\Users\Admin\AppData\Roaming\Popup.exe"
C:\Users\Admin\AppData\Roaming\rickroll.exe
"C:\Users\Admin\AppData\Roaming\rickroll.exe"
C:\Users\Admin\AppData\Roaming\ScreenScrew.exe
"C:\Users\Admin\AppData\Roaming\ScreenScrew.exe"
C:\Users\Admin\AppData\Roaming\Time.exe
"C:\Users\Admin\AppData\Roaming\Time.exe"
C:\Users\Admin\AppData\Roaming\Trololo.exe
"C:\Users\Admin\AppData\Roaming\Trololo.exe"
C:\Users\Admin\AppData\Roaming\Vista.exe
"C:\Users\Admin\AppData\Roaming\Vista.exe"
C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe
"C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe"
C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe
"C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe"
C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe
"C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe"
C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe
"C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe"
C:\Users\Admin\AppData\Roaming\RedBoot.exe
"C:\Users\Admin\AppData\Roaming\RedBoot.exe"
C:\Users\Admin\AppData\Roaming\RedEye.exe
"C:\Users\Admin\AppData\Roaming\RedEye.exe"
C:\Users\Admin\AppData\Roaming\Rensenware.exe
"C:\Users\Admin\AppData\Roaming\Rensenware.exe"
C:\Users\Admin\AppData\Roaming\Rokku.exe
"C:\Users\Admin\AppData\Roaming\Rokku.exe"
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "1514662147-1101916255-870117591127602195429391355420297047011497896101595886359"
C:\Users\Admin\AppData\Roaming\satan.exe
"C:\Users\Admin\AppData\Roaming\satan.exe"
C:\Users\Admin\AppData\Roaming\Satana.exe
"C:\Users\Admin\AppData\Roaming\Satana.exe"
C:\Users\Admin\AppData\Roaming\Seftad.exe
"C:\Users\Admin\AppData\Roaming\Seftad.exe"
C:\Users\Admin\AppData\Roaming\SporaRansomware.exe
"C:\Users\Admin\AppData\Roaming\SporaRansomware.exe"
C:\Users\Admin\AppData\Roaming\satan.exe
"C:\Users\Admin\AppData\Roaming\satan.exe"
C:\Users\Admin\AppData\Roaming\ViraLock.exe
"C:\Users\Admin\AppData\Roaming\ViraLock.exe"
C:\Users\Admin\AppData\Roaming\Gona\okgai.exe
"C:\Users\Admin\AppData\Roaming\Gona\okgai.exe"
C:\Users\Admin\AppData\Roaming\WannaCry.exe
"C:\Users\Admin\AppData\Roaming\WannaCry.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_768663b8.bat"
C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe
"C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe"
C:\Users\Admin\AppData\Roaming\Gona\okgai.exe
"C:\Users\Admin\AppData\Roaming\Gona\okgai.exe"
C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe
"C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe"
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "533515787-1738167246258916508748044399742047307869905828-17967773021113131873"
C:\Users\Admin\AppData\Roaming\Xyeta.exe
"C:\Users\Admin\AppData\Roaming\Xyeta.exe"
C:\Users\Admin\AppData\Roaming\$uckyLocker.exe
"C:\Users\Admin\AppData\Roaming\$uckyLocker.exe"
C:\Windows\SysWOW64\cmd.exe
cmd /c 35461733135397.bat
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "-1711119370-113709395218865051219053838441387485019-1942401196-1339430302-1180878217"
C:\Users\Admin\AppData\Roaming\7ev3n.exe
"C:\Users\Admin\AppData\Roaming\7ev3n.exe"
C:\Windows\SysWOW64\attrib.exe
attrib +h .
C:\Users\Admin\wyskgMYs\GmoEYggY.exe
"C:\Users\Admin\wyskgMYs\GmoEYggY.exe"
C:\Windows\SysWOW64\icacls.exe
icacls . /grant Everyone:F /T /C /Q
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "254497598412324902-2065445553-20748075291419358680-1421429058-21255895881080975784"
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "-1378428098549471286-1421370185-1890501149-16662438-328566376-905356993-1927572050"
C:\ProgramData\igIEgssk\RQEcIwQg.exe
"C:\ProgramData\igIEgssk\RQEcIwQg.exe"
C:\Windows\SysWOW64\cmd.exe
cmd /c "C:\Users\Admin\AppData\Roaming\ViraLock"
C:\Windows\SysWOW64\reg.exe
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
C:\Windows\SysWOW64\reg.exe
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
C:\Windows\SysWOW64\reg.exe
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
C:\Windows\SysWOW64\cmd.exe
cmd /c ""C:\Users\Admin\AppData\Local\Temp\RwMMYIAc.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""
C:\Users\Admin\AppData\Roaming\taskdl.exe
taskdl.exe
C:\Users\Admin\AppData\Roaming\Annabelle.exe
"C:\Users\Admin\AppData\Roaming\Annabelle.exe"
C:\Windows\SysWOW64\cmd.exe
cmd /c 126641733135400.bat
C:\Users\Admin\AppData\Roaming\BadRabbit.exe
"C:\Users\Admin\AppData\Roaming\BadRabbit.exe"
C:\Users\Admin\AppData\Roaming\Birele.exe
"C:\Users\Admin\AppData\Roaming\Birele.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 732
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
dw20.exe -x -s 512
C:\Users\Admin\AppData\Roaming\Cerber5.exe
"C:\Users\Admin\AppData\Roaming\Cerber5.exe"
C:\Users\Admin\AppData\Roaming\CoronaVirus.exe
"C:\Users\Admin\AppData\Roaming\CoronaVirus.exe"
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"
C:\Windows\System32\vssadmin.exe
"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet
C:\Users\Admin\AppData\Roaming\CryptoWall.exe
"C:\Users\Admin\AppData\Roaming\CryptoWall.exe"
C:\Users\Admin\AppData\Roaming\Satana.exe
"C:\Users\Admin\AppData\Roaming\Satana.exe"
C:\Users\Admin\AppData\Roaming\DeriaLock.exe
"C:\Users\Admin\AppData\Roaming\DeriaLock.exe"
C:\Users\Admin\AppData\Roaming\Dharma.exe
"C:\Users\Admin\AppData\Roaming\Dharma.exe"
C:\Users\Admin\AppData\Roaming\Fantom.exe
"C:\Users\Admin\AppData\Roaming\Fantom.exe"
C:\Windows\syswow64\explorer.exe
"C:\Windows\syswow64\explorer.exe"
C:\Users\Admin\AppData\Roaming\GandCrab.exe
"C:\Users\Admin\AppData\Roaming\GandCrab.exe"
C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe
"C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe"
C:\Users\Admin\AppData\Roaming\Krotten.exe
"C:\Users\Admin\AppData\Roaming\Krotten.exe"
C:\Windows\SysWOW64\attrib.exe
attrib +h +s F:\$RECYCLE
C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe
"C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe"
C:\Users\Admin\AppData\Roaming\NotPetya.exe
"C:\Users\Admin\AppData\Roaming\NotPetya.exe"
C:\Windows\SysWOW64\cscript.exe
cscript //nologo c.vbs
C:\Users\Admin\AppData\Roaming\ViraLock.exe
C:\Users\Admin\AppData\Roaming\ViraLock
C:\Windows\syswow64\svchost.exe
-k netsvcs
C:\Windows\syswow64\vssadmin.exe
vssadmin.exe Delete Shadows /All /Quiet
C:\Windows\system32\rundll32.exe
"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\PetrWrap
C:\Users\Admin\AppData\Roaming\Petya.A.exe
"C:\Users\Admin\AppData\Roaming\Petya.A.exe"
C:\Windows\SysWOW64\cscript.exe
cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
C:\Windows\SysWOW64\cmd.exe
cmd /c "C:\Users\Admin\AppData\Roaming\ViraLock"
C:\Users\Admin\AppData\Roaming\PolyRansom.exe
"C:\Users\Admin\AppData\Roaming\PolyRansom.exe"
C:\Windows\SysWOW64\reg.exe
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
C:\Users\Admin\AppData\Roaming\PowerPoint.exe
"C:\Users\Admin\AppData\Roaming\PowerPoint.exe"
C:\Windows\SysWOW64\cscript.exe
cscript.exe //nologo m.vbs
C:\Users\Admin\AppData\Roaming\Bezilom.exe
"C:\Users\Admin\AppData\Roaming\Bezilom.exe"
C:\Windows\SysWOW64\reg.exe
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
C:\Users\Admin\AppData\Roaming\Bumerang.exe
"C:\Users\Admin\AppData\Roaming\Bumerang.exe"
C:\Users\Admin\AppData\Roaming\Fagot.a.exe
"C:\Users\Admin\AppData\Roaming\Fagot.a.exe"
C:\Windows\SysWOW64\reg.exe
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
C:\Windows\SysWOW64\cmd.exe
cmd /c ""C:\Users\Admin\AppData\Local\Temp\BkEQoUAk.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""
C:\Users\Admin\AppData\Roaming\@[email protected]
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c start /b @[email protected] vs
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\HeadTail.vbs"
C:\Windows\SysWOW64\ddraw32.dll
C:\Windows\system32\ddraw32.dll
C:\Windows\SysWOW64\cmd.exe
cmd /c "C:\Users\Admin\AppData\Roaming\PolyRansom"
C:\Windows\SysWOW64\ddraw32.dll
C:\Windows\system32\ddraw32.dll :C:\Users\Admin\AppData\Roaming\Bumerang.exe
C:\Windows\SysWOW64\reg.exe
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
C:\Windows\SysWOW64\reg.exe
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
C:\Windows\SysWOW64\reg.exe
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
C:\Windows\SysWOW64\cmd.exe
cmd /c ""C:\Users\Admin\AppData\Local\Temp\RQwcAEcI.bat" "C:\Users\Admin\AppData\Roaming\PolyRansom.exe""
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 656
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 600
C:\Windows\system32\verclsid.exe
"C:\Windows\system32\verclsid.exe" /S /C {871C5380-42A0-1069-A2EA-08002B30309D} /I {000214E6-0000-0000-C000-000000000046} /X 0x401
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 612
C:\Users\Admin\AppData\Local\system.exe
"C:\Users\Admin\AppData\Local\system.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 632
C:\Users\Admin\AppData\Roaming\@[email protected]
C:\Users\Admin\91111980\protect.exe
"C:\Users\Admin\91111980\protect.exe"
C:\Users\Admin\91111980\assembler.exe
"C:\Users\Admin\91111980\assembler.exe" -f bin "C:\Users\Admin\91111980\boot.asm" -o "C:\Users\Admin\91111980\boot.bin"
C:\Users\Admin\91111980\overwrite.exe
"C:\Users\Admin\91111980\overwrite.exe" "C:\Users\Admin\91111980\boot.bin"
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe SETUPEXEDIR=C:\Users\Admin\AppData\Roaming\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Windows\system32\taskkill.exe
taskkill.exe /f /im explorer.exe
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Windows\SysWOW64\verclsid.exe
"C:\Windows\system32\verclsid.exe" /S /C {871C5380-42A0-1069-A2EA-08002B30309D} /I {000214E6-0000-0000-C000-000000000046} /X 0x401
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 88
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
Network
| Country | Destination | Domain | Proto |
| BO | 200.87.164.69:9999 | tcp | |
| BO | 200.87.164.69:9999 | tcp | |
| US | 8.8.8.8:53 | google.com | udp |
| US | 8.8.8.8:53 | google.com | udp |
| GB | 142.250.187.238:80 | google.com | tcp |
| GB | 142.250.187.238:80 | google.com | tcp |
| RU | 185.127.26.186:80 | tcp | |
| US | 8.8.8.8:53 | ip-addr.es | udp |
| FR | 188.165.164.184:80 | ip-addr.es | tcp |
| US | 8.8.8.8:53 | myexternalip.com | udp |
| US | 34.160.111.145:80 | myexternalip.com | tcp |
| FR | 94.247.31.19:8080 | tcp | |
| US | 8.8.8.8:53 | blockchain.info | udp |
| US | 104.16.236.243:443 | blockchain.info | tcp |
| BO | 200.119.204.12:9999 | tcp | |
| BO | 200.119.204.12:9999 | tcp |
Files
memory/2400-0-0x000007FEF5213000-0x000007FEF5214000-memory.dmp
memory/2400-1-0x0000000000100000-0x0000000001100000-memory.dmp
C:\Users\Admin\AppData\Roaming\Avoid.exe
| MD5 | 20d2c71d6d9daf4499ffc4a5d164f1c3 |
| SHA1 | 38e5dcd93f25386d05a34a5b26d3fba1bf02f7c8 |
| SHA256 | 3ac8cc58dcbceaec3dab046aea050357e0e2248d30b0804c738c9a5b037c220d |
| SHA512 | 8ffd56fb3538eb60da2dde9e3d6eee0dac8419c61532e9127f47c4351b6e53e01143af92b2e26b521e23cdbbf15d7a358d3757431e572e37a1eede57c7d39704 |
memory/2136-10-0x0000000000220000-0x0000000000221000-memory.dmp
C:\Users\Admin\AppData\Roaming\ChilledWindows.exe
| MD5 | 6a4853cd0584dc90067e15afb43c4962 |
| SHA1 | ae59bbb123e98dc8379d08887f83d7e52b1b47fc |
| SHA256 | ccb9502bf8ba5becf8b758ca04a5625c30b79e2d10d2677cc43ae4253e1288ec |
| SHA512 | feb223e0de9bd64e32dc4f3227e175b58196b5e614bca8c2df0bbca2442a564e39d66bcd465154149dc7ebbd3e1ca644ed09d9a9174b52236c76e7388cb9d996 |
memory/2516-17-0x000007FEF5213000-0x000007FEF5214000-memory.dmp
C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe
| MD5 | bc1e7d033a999c4fd006109c24599f4d |
| SHA1 | b927f0fc4a4232a023312198b33272e1a6d79cec |
| SHA256 | 13adae722719839af8102f98730f3af1c5a56b58069bfce8995acd2123628401 |
| SHA512 | f5d9b8c1fd9239894ec9c075542bff0bcef79871f31038e627ae257b8c1db9070f4d124448a78e60ccc8bc12f138102a54825e9d7647cd34832984c7c24a6276 |
memory/2516-23-0x0000000000CA0000-0x0000000001104000-memory.dmp
C:\Users\Admin\AppData\Roaming\CrazyNCS.exe
| MD5 | d043ba91e42e0d9a68c9866f002e8a21 |
| SHA1 | e9f177e1c57db0a15d1dc6b3e6c866d38d85b17c |
| SHA256 | 6820c71df417e434c5ad26438c901c780fc5a80b28a466821b47d20b8424ef08 |
| SHA512 | 3e9783646e652e9482b3e7648fb0a5f7c8b6c386bbc373d5670d750f6f99f6137b5501e21332411609cbcc0c20f829ab8705c2835e2756455f6754c9975ac6bd |
C:\Users\Admin\AppData\Roaming\Curfun.exe
| MD5 | 0b3b2dff5503cb032acd11d232a3af55 |
| SHA1 | 6efc31c1d67f70cf77c319199ac39f70d5a7fa95 |
| SHA256 | ef878461a149024f3065121ff4e165731ecabef1b94b0b3ed2eda010ad39202b |
| SHA512 | 484014d65875e706f7e5e5f54c2045d620e5cce5979bf7f37b45c613e6d948719c0b8e466df5d8908706133ce4c4b71a11b804417831c9dbaf72b6854231ea17 |
C:\Users\Admin\AppData\Roaming\DesktopBoom.exe
| MD5 | f0a661d33aac3a3ce0c38c89bec52f89 |
| SHA1 | 709d6465793675208f22f779f9e070ed31d81e61 |
| SHA256 | c20e78ce9028299d566684d35b1230d055e5ea0e9b94d0aff58f650e0468778a |
| SHA512 | 57cdb3c38f2e90d03e6dc1f9d8d1131d40d3919f390bb1783343c82465461319e70483dc3cd3efdbd9a62dfc88d74fc706f05d760ffd8506b16fd7686e414443 |
C:\Users\Admin\AppData\Roaming\Flasher.exe
| MD5 | 9254ca1da9ff8ad492ca5fa06ca181c6 |
| SHA1 | 70fa62e6232eae52467d29cf1c1dacb8a7aeab90 |
| SHA256 | 30676ad5dc94c3fec3d77d87439b2bf0a1aaa7f01900b68002a06f11caee9ce6 |
| SHA512 | a84fbbdea4e743f3e41878b9cf6db219778f1479aa478100718af9fc8d7620fc7a3295507e11df39c7863cb896f946514e50368db480796b6603c8de5580685a |
C:\Users\Admin\AppData\Roaming\Hydra.exe
| MD5 | b2eca909a91e1946457a0b36eaf90930 |
| SHA1 | 3200c4e4d0d4ece2b2aadb6939be59b91954bcfa |
| SHA256 | 0b6c0af51cde971b3e5f8aa204f8205418ab8c180b79a5ac1c11a6e0676f0f7c |
| SHA512 | 607d20e4a46932c7f4d9609ef9451e2303cd79e7c4778fe03f444e7dc800d6de7537fd2648c7c476b9f098588dc447e8c39d8b21cd528d002dfa513a19c6ebbf |
C:\Users\Admin\AppData\Roaming\Launcher.exe
| MD5 | 7506eb94c661522aff09a5c96d6f182b |
| SHA1 | 329bbdb1f877942d55b53b1d48db56a458eb2310 |
| SHA256 | d5b962dfe37671b5134f0b741a662610b568c2b5374010ee92b5b7857d87872c |
| SHA512 | d815a9391ef3d508b89fc221506b95f4c92d586ec38f26aec0f239750f34cf398eed3d818fa439f6aa6ed3b30f555a1903d93eeeec133b80849a4aa6685ec070 |
C:\Users\Admin\AppData\Roaming\Popup.exe
| MD5 | 9c3e9e30d51489a891513e8a14d931e4 |
| SHA1 | 4e5a5898389eef8f464dee04a74f3b5c217b7176 |
| SHA256 | f8f7b5f20ca57c61df6dc8ff49f2f5f90276a378ec17397249fdc099a6e1dcd8 |
| SHA512 | bf45677b7dd6c67ad350ec6ecad5bc3f04dea179fae0ff0a695c69f7de919476dd7a69c25b04c8530a35119e4933f4a8c327ed6dcef892b1114dfd7e494a19a7 |
C:\Users\Admin\AppData\Roaming\rickroll.exe
| MD5 | 0ec108e32c12ca7648254cf9718ad8d5 |
| SHA1 | 78e07f54eeb6af5191c744ebb8da83dad895eca1 |
| SHA256 | 48b08ea78124ca010784d9f0faae751fc4a0c72c0e7149ded81fc03819f5d723 |
| SHA512 | 1129e685f5dd0cb2fa22ef4fe5da3f1e2632e890333ce17d3d06d04a4097b4d9f4ca7d242611ffc9e26079900945cf04ab6565a1c322e88e161f1929d18a2072 |
C:\Users\Admin\AppData\Roaming\Time.exe
| MD5 | 9d0d2fcb45b1ff9555711b47e0cd65e5 |
| SHA1 | 958f29a99cbb135c92c5d1cdffb9462be35ee9fd |
| SHA256 | dc476ae39effdd80399b6e36f1fde92c216a5bbdb6b8b2a7ecbe753e91e4c993 |
| SHA512 | 8fd4ce4674cd52a3c925149945a7a50a139302be17f6ee3f30271ebe1aa6d92bcb15a017dca989cd837a5d23cd56eaacc6344dc7730234a4629186976c857ca9 |
C:\Users\Admin\AppData\Roaming\ScreenScrew.exe
| MD5 | e87a04c270f98bb6b5677cc789d1ad1d |
| SHA1 | 8c14cb338e23d4a82f6310d13b36729e543ff0ca |
| SHA256 | e03520794f00fb39ef3cfff012f72a5d03c60f89de28dbe69016f6ed151b5338 |
| SHA512 | 8784f4d42908e54ecedfb06b254992c63920f43a27903ccedd336daaeed346db44e1f40e7db971735da707b5b32206be1b1571bc0d6a2d6eb90bbf9d1f69de13 |
C:\Users\Admin\AppData\Roaming\Trololo.exe
| MD5 | b6d61b516d41e209b207b41d91e3b90d |
| SHA1 | e50d4b7bf005075cb63d6bd9ad48c92a00ee9444 |
| SHA256 | 3d0efd55bde5fb7a73817940bac2a901d934b496738b7c5cab7ea0f6228e28fe |
| SHA512 | 3217fc904e4c71b399dd273786634a6a6c19064a9bf96960df9b3357001c12b9547813412173149f6185eb5d300492d290342ec955a8347c6f9dcac338c136da |
C:\Users\Admin\AppData\Roaming\Melting.exe
| MD5 | 833619a4c9e8c808f092bf477af62618 |
| SHA1 | b4a0efa26f790e991cb17542c8e6aeb5030d1ebf |
| SHA256 | 92a284981c7ca33f1af45ce61738479fbcbb5a4111f5498e2cb54931c8a36c76 |
| SHA512 | 4f231fc16339d568b5cf9353133aeae835eb262dab68bc80d92f37b43df64dce4fae0e913cbaa3bb61351a759aeecf9d280bc5779b0853c980559a654d6cca11 |
C:\Users\Admin\AppData\Roaming\Vista.exe
| MD5 | faa6cb3e816adaeaabf2930457c79c33 |
| SHA1 | 6539de41b48d271bf4237e6eb09b0ee40f9a2140 |
| SHA256 | 6680317e6eaa04315b47aaadd986262cd485c8a4bd843902f4c779c858a3e31b |
| SHA512 | 58859556771203d736ee991b651a6a409de7e3059c2afe81d4545864295c383f75cfbabf3cffaa0c412a6ec27bf939f0893c28152f53512c7885e597db8d2c66 |
C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe
| MD5 | 6e49c75f701aa059fa6ed5859650b910 |
| SHA1 | ccb7898c509c3a1de96d2010d638f6a719f6f400 |
| SHA256 | f91f02fd27ada64f36f6df59a611fef106ff7734833dea825d0612e73bdfb621 |
| SHA512 | ccd1b581a29de52d2313a97eb3c3b32b223dba1e7a49c83f7774b374bc2d16b13fba9566de6762883f3b64ed8e80327b454e5d32392af2a032c22653fed0fff8 |
memory/1084-122-0x0000000000400000-0x00000000006BC000-memory.dmp
C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe
| MD5 | 515198a8dfa7825f746d5921a4bc4db9 |
| SHA1 | e1da0b7f046886c1c4ff6993f7f98ee9a1bc90ae |
| SHA256 | 0fda176b199295f72fafc3bc25cefa27fa44ed7712c3a24ca2409217e430436d |
| SHA512 | 9e47037fe40b79ebf056a9c6279e318d85da9cd7e633230129d77a1b8637ecbafc60be38dd21ca9077ebfcb9260d87ff7fcc85b8699b3135148fe956972de3e8 |
C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe
| MD5 | bd65d387482def1fe00b50406f731763 |
| SHA1 | d06a2ba2e29228f443f97d1dd3a8da5dd7df5903 |
| SHA256 | 1ab7375550516d7445c47fd9b551ed864f227401a14ff3f1ff0d70caca3bd997 |
| SHA512 | 351ecd109c4d49bc822e8ade73a9516c4a531ebcda63546c155e677dcff19708068dc588b2fcf30cad086238e8b206fc5f349d37dda02d3c3a8d9b570d92e4d9 |
C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe
| MD5 | e263c5b306480143855655233f76dc5a |
| SHA1 | e7dcd6c23c72209ee5aa0890372de1ce52045815 |
| SHA256 | 1f69810b8fe71e30a8738278adf09dd982f7de0ab9891d296ce7ea61b3fa4f69 |
| SHA512 | e95981eae02d0a8bf44493c64cca8b7e50023332e91d75164735a1d0e38138f358100c93633ff3a0652e1c12a5155cba77d81e01027422d7d5f71000eafb4113 |
memory/2016-128-0x0000000000350000-0x000000000040C000-memory.dmp
memory/2728-127-0x0000000000E90000-0x0000000000EA0000-memory.dmp
C:\Users\Admin\AppData\Roaming\RedBoot.exe
| MD5 | e0340f456f76993fc047bc715dfdae6a |
| SHA1 | d47f6f7e553c4bc44a2fe88c2054de901390b2d7 |
| SHA256 | 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887 |
| SHA512 | cac10c675d81630eefca49b2ac4cc83f3eb29115ee28a560db4d6c33f70bf24980e48bb48ce20375349736e3e6b23a1ca504b9367917328853fffc5539626bbc |
memory/2268-138-0x0000000001320000-0x00000000015AE000-memory.dmp
C:\Users\Admin\AppData\Roaming\RedEye.exe
| MD5 | e9e5596b42f209cc058b55edc2737a80 |
| SHA1 | f30232697b3f54e58af08421da697262c99ec48b |
| SHA256 | 9ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305 |
| SHA512 | e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7 |
C:\Users\Admin\AppData\Roaming\Rensenware.exe
| MD5 | 60335edf459643a87168da8ed74c2b60 |
| SHA1 | 61f3e01174a6557f9c0bfc89ae682d37a7e91e2e |
| SHA256 | 7bf5623f0a10dfa148a35bebd899b7758612f1693d2a9910f716cf15a921a76a |
| SHA512 | b4e5e4d4f0b4a52243d6756c66b4fe6f4b39e64df7790072046e8a3dadad3a1be30b8689a1bab8257cc35cb4df652888ddf62b4e1fccb33e1bbf1f5416d73efb |
C:\Users\Admin\AppData\Roaming\Rokku.exe
| MD5 | 97512f4617019c907cd0f88193039e7c |
| SHA1 | 24cfa261ee30f697e7d1e2215eee1c21eebf4579 |
| SHA256 | 438888ef36bad1079af79daf152db443b4472c5715a7b3da0ba24cc757c53499 |
| SHA512 | cfbb8dd91434f917d507cb919aa7e6b16b7b2056d56185f6ad5b6149e05629325cdb3df907f58bb3f634b17a9989bf5b6d6b81f5396a3a556431742ed742ac4a |
memory/1936-158-0x0000000000400000-0x000000000058D000-memory.dmp
C:\Users\Admin\AppData\Roaming\satan.exe
| MD5 | c9c341eaf04c89933ed28cbc2739d325 |
| SHA1 | c5b7d47aef3bd33a24293138fcba3a5ff286c2a8 |
| SHA256 | 1a0a2fd546e3c05e15b2db3b531cb8e8755641f5f1c17910ce2fb7bbce2a05b7 |
| SHA512 | 7cfa6ec0be0f5ae80404c6c709a6fd00ca10a18b6def5ca746611d0d32a9552f7961ab0ebf8a336b27f7058d700205be7fcc859a30d7d185aa9457267090f99b |
C:\Users\Admin\AppData\Roaming\Satana.exe
| MD5 | 46bfd4f1d581d7c0121d2b19a005d3df |
| SHA1 | 5b063298bbd1670b4d39e1baef67f854b8dcba9d |
| SHA256 | 683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96 |
| SHA512 | b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5 |
C:\Users\Admin\AppData\Roaming\Seftad.exe
| MD5 | 86a3a3ce16360e01933d71d0bf1f2c37 |
| SHA1 | af54089e3601c742d523b507b3a0793c2b6e60be |
| SHA256 | 2ebe23ba9897d9c127b9c0a737ba63af8d0bcd76ec866610cc0b5de2f62b87bd |
| SHA512 | 65a3571cf5b057d2c3ce101346947679f162018fa5eadf79c5a6af6c0a3bc9b12731ff13f27629b14983ef8bc73fa9782cc0a9e6c44b0ffc2627da754c324d6e |
memory/892-185-0x0000000000400000-0x0000000000407200-memory.dmp
memory/1988-186-0x0000000001200000-0x0000000001272000-memory.dmp
C:\Users\Admin\AppData\Roaming\SporaRansomware.exe
| MD5 | 4a4a6d26e6c8a7df0779b00a42240e7b |
| SHA1 | 8072bada086040e07fa46ce8c12bf7c453c0e286 |
| SHA256 | 7ad9ed23a91643b517e82ad5740d24eca16bcae21cfe1c0da78ee80e0d1d3f02 |
| SHA512 | c7a7b15d8dbf8e8f8346a4dab083bb03565050281683820319906da4d23b97b39e88f841b30fc8bd690c179a8a54870238506ca60c0f533d34ac11850cdc1a95 |
memory/888-189-0x0000000000400000-0x0000000000412000-memory.dmp
memory/888-187-0x0000000000400000-0x0000000000412000-memory.dmp
memory/2304-192-0x0000000001020000-0x0000000001ABC000-memory.dmp
C:\Users\Admin\AppData\Roaming\ViraLock.exe
| MD5 | 8803d517ac24b157431d8a462302b400 |
| SHA1 | b56afcad22e8cda4d0e2a98808b8e8c5a1059d4e |
| SHA256 | 418395efd269bc6534e02c92cb2c568631ada6e54bc55ade4e4a5986605ff786 |
| SHA512 | 38fdfe0bc873e546b05a8680335526eec61ccc8cf3f37c60eee0bc83ec54570077f1dc1da26142488930eabcc21cb7a33c1b545a194cbfb4c87e430c4b2bfb50 |
memory/2472-200-0x0000000000400000-0x0000000000432000-memory.dmp
\Users\Admin\AppData\Roaming\Gona\okgai.exe
| MD5 | 5273029483e8165cc31937a9e8e4f366 |
| SHA1 | 231c0c04be69860c9f6b40dc755ac7a2d1c1f2ea |
| SHA256 | c2c82c154e7fc3f0dd09f16b9928b8720b7820a2dfa6c1640c894e88bf44f3cb |
| SHA512 | 0c86e3b51be48ebbfb3a707a276e45f61ed1e966f3af81c01dbe7623d9199933f5325cff82fb2391efcd706a0c0d7c8a3eec79f03f60fbedfa0e30c4670071ac |
C:\Users\Admin\AppData\Roaming\WannaCry.exe
| MD5 | 5c7fb0927db37372da25f270708103a2 |
| SHA1 | 120ed9279d85cbfa56e5b7779ffa7162074f7a29 |
| SHA256 | be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844 |
| SHA512 | a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206 |
memory/2404-217-0x0000000000660000-0x000000000078D000-memory.dmp
memory/2404-216-0x00000000002B0000-0x00000000002CF000-memory.dmp
memory/2404-215-0x00000000004E0000-0x000000000057F000-memory.dmp
memory/2404-214-0x0000000000410000-0x00000000004D9000-memory.dmp
memory/888-218-0x0000000000400000-0x0000000000412000-memory.dmp
C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe
| MD5 | dbfbf254cfb84d991ac3860105d66fc6 |
| SHA1 | 893110d8c8451565caa591ddfccf92869f96c242 |
| SHA256 | 68b0e1932f3b4439865be848c2d592d5174dbdbaab8f66104a0e5b28c928ee0c |
| SHA512 | 5e9ccdf52ebdb548c3fa22f22dd584e9a603ca1163a622db5707dbcc5d01e4835879dcfd28cb1589cbb25aed00f352f7a0a0962b1f38b68fc7d6693375e7666d |
C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe
| MD5 | 84c82835a5d21bbcf75a61706d8ab549 |
| SHA1 | 5ff465afaabcbf0150d1a3ab2c2e74f3a4426467 |
| SHA256 | ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa |
| SHA512 | 90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244 |
memory/2404-223-0x0000000002140000-0x0000000002157000-memory.dmp
memory/2404-221-0x0000000000AA0000-0x0000000000BA9000-memory.dmp
memory/1792-249-0x00000000007A0000-0x0000000000811000-memory.dmp
C:\Users\Admin\AppData\Roaming\Xyeta.exe
| MD5 | 9d15a3b314600b4c08682b0202700ee7 |
| SHA1 | 208e79cdb96328d5929248bb8a4dd622cf0684d1 |
| SHA256 | 3ab3833e31e4083026421c641304369acfd31b957b78af81f3c6ef4968ef0e15 |
| SHA512 | 9916397b782aaafa68eb6a781ea9a0db27f914035dd586142c818ccbd7e69036896767bedba97489d5100de262a554cf14bcdf4a24edda2c5d37217b265398d3 |
C:\Users\Admin\AppData\Roaming\msg\m_finnish.wnry
| MD5 | 35c2f97eea8819b1caebd23fee732d8f |
| SHA1 | e354d1cc43d6a39d9732adea5d3b0f57284255d2 |
| SHA256 | 1adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e |
| SHA512 | 908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf |
C:\Users\Admin\AppData\Roaming\$uckyLocker.exe
| MD5 | c850f942ccf6e45230169cc4bd9eb5c8 |
| SHA1 | 51c647e2b150e781bd1910cac4061a2cee1daf89 |
| SHA256 | 86e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f |
| SHA512 | 2b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9 |
memory/2188-271-0x0000000010000000-0x0000000010012000-memory.dmp
memory/2396-268-0x0000000000400000-0x000000000044F000-memory.dmp
memory/2400-267-0x000007FEF5213000-0x000007FEF5214000-memory.dmp
memory/1792-265-0x00000000021A0000-0x00000000022A9000-memory.dmp
memory/2304-252-0x000000001BDC0000-0x000000001CDD6000-memory.dmp
memory/1792-251-0x0000000000400000-0x0000000000417000-memory.dmp
memory/1792-248-0x0000000000670000-0x000000000079D000-memory.dmp
memory/1792-247-0x00000000003C0000-0x00000000003DF000-memory.dmp
memory/1792-246-0x00000000004F0000-0x000000000058F000-memory.dmp
memory/1792-245-0x0000000000420000-0x00000000004E9000-memory.dmp
memory/1792-243-0x0000000000400000-0x0000000000417000-memory.dmp
C:\Users\Admin\AppData\Roaming\35461733135397.bat
| MD5 | 9f5718e808c505fa040e46bbccfe27f6 |
| SHA1 | 3f0db8829183ea2242d90c019ec681c8321512c8 |
| SHA256 | a33f96b5bfcc643ba255fdd19b20a2efdb6c51639b522547dd4b59e08e2924dd |
| SHA512 | dd96bca36023a1e1463a14e5d3877cc78ee59bc9f06b5d82f83cfe2e0eacd1c6fb44f8b22ac23ff2fde3a518907a9b83f954dc062b113def875cb11b09a841cd |
memory/2304-294-0x00000000003C0000-0x00000000003C6000-memory.dmp
\Users\Admin\wyskgMYs\GmoEYggY.exe
| MD5 | 1807ed10424f82eee06db5aac64d3089 |
| SHA1 | bc541fc52f4f3e11d46aa8d81f311a521f87e5a1 |
| SHA256 | 91e5cd0d9abe642b325d718b28d93c2014abf842cb048e04b5352ceaff16a49f |
| SHA512 | d6fdd7903e1a9ddfbb4ab0146a8b64baf59a75ed41614dbf70d89bafe87e7aa9bd59ffbcda7a1856d7a2687de7d40b41e084e0785275c3445779104566101b62 |
memory/2472-324-0x0000000000460000-0x000000000048E000-memory.dmp
C:\Users\Admin\AppData\Roaming\7ev3n.exe
| MD5 | 9f8bc96c96d43ecb69f883388d228754 |
| SHA1 | 61ed25a706afa2f6684bb4d64f69c5fb29d20953 |
| SHA256 | 7d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5 |
| SHA512 | 550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6 |
memory/2400-378-0x0000000008880000-0x0000000008897000-memory.dmp
memory/2400-376-0x0000000008880000-0x0000000008897000-memory.dmp
memory/2400-374-0x0000000008880000-0x0000000008897000-memory.dmp
memory/1580-371-0x0000000001D90000-0x0000000001DA7000-memory.dmp
memory/1580-369-0x0000000001D90000-0x0000000001DA7000-memory.dmp
memory/1580-367-0x0000000001D90000-0x0000000001DA7000-memory.dmp
memory/1208-364-0x0000000003BE0000-0x0000000003BF7000-memory.dmp
memory/1208-362-0x0000000003BE0000-0x0000000003BF7000-memory.dmp
memory/1208-360-0x0000000003BE0000-0x0000000003BF7000-memory.dmp
memory/1176-357-0x00000000001B0000-0x00000000001C7000-memory.dmp
memory/1176-355-0x00000000001B0000-0x00000000001C7000-memory.dmp
memory/1176-353-0x00000000001B0000-0x00000000001C7000-memory.dmp
memory/1108-350-0x0000000001FF0000-0x0000000002007000-memory.dmp
memory/1108-348-0x0000000001FF0000-0x0000000002007000-memory.dmp
memory/1108-346-0x0000000001FF0000-0x0000000002007000-memory.dmp
memory/1108-344-0x0000000001FF0000-0x0000000002007000-memory.dmp
memory/1792-343-0x0000000001FC0000-0x0000000001FD7000-memory.dmp
memory/1088-471-0x0000000000400000-0x000000000042E000-memory.dmp
memory/2472-340-0x0000000000460000-0x000000000048E000-memory.dmp
memory/1760-335-0x0000000010000000-0x0000000010010000-memory.dmp
memory/1084-470-0x0000000000400000-0x00000000006BC000-memory.dmp
memory/1864-516-0x0000000000400000-0x000000000042F000-memory.dmp
memory/2472-515-0x0000000000460000-0x000000000048F000-memory.dmp
\ProgramData\igIEgssk\RQEcIwQg.exe
| MD5 | c796362136932d94f1c47a349a9c61fe |
| SHA1 | 152519d89a888a54e94cfa8924cf7414ed4d0c41 |
| SHA256 | a66bf1549f7bab43c6310f86f51babab9aa3359536c8841e28fd51f5d24f613e |
| SHA512 | cbda9c7e69b19f3dd2447da7ea5ebbfe4ae32a02632b140076b12cd50c3f5650a0409b325353fb82786ae3d6a802586250ab4631cacd187060fd164c4ab0a8ec |
memory/2472-501-0x0000000000460000-0x000000000048F000-memory.dmp
memory/2268-500-0x0000000001320000-0x00000000015AE000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\dsAkMkow.bat
| MD5 | 0c8173d09ff82698fb72f8a6c31e2ad5 |
| SHA1 | 8b62ed5095143495dbc4e97260155cb8b1a16678 |
| SHA256 | bed6212f185b417636b434ff529f83a256d47867b99b4343d7b7bbc527f22fb6 |
| SHA512 | e054f94201b03ac6971d118f795731b781c7b56dbaad44bd012448d17aaa451b73765f2357492af9948e7d1d0aeaa96ef489deb950cff9df0d3dd1b15e46c165 |
memory/2472-538-0x0000000000400000-0x0000000000432000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\RwMMYIAc.bat
| MD5 | bae1095f340720d965898063fede1273 |
| SHA1 | 455d8a81818a7e82b1490c949b32fa7ff98d5210 |
| SHA256 | ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a |
| SHA512 | 4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024 |
C:\Users\Admin\AppData\Roaming\US3AC-DAXFT-XTXTX-HTOHT-XYYYY.KEY
| MD5 | 122b48076e0ef7eeb1216486abe7bb43 |
| SHA1 | 44897c8f83db930da995ad8b40f117f6bb47c7b8 |
| SHA256 | 71c3b0b9f65b6fa69f440cc8665cd6d4197bfc78d9db6c9c7aa7c972177c034e |
| SHA512 | e35db63f5c6028379feeeb81671473cfef82f3126d9952f4e7322fdf49817f12e3df61ba06c6e5867a07f7a31a240a0388e464595b43ecf92ccaa632b0e711d5 |
C:\Users\Admin\AppData\Roaming\taskdl.exe
| MD5 | 4fef5e34143e646dbf9907c4374276f5 |
| SHA1 | 47a9ad4125b6bd7c55e4e7da251e23f089407b8f |
| SHA256 | 4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79 |
| SHA512 | 4550dd1787deb353ebd28363dd2cdccca861f6a5d9358120fa6aa23baa478b2a9eb43cef5e3f6426f708a0753491710ac05483fac4a046c26bec4234122434d5 |
C:\Users\Admin\AppData\Roaming\126641733135400.bat
| MD5 | d60ef26cdec915e1e06f4ff89ce1ccff |
| SHA1 | fc64aa9411af7b4e33150bac85ead3b0303c1b9b |
| SHA256 | 1e5a53b8996bb0672bc19e0a4bdd90fda584765cfb97a351ab3140e97bcd7dc2 |
| SHA512 | fc863758a533eff85e933eb15b3e6707966807874ea92e8d5673f8624920ad3e718fd5baf86d16356679189226ea1604e4c9099683ddae33720f3e26686356f5 |
C:\Users\Admin\AppData\Roaming\Birele.exe
| MD5 | 41789c704a0eecfdd0048b4b4193e752 |
| SHA1 | fb1e8385691fa3293b7cbfb9b2656cf09f20e722 |
| SHA256 | b2dcfdf9e7b09f2aa5004668370e77982963ace820e7285b2e264a294441da23 |
| SHA512 | 76391ac85fdc3be75441fcd6e19bed08b807d3946c7281c647f16a3be5388f7be307e6323fac8502430a4a6d800d52a88709592a49011ecc89de4f19102435ea |
C:\Users\Admin\AppData\Roaming\@[email protected]
| MD5 | 7bf2b57f2a205768755c07f238fb32cc |
| SHA1 | 45356a9dd616ed7161a3b9192e2f318d0ab5ad10 |
| SHA256 | b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25 |
| SHA512 | 91a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9 |
memory/2092-666-0x0000000000400000-0x0000000000438000-memory.dmp
C:\Users\Admin\AppData\Roaming\Cerber5.exe
| MD5 | fe1bc60a95b2c2d77cd5d232296a7fa4 |
| SHA1 | c07dfdea8da2da5bad036e7c2f5d37582e1cf684 |
| SHA256 | b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d |
| SHA512 | 266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89 |
memory/2396-751-0x0000000000400000-0x000000000044F000-memory.dmp
memory/316-752-0x0000000000400000-0x000000000056F000-memory.dmp
C:\Users\Admin\AppData\Roaming\CryptoWall.exe
| MD5 | 919034c8efb9678f96b47a20fa6199f2 |
| SHA1 | 747070c74d0400cffeb28fbea17b64297f14cfbd |
| SHA256 | e036d68b8f8b7afc6c8b6252876e1e290f11a26d4ad18ac6f310662845b2c734 |
| SHA512 | 745a81c50bbfd62234edb9788c83a22e0588c5d25c00881901923a02d7096c71ef5f0cd5b73f92ad974e5174de064b0c5ea8044509039aab14b2aed83735a7c4 |
memory/2680-783-0x0000000000810000-0x000000000087E000-memory.dmp
C:\Users\Admin\AppData\Roaming\GandCrab.exe
| MD5 | e6b43b1028b6000009253344632e69c4 |
| SHA1 | e536b70e3ffe309f7ae59918da471d7bf4cadd1c |
| SHA256 | bfb9db791b8250ffa8ebc48295c5dbbca757a5ed3bbb01de12a871b5cd9afd5a |
| SHA512 | 07da214314673407a7d3978ee6e1d20bf1e02f135bf557e86b50489ecc146014f2534515c1b613dba96e65489d8c82caaa8ed2e647684d61e5e86bd3e8251adf |
F:\US3AC-DAXFT-XTXTX-HTOHT-XYYYY.LST
| MD5 | 88044ca96fde1be1c30c35dfd0a47799 |
| SHA1 | 5275c8cd1b2174d054cdf48f3da4e4caba637e3d |
| SHA256 | 93da79086d4432bea05e44d35240b25eeb9216359fa58469d9f9a676e98f7fa7 |
| SHA512 | f2df2196c68933f6830fe94288f9e9efc87168762e2e726de9943246fe577b8227b373b31faef6e9cf79d670d2689d33584edcd7800d77b6006369ec44967ad5 |
F:\US3AC-DAXFT-XTXTX-HTOHT-XYYYY.HTML
| MD5 | 90ea51439c3cb111c10499b2df09f869 |
| SHA1 | 45a3735e62f9ca94faf037273c5cbce51a0eaa8e |
| SHA256 | 61af748c357e934d33f56734de241c89bb2e13a061b6d1aa7f0c1797f6aaf58a |
| SHA512 | 3165c620ca866a41ef787184a3e8204d5bc43513a0c08882082fc03410d0fe7582bf07eabca2d3fc7f905eaee89e8624a48e6cc5c62f9a576372595bc7834ce8 |
C:\Users\Admin\Documents\@[email protected]
| MD5 | f97d2e6f8d820dbd3b66f21137de4f09 |
| SHA1 | 596799b75b5d60aa9cd45646f68e9c0bd06df252 |
| SHA256 | 0e5ece918132a2b1a190906e74becb8e4ced36eec9f9d1c70f5da72ac4c6b92a |
| SHA512 | efda21d83464a6a32fdeef93152ffd32a648130754fdd3635f7ff61cc1664f7fc050900f0f871b0ddd3a3846222bf62ab5df8eed42610a76be66fff5f7b4c4c0 |
C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\decoder.dll
| MD5 | 3531cf7755b16d38d5e9e3c43280e7d2 |
| SHA1 | 19981b17ae35b6e9a0007551e69d3e50aa1afffe |
| SHA256 | 76133e832c15aa5cbc49fb3ba09e0b8dd467c307688be2c9e85e79d3bf62c089 |
| SHA512 | 7b053ba2cf92ef2431b98b2a06bd56340dad94de36d11e326a80cd61b9acb378ac644ac407cf970f4ef8333b8d3fb4ff40b18bb41ec5aee49d79a6a2adcf28fd |
C:\Users\Admin\AppData\Roaming\Krotten.exe
| MD5 | 87ccd6f4ec0e6b706d65550f90b0e3c7 |
| SHA1 | 213e6624bff6064c016b9cdc15d5365823c01f5f |
| SHA256 | e79f164ccc75a5d5c032b4c5a96d6ad7604faffb28afe77bc29b9173fa3543e4 |
| SHA512 | a72403d462e2e2e181dbdabfcc02889f001387943571391befed491aaecba830b0869bdd4d82bca137bd4061bbbfb692871b1b4622c4a7d9f16792c60999c990 |
memory/2976-1237-0x000000013FF30000-0x0000000140F24000-memory.dmp
C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\RFSDBRWMX-MANUAL.txt
| MD5 | 110bc8138007013261f83b8808af568f |
| SHA1 | 3cfcd68097453a82bfec7d2265acbfddea5a9694 |
| SHA256 | 664261c13650851730429276e8e1ae7947c08e6d44999b01bff0db2ddbe00ff4 |
| SHA512 | ea592286813475321898c804780bdbf9a26d90035dd217072fa5c4914e4782ac11f2922234db219734de9dd5b1b7af6845d3273f413f95c8d683f5b73997c7e5 |
memory/2504-1370-0x0000000000280000-0x00000000002B2000-memory.dmp
memory/3648-1371-0x0000000000400000-0x0000000000432000-memory.dmp
memory/668-1595-0x0000000000CF0000-0x0000000000D72000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\UyQYsMcc.bat
| MD5 | 9a79da2b5f2311396019f832f2250956 |
| SHA1 | a409a7fb4baf0b70826eab6f9a59b61d9c284664 |
| SHA256 | 89451ecf442f1ad9a69fa84e1ad591753c82d350b1f3faa202497c5ba122a67b |
| SHA512 | 9a075f3ba399c0868f4f50a7f2d36a3cb157bacc478ca43f52fe9daac2b89681e93ca4d2cf265a06a4b7c65dff6691b59eb0ab18a9495f2664163222cec2f65d |
memory/2440-1804-0x0000000001F70000-0x0000000001FA2000-memory.dmp
memory/2440-1809-0x0000000001FC0000-0x0000000001FF2000-memory.dmp
C:\Users\Admin\AppData\Roaming\PolyRansom.exe
| MD5 | 3ed3fb296a477156bc51aba43d825fc0 |
| SHA1 | 9caa5c658b1a88fee149893d3a00b34a8bb8a1a6 |
| SHA256 | 1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423 |
| SHA512 | dc3d6e409cee4d54f48d1a25912243d07e2f800578c8e0e348ce515a047ecf5fa3089b46284e0956bbced345957a000eecdc082e6f3060971759d70a14c1c97e |
memory/3912-1821-0x0000000000400000-0x0000000000439000-memory.dmp
C:\Users\Admin\AppData\Roaming\PowerPoint.exe
| MD5 | 70108103a53123201ceb2e921fcfe83c |
| SHA1 | c71799a6a6d09ee758b04cdf90a4ab76fbd2a7e3 |
| SHA256 | 9c3f8df80193c085912c9950c58051ae77c321975784cc069ceacd4f57d5861d |
| SHA512 | 996701c65eee7f781c2d22dce63f4a95900f36b97a99dcf833045bce239a08b3c2f6326b3a808431cdab92d59161dd80763e44126578e160d79b7095175d276b |
memory/1072-2022-0x000000002AA00000-0x000000002AA24000-memory.dmp
C:\Users\Admin\AppData\Roaming\Bezilom.exe
| MD5 | 8e9d7feb3b955e6def8365fd83007080 |
| SHA1 | df7522e270506b1a2c874700a9beeb9d3d233e23 |
| SHA256 | 94d2b1da2c4ce7db94ee9603bc2f81386032687e7c664aff6460ba0f5dac0022 |
| SHA512 | 4157a5628dc7f47489be2c30dbf2b14458a813eb66e942bba881615c101df25001c09afb9a54f88831fa4c1858f42d897f8f55fbf6b4c1a82d2509bd52ba1536 |
memory/3364-2176-0x0000000000400000-0x0000000000410000-memory.dmp
C:\Users\Admin\AppData\Roaming\Bumerang.exe
| MD5 | b6c78677b83c0a5b02f48648a9b8e86d |
| SHA1 | 0d90c40d2e9e8c58c1dafb528d6eab45e15fda81 |
| SHA256 | 706fce69fea67622b03fafb51ece076c1fdd38892318f8cce9f2ec80aabca822 |
| SHA512 | 302acca8c5dd310f86b65104f7accd290014e38d354e97e4ffafe1702b0a13b90e4823c274b51bcc9285419e69ff7111343ac0a64fd3c8b67c48d7bbd382337b |
memory/1876-2239-0x0000000000370000-0x00000000003AC000-memory.dmp
C:\Users\Admin\AppData\Roaming\Fagot.a.exe
| MD5 | 30cdab5cf1d607ee7b34f44ab38e9190 |
| SHA1 | d4823f90d14eba0801653e8c970f47d54f655d36 |
| SHA256 | 1517527c1d705a6ebc6ec9194aa95459e875ac3902a9f4aab3bf24b6a6f8407f |
| SHA512 | b465f3b734beaea3951ff57759f13971649b549fafca71342b52d7e74949e152c0fbafe2df40354fc00b5dc8c767f3f5c6940e4ba308888e4395d8fd21e402b3 |
memory/2092-2463-0x0000000000400000-0x0000000000438000-memory.dmp
memory/3648-2472-0x0000000000400000-0x0000000000432000-memory.dmp
memory/2976-2718-0x000000001C1B0000-0x000000001D73E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\WMUAYocg.bat
| MD5 | 762778409ddcbfd1ac06b94605b78c1d |
| SHA1 | eb9c8bec27a8efc596b06bd605ead76db9c25123 |
| SHA256 | aafd80e601becad93c141684b8166d3b4ddfe65d7bbd29c3e7b47c0084aed4cc |
| SHA512 | 3512bcfc5be9d4f10f87dbc170a6a15c8dec8e427a392d9ae6c539f96518d50d1dc782bb1f9a2398a73c65fea8f19f988788ecff1e84e9aeae834c383d4bc51c |
memory/3272-2749-0x0000000000400000-0x0000000000410000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\IkAy.exe
| MD5 | e1c90002f97b22b0756e18e60e37cf6d |
| SHA1 | a46c7eddc835a2e4786bfea74803326a64fca0e1 |
| SHA256 | 7d37dad36011310c7af86ea642c785cd4b3d1c9befc8d33fb1e63d397b0c0983 |
| SHA512 | 739de8b2177e34e96d4284b8322b3b5b2c40e43232c184afa0bb3834f0c81f4986a98e3b29d0f202bf8d6c1f85aada9003f7846a8e23bd7a5a56685feffad2dc |
memory/3364-2763-0x0000000000220000-0x0000000000230000-memory.dmp
memory/3364-2762-0x0000000000220000-0x0000000000230000-memory.dmp
memory/3364-2777-0x0000000000400000-0x0000000000410000-memory.dmp
memory/3912-2778-0x0000000000400000-0x0000000000439000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\RGI197A.tmp
| MD5 | 73d1da91a59b3cb4715e28bfc6cb95e4 |
| SHA1 | 45fbd7d45b5a805cfd708bbde0092455de2b657f |
| SHA256 | d23dd97fb2b812af621146a912d2cdaccff29e836ba33266d1f81e083ad1c39d |
| SHA512 | 1cc73b0fb0c8f3f53e039071dfc15e8b5f4e4872f66f1dfb4a37532f48417dfa227564f024ebf472635690f2c284ff0c53c14fe4b9854f0b660be854afa350dd |
memory/2268-3222-0x0000000001320000-0x00000000015AE000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\KAUK.exe
| MD5 | ebe75f3285a9952cc313e96e6f49f684 |
| SHA1 | b3dbc7fcd3c219a21aa5d9e4106dd9a3548d2ac4 |
| SHA256 | 39a2fd03dbd94f40bb6fecb7ed59b047815c766da0c74d4286bc1adfb0158d71 |
| SHA512 | d4f8f53648b382ea2eec9cd3fb2d90745c19ccca8c341a80612ba04b3629706c07a2b8544eb85b1acb9fbd350f6acdaa60bfedda339c5895bc5a2bce385f361a |