Malware Analysis Report

2025-01-02 13:35

Sample ID 241202-k8hz7avkcl
Target freehacks.exe
SHA256 742e3f0ca6967c947c99cbbff7f3eaa7f5059a1bba1714a20afee3d85312a439
Tags
gandcrab wannacry aspackv2 backdoor defense_evasion evasion execution impact ransomware upx worm hawkeye satana bootkit credential_access discovery keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

742e3f0ca6967c947c99cbbff7f3eaa7f5059a1bba1714a20afee3d85312a439

Threat Level: Known bad

The file freehacks.exe was found to be: Known bad.

Malicious Activity Summary

gandcrab wannacry aspackv2 backdoor defense_evasion evasion execution impact ransomware upx worm hawkeye satana bootkit credential_access discovery keylogger persistence spyware stealer trojan

Wannacry

Satana family

Modifies WinLogon for persistence

Gandcrab

HawkEye

Gandcrab family

Hawkeye family

Satana

Wannacry family

Renames multiple (272) files with added filename extension

Deletes shadow copies

Modifies Windows Firewall

Event Triggered Execution: Image File Execution Options Injection

Drops startup file

Reads user/profile data of web browsers

Executes dropped EXE

Credentials from Password Stores: Windows Credential Manager

ASPack v2.12-2.42

Modifies file permissions

Loads dropped DLL

Enumerates connected drives

Adds Run key to start application

System Binary Proxy Execution: Verclsid

Looks up external IP address via web service

File and Directory Permissions Modification: Windows File and Directory Permissions Modification

Writes to the Master Boot Record (MBR)

AutoIT Executable

Suspicious use of NtSetInformationThreadHideFromDebugger

Sets desktop wallpaper using registry

Suspicious use of SetThreadContext

UPX packed file

Drops file in Program Files directory

Drops file in Windows directory

System Location Discovery: System Language Discovery

Unsigned PE

Enumerates physical storage devices

Program crash

Modifies registry key

Suspicious use of UnmapMainImage

Views/modifies file attributes

Suspicious behavior: MapViewOfSection

Kills process with taskkill

Checks processor information in registry

Runs net.exe

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Scheduled Task/Job: Scheduled Task

Suspicious use of WriteProcessMemory

Interacts with shadow copies

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Reported

2024-12-02 09:16

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-02 09:16

Reported

2024-12-02 09:18

Platform

win10v2004-20241007-en

Max time kernel

88s

Max time network

103s

Command Line

"C:\Users\Admin\AppData\Local\Temp\freehacks.exe"

Signatures

Gandcrab

ransomware backdoor gandcrab

Gandcrab family

gandcrab

Wannacry

ransomware worm wannacry

Wannacry family

wannacry

Deletes shadow copies

ransomware defense_evasion impact execution

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-addr.es N/A N/A
N/A ip-addr.es N/A N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\System32\vssadmin.exe N/A
N/A N/A C:\Windows\SYSTEM32\vssadmin.exe N/A
N/A N/A C:\Windows\SYSTEM32\vssadmin.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\taskkill.exe N/A
N/A N/A C:\Windows\SYSTEM32\taskkill.exe N/A

Modifies registry key

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A

Runs net.exe

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\freehacks.exe

"C:\Users\Admin\AppData\Local\Temp\freehacks.exe"

C:\Users\Admin\AppData\Roaming\Avoid.exe

"C:\Users\Admin\AppData\Roaming\Avoid.exe"

C:\Users\Admin\AppData\Roaming\ChilledWindows.exe

"C:\Users\Admin\AppData\Roaming\ChilledWindows.exe"

C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe

"C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe"

C:\Users\Admin\AppData\Roaming\CrazyNCS.exe

"C:\Users\Admin\AppData\Roaming\CrazyNCS.exe"

C:\Users\Admin\AppData\Roaming\Curfun.exe

"C:\Users\Admin\AppData\Roaming\Curfun.exe"

C:\Users\Admin\AppData\Roaming\DesktopBoom.exe

"C:\Users\Admin\AppData\Roaming\DesktopBoom.exe"

C:\Users\Admin\AppData\Roaming\Flasher.exe

"C:\Users\Admin\AppData\Roaming\Flasher.exe"

C:\Users\Admin\AppData\Roaming\Hydra.exe

"C:\Users\Admin\AppData\Roaming\Hydra.exe"

C:\Users\Admin\AppData\Roaming\Launcher.exe

"C:\Users\Admin\AppData\Roaming\Launcher.exe"

C:\Users\Admin\AppData\Roaming\rickroll.exe

"C:\Users\Admin\AppData\Roaming\rickroll.exe"

C:\Users\Admin\AppData\Roaming\ScreenScrew.exe

"C:\Users\Admin\AppData\Roaming\ScreenScrew.exe"

C:\Users\Admin\AppData\Roaming\Trololo.exe

"C:\Users\Admin\AppData\Roaming\Trololo.exe"

C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe

"C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe"

C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe

"C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe"

C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe

"C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe"

C:\Users\Admin\AppData\Roaming\RedBoot.exe

"C:\Users\Admin\AppData\Roaming\RedBoot.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2292 -ip 2292

C:\Windows\SYSTEM32\taskkill.exe

taskkill.exe /f /im explorer.exe

C:\Windows\SYSTEM32\taskkill.exe

taskkill.exe /f /im taskmgr.exe

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x508 0x460

C:\Users\Admin\42355084\assembler.exe

"C:\Users\Admin\42355084\assembler.exe" -f bin "C:\Users\Admin\42355084\boot.asm" -o "C:\Users\Admin\42355084\boot.bin"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 1204

C:\Users\Admin\AppData\Roaming\Rensenware.exe

"C:\Users\Admin\AppData\Roaming\Rensenware.exe"

C:\Users\Admin\AppData\Roaming\Rokku.exe

"C:\Users\Admin\AppData\Roaming\Rokku.exe"

C:\Users\Admin\AppData\Roaming\satan.exe

"C:\Users\Admin\AppData\Roaming\satan.exe"

C:\Users\Admin\AppData\Roaming\Satana.exe

"C:\Users\Admin\AppData\Roaming\Satana.exe"

C:\Users\Admin\AppData\Roaming\satan.exe

"C:\Users\Admin\AppData\Roaming\satan.exe"

C:\Users\Admin\AppData\Roaming\Olza\gohix.exe

"C:\Users\Admin\AppData\Roaming\Olza\gohix.exe"

C:\ProgramData\HMooQgwU\DAgksEoM.exe

"C:\ProgramData\HMooQgwU\DAgksEoM.exe"

C:\Users\Admin\42355084\overwrite.exe

"C:\Users\Admin\42355084\overwrite.exe" "C:\Users\Admin\42355084\boot.bin"

C:\Windows\SysWOW64\reg.exe

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PocIMIwc.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""

C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe

"C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe"

C:\Users\Admin\AppData\Roaming\Xyeta.exe

"C:\Users\Admin\AppData\Roaming\Xyeta.exe"

C:\Users\Admin\AppData\Roaming\7ev3n.exe

"C:\Users\Admin\AppData\Roaming\7ev3n.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5912 -ip 5912

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5912 -s 448

C:\Windows\system32\msiexec.exe

C:\Windows\system32\msiexec.exe /V

C:\Users\Admin\AppData\Roaming\taskdl.exe

taskdl.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c 115001733129410.bat

C:\Windows\SysWOW64\attrib.exe

attrib +h +s F:\$RECYCLE

C:\Users\Admin\AppData\Roaming\ViraLock.exe

C:\Users\Admin\AppData\Roaming\ViraLock

C:\Windows\SysWOW64\msiexec.exe

"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe SETUPEXEDIR=C:\Users\Admin\AppData\Roaming\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\ViraLock"

C:\Windows\SysWOW64\reg.exe

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1

C:\Windows\SysWOW64\reg.exe

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2

C:\Windows\SysWOW64\reg.exe

reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pckccIcA.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""

C:\Users\Admin\AppData\Roaming\Annabelle.exe

"C:\Users\Admin\AppData\Roaming\Annabelle.exe"

C:\Windows\SysWOW64\wbem\WMIC.exe

"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive

C:\Windows\System32\vssadmin.exe

"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet

C:\Windows\SysWOW64\reg.exe

"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\services\VSS" /v Start /t REG_DWORD /d 4 /f

C:\Windows\SysWOW64\reg.exe

"C:\Windows\System32\reg.exe" add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v DisableSR /t REG_DWORD /d 1 /f

C:\Users\Admin\AppData\Roaming\Cerber5.exe

"C:\Users\Admin\AppData\Roaming\Cerber5.exe"

C:\Users\Admin\AppData\Roaming\CryptoWall.exe

"C:\Users\Admin\AppData\Roaming\CryptoWall.exe"

C:\Windows\SysWOW64\net.exe

"C:\Windows\System32\net.exe" stop vss

C:\Windows\syswow64\MsiExec.exe

C:\Windows\syswow64\MsiExec.exe -Embedding 872C2D752991E14D10871977673557AD

C:\Users\Admin\AppData\Roaming\Dharma.exe

"C:\Users\Admin\AppData\Roaming\Dharma.exe"

C:\Users\Admin\AppData\Roaming\Krotten.exe

"C:\Users\Admin\AppData\Roaming\Krotten.exe"

C:\Windows\SysWOW64\cmd.exe

/c schtasks /Delete /F /TN rhaegal

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop vss

C:\Windows\SYSTEM32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\SYSTEM32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop swprv

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #1

C:\Windows\SysWOW64\cmd.exe

/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2766519108 && exit"

C:\Windows\SysWOW64\cscript.exe

cscript //nologo c.vbs

C:\Windows\SysWOW64\netsh.exe

C:\Windows\system32\netsh.exe advfirewall set allprofiles state on

C:\Windows\SysWOW64\cmd.exe

/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 09:08:00

C:\Users\Admin\AppData\Local\Temp\1A1B.tmp

"C:\Users\Admin\AppData\Local\Temp\1A1B.tmp" \\.\pipe\{DF5E66F3-A3AC-4102-B51B-3D50E1016C15}

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\SysWOW64\netsh.exe

C:\Windows\system32\netsh.exe advfirewall reset

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop srservice

C:\Windows\SysWOW64\reg.exe

reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f

C:\Windows\SysWOW64\cscript.exe

cscript.exe //nologo m.vbs

C:\Users\Admin\AppData\Local\Temp\ac\nc123.exe

"C:\Users\Admin\AppData\Local\Temp\ac\nc123.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\USAD2-54HTZ-TZTXH-TFTZY.HTML

C:\Windows\SysWOW64\schtasks.exe

schtasks /Delete /F /TN rhaegal

C:\Users\Admin\AppData\Local\Temp\ac\mssql2.exe

"C:\Users\Admin\AppData\Local\Temp\ac\mssql2.exe"

C:\Windows\SysWOW64\schtasks.exe

schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2766519108 && exit"

C:\Users\Admin\AppData\Roaming\taskdl.exe

taskdl.exe

C:\Windows\SysWOW64\cscript.exe

cscript C:\Users\Admin\AppData\Local\Temp/file.vbs

C:\Windows\SysWOW64\cscript.exe

cscript C:\Users\Admin\AppData\Local\Temp/file.vbs

C:\Windows\SysWOW64\reg.exe

REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64

C:\ProgramData\HMooQgwU\DAgksEoM.exe

"C:\ProgramData\HMooQgwU\DAgksEoM.exe"

C:\Windows\SysWOW64\reg.exe

REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64

C:\Windows\SysWOW64\reg.exe

REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64

C:\Users\Admin\AppData\Roaming\PolyRansom.exe

"C:\Users\Admin\AppData\Roaming\PolyRansom.exe"

C:\Users\Admin\AppData\Roaming\PowerPoint.exe

"C:\Users\Admin\AppData\Roaming\PowerPoint.exe"

C:\Users\Admin\AppData\Local\Temp\sys3.exe

C:\Users\Admin\AppData\Local\Temp\\sys3.exe

C:\Windows\System32\mshta.exe

"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"

C:\Windows\syswow64\MsiExec.exe

C:\Windows\syswow64\MsiExec.exe -Embedding DA26D85EA70A746BC2F370519A4CA997

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
BO 200.87.164.69:9999 tcp
US 8.8.8.8:53 google.com udp
GB 142.250.187.238:80 google.com tcp
BO 200.87.164.69:9999 tcp
GB 142.250.187.238:80 google.com tcp
US 8.8.8.8:53 238.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 6pi3jrqjbssfh6gu.onion.pw udp
US 144.202.70.158:80 6pi3jrqjbssfh6gu.onion.pw tcp
US 8.8.8.8:53 158.70.202.144.in-addr.arpa udp
US 8.8.8.8:53 blockchain.info udp
US 104.16.236.243:443 blockchain.info tcp
US 8.8.8.8:53 243.236.16.104.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 144.202.70.158:80 6pi3jrqjbssfh6gu.onion.pw tcp
US 8.8.8.8:53 www.blockchain.com udp
US 104.17.11.85:443 www.blockchain.com tcp
US 144.202.70.158:443 6pi3jrqjbssfh6gu.onion.pw tcp
US 8.8.8.8:53 85.11.17.104.in-addr.arpa udp
US 8.8.8.8:53 r10.i.lencr.org udp
BO 200.119.204.12:9999 tcp
US 95.100.195.186:80 r10.i.lencr.org tcp
BO 200.119.204.12:9999 tcp
US 8.8.8.8:53 186.195.100.95.in-addr.arpa udp
US 8.8.8.8:53 jaster.in udp
US 8.8.8.8:53 ip-addr.es udp
FR 188.165.164.184:80 ip-addr.es tcp
US 8.8.8.8:53 184.164.165.188.in-addr.arpa udp
FR 188.165.164.184:443 ip-addr.es tcp
US 184.164.136.134:80 tcp
N/A 10.127.0.1:445 tcp
US 8.8.8.8:53 125.21.192.23.in-addr.arpa udp
N/A 10.127.0.1:445 tcp
N/A 10.127.0.1:445 tcp
NL 20.190.160.14:445 login.live.com tcp
US 199.232.210.172:445 ctldl.windowsupdate.com tcp
N/A 10.127.0.1:139 tcp
GB 142.250.187.238:445 google.com tcp
GB 2.23.210.83:445 ctldl.windowsupdate.com tcp
N/A 10.127.0.1:139 tcp
NL 20.190.160.14:139 login.live.com tcp
US 199.232.210.172:139 ctldl.windowsupdate.com tcp
DE 131.188.40.189:443 tcp
N/A 10.127.0.1:139 tcp
GB 142.250.187.238:139 google.com tcp
GB 2.23.210.83:139 ctldl.windowsupdate.com tcp
US 8.8.8.8:53 189.40.188.131.in-addr.arpa udp
US 8.8.8.8:53 r10.o.lencr.org udp
GB 2.18.190.80:80 r10.o.lencr.org tcp
US 8.8.8.8:53 80.190.18.2.in-addr.arpa udp
BO 190.186.45.170:9999 tcp
US 8.8.8.8:53 arizonacode.bplaced.net udp
BO 190.186.45.170:9999 tcp
DE 162.55.0.137:80 arizonacode.bplaced.net tcp
BO 200.87.164.69:9999 tcp
FR 94.247.28.26:2525 tcp
GB 142.250.187.238:80 google.com tcp
US 144.202.70.158:80 6pi3jrqjbssfh6gu.onion.pw tcp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 137.0.55.162.in-addr.arpa udp
US 144.202.70.158:443 6pi3jrqjbssfh6gu.onion.pw tcp
GB 142.250.187.238:80 google.com tcp
US 95.100.195.186:445 r10.i.lencr.org tcp
FI 37.27.61.180:445 tcp
US 95.100.195.186:139 r10.i.lencr.org tcp
BO 200.87.164.69:9999 tcp
GB 142.250.187.238:80 google.com tcp
US 144.202.70.158:445 6pi3jrqjbssfh6gu.onion.pw tcp
FI 37.27.61.180:139 tcp
US 144.202.70.158:139 6pi3jrqjbssfh6gu.onion.pw tcp
US 8.8.8.8:53 jaster.in udp
US 8.8.8.8:53 synlogosttloeq2pwb4w6zaibacubnedji46bmsd3mhapesyeqa4xpqd.onion udp
US 8.8.8.8:53 wtepgfycbrqjavn.net udp
GB 142.250.187.238:80 google.com tcp
BO 200.87.164.69:9999 tcp
DE 162.55.0.137:80 arizonacode.bplaced.net tcp
US 8.8.8.8:53 xefgknfqqwlnacj.biz udp
BO 200.119.204.12:9999 tcp
FR 94.247.31.19:8080 tcp

Files

memory/4764-0-0x00007FFDBCAD3000-0x00007FFDBCAD5000-memory.dmp

memory/4764-1-0x0000000000CA0000-0x0000000001CA0000-memory.dmp

C:\Users\Admin\AppData\Roaming\Avoid.exe

MD5 20d2c71d6d9daf4499ffc4a5d164f1c3
SHA1 38e5dcd93f25386d05a34a5b26d3fba1bf02f7c8
SHA256 3ac8cc58dcbceaec3dab046aea050357e0e2248d30b0804c738c9a5b037c220d
SHA512 8ffd56fb3538eb60da2dde9e3d6eee0dac8419c61532e9127f47c4351b6e53e01143af92b2e26b521e23cdbbf15d7a358d3757431e572e37a1eede57c7d39704

C:\Users\Admin\AppData\Roaming\ChilledWindows.exe

MD5 6a4853cd0584dc90067e15afb43c4962
SHA1 ae59bbb123e98dc8379d08887f83d7e52b1b47fc
SHA256 ccb9502bf8ba5becf8b758ca04a5625c30b79e2d10d2677cc43ae4253e1288ec
SHA512 feb223e0de9bd64e32dc4f3227e175b58196b5e614bca8c2df0bbca2442a564e39d66bcd465154149dc7ebbd3e1ca644ed09d9a9174b52236c76e7388cb9d996

C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe

MD5 bc1e7d033a999c4fd006109c24599f4d
SHA1 b927f0fc4a4232a023312198b33272e1a6d79cec
SHA256 13adae722719839af8102f98730f3af1c5a56b58069bfce8995acd2123628401
SHA512 f5d9b8c1fd9239894ec9c075542bff0bcef79871f31038e627ae257b8c1db9070f4d124448a78e60ccc8bc12f138102a54825e9d7647cd34832984c7c24a6276

C:\Users\Admin\AppData\Roaming\CrazyNCS.exe

MD5 d043ba91e42e0d9a68c9866f002e8a21
SHA1 e9f177e1c57db0a15d1dc6b3e6c866d38d85b17c
SHA256 6820c71df417e434c5ad26438c901c780fc5a80b28a466821b47d20b8424ef08
SHA512 3e9783646e652e9482b3e7648fb0a5f7c8b6c386bbc373d5670d750f6f99f6137b5501e21332411609cbcc0c20f829ab8705c2835e2756455f6754c9975ac6bd

C:\Users\Admin\AppData\Roaming\DesktopBoom.exe

MD5 f0a661d33aac3a3ce0c38c89bec52f89
SHA1 709d6465793675208f22f779f9e070ed31d81e61
SHA256 c20e78ce9028299d566684d35b1230d055e5ea0e9b94d0aff58f650e0468778a
SHA512 57cdb3c38f2e90d03e6dc1f9d8d1131d40d3919f390bb1783343c82465461319e70483dc3cd3efdbd9a62dfc88d74fc706f05d760ffd8506b16fd7686e414443

C:\Users\Admin\AppData\Roaming\Curfun.exe

MD5 0b3b2dff5503cb032acd11d232a3af55
SHA1 6efc31c1d67f70cf77c319199ac39f70d5a7fa95
SHA256 ef878461a149024f3065121ff4e165731ecabef1b94b0b3ed2eda010ad39202b
SHA512 484014d65875e706f7e5e5f54c2045d620e5cce5979bf7f37b45c613e6d948719c0b8e466df5d8908706133ce4c4b71a11b804417831c9dbaf72b6854231ea17

C:\Users\Admin\AppData\Roaming\Flasher.exe

MD5 9254ca1da9ff8ad492ca5fa06ca181c6
SHA1 70fa62e6232eae52467d29cf1c1dacb8a7aeab90
SHA256 30676ad5dc94c3fec3d77d87439b2bf0a1aaa7f01900b68002a06f11caee9ce6
SHA512 a84fbbdea4e743f3e41878b9cf6db219778f1479aa478100718af9fc8d7620fc7a3295507e11df39c7863cb896f946514e50368db480796b6603c8de5580685a

memory/1448-79-0x000000001C320000-0x000000001C7EE000-memory.dmp

C:\Users\Admin\AppData\Roaming\Hydra.exe

MD5 b2eca909a91e1946457a0b36eaf90930
SHA1 3200c4e4d0d4ece2b2aadb6939be59b91954bcfa
SHA256 0b6c0af51cde971b3e5f8aa204f8205418ab8c180b79a5ac1c11a6e0676f0f7c
SHA512 607d20e4a46932c7f4d9609ef9451e2303cd79e7c4778fe03f444e7dc800d6de7537fd2648c7c476b9f098588dc447e8c39d8b21cd528d002dfa513a19c6ebbf

memory/1448-69-0x000000001BDA0000-0x000000001BE46000-memory.dmp

memory/1448-58-0x00000000017F0000-0x0000000001800000-memory.dmp

memory/1476-54-0x00007FFDBCAD0000-0x00007FFDBD591000-memory.dmp

memory/1476-52-0x00000000009E0000-0x0000000000E44000-memory.dmp

C:\Users\Admin\AppData\Roaming\Launcher.exe

MD5 7506eb94c661522aff09a5c96d6f182b
SHA1 329bbdb1f877942d55b53b1d48db56a458eb2310
SHA256 d5b962dfe37671b5134f0b741a662610b568c2b5374010ee92b5b7857d87872c
SHA512 d815a9391ef3d508b89fc221506b95f4c92d586ec38f26aec0f239750f34cf398eed3d818fa439f6aa6ed3b30f555a1903d93eeeec133b80849a4aa6685ec070

memory/1448-96-0x000000001C900000-0x000000001C99C000-memory.dmp

C:\Users\Admin\AppData\Roaming\Melting.exe

MD5 833619a4c9e8c808f092bf477af62618
SHA1 b4a0efa26f790e991cb17542c8e6aeb5030d1ebf
SHA256 92a284981c7ca33f1af45ce61738479fbcbb5a4111f5498e2cb54931c8a36c76
SHA512 4f231fc16339d568b5cf9353133aeae835eb262dab68bc80d92f37b43df64dce4fae0e913cbaa3bb61351a759aeecf9d280bc5779b0853c980559a654d6cca11

memory/1448-140-0x000000001CA60000-0x000000001CAAC000-memory.dmp

C:\Users\Admin\AppData\Roaming\Time.exe

MD5 9d0d2fcb45b1ff9555711b47e0cd65e5
SHA1 958f29a99cbb135c92c5d1cdffb9462be35ee9fd
SHA256 dc476ae39effdd80399b6e36f1fde92c216a5bbdb6b8b2a7ecbe753e91e4c993
SHA512 8fd4ce4674cd52a3c925149945a7a50a139302be17f6ee3f30271ebe1aa6d92bcb15a017dca989cd837a5d23cd56eaacc6344dc7730234a4629186976c857ca9

memory/1064-158-0x0000000004D30000-0x0000000004DC2000-memory.dmp

C:\Users\Admin\AppData\Roaming\ScreenScrew.exe

MD5 e87a04c270f98bb6b5677cc789d1ad1d
SHA1 8c14cb338e23d4a82f6310d13b36729e543ff0ca
SHA256 e03520794f00fb39ef3cfff012f72a5d03c60f89de28dbe69016f6ed151b5338
SHA512 8784f4d42908e54ecedfb06b254992c63920f43a27903ccedd336daaeed346db44e1f40e7db971735da707b5b32206be1b1571bc0d6a2d6eb90bbf9d1f69de13

C:\Users\Admin\AppData\Roaming\Trololo.exe

MD5 b6d61b516d41e209b207b41d91e3b90d
SHA1 e50d4b7bf005075cb63d6bd9ad48c92a00ee9444
SHA256 3d0efd55bde5fb7a73817940bac2a901d934b496738b7c5cab7ea0f6228e28fe
SHA512 3217fc904e4c71b399dd273786634a6a6c19064a9bf96960df9b3357001c12b9547813412173149f6185eb5d300492d290342ec955a8347c6f9dcac338c136da

C:\Users\Admin\AppData\Roaming\Vista.exe

MD5 faa6cb3e816adaeaabf2930457c79c33
SHA1 6539de41b48d271bf4237e6eb09b0ee40f9a2140
SHA256 6680317e6eaa04315b47aaadd986262cd485c8a4bd843902f4c779c858a3e31b
SHA512 58859556771203d736ee991b651a6a409de7e3059c2afe81d4545864295c383f75cfbabf3cffaa0c412a6ec27bf939f0893c28152f53512c7885e597db8d2c66

C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe

MD5 6e49c75f701aa059fa6ed5859650b910
SHA1 ccb7898c509c3a1de96d2010d638f6a719f6f400
SHA256 f91f02fd27ada64f36f6df59a611fef106ff7734833dea825d0612e73bdfb621
SHA512 ccd1b581a29de52d2313a97eb3c3b32b223dba1e7a49c83f7774b374bc2d16b13fba9566de6762883f3b64ed8e80327b454e5d32392af2a032c22653fed0fff8

C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe

MD5 515198a8dfa7825f746d5921a4bc4db9
SHA1 e1da0b7f046886c1c4ff6993f7f98ee9a1bc90ae
SHA256 0fda176b199295f72fafc3bc25cefa27fa44ed7712c3a24ca2409217e430436d
SHA512 9e47037fe40b79ebf056a9c6279e318d85da9cd7e633230129d77a1b8637ecbafc60be38dd21ca9077ebfcb9260d87ff7fcc85b8699b3135148fe956972de3e8

memory/1476-217-0x000000001EFD0000-0x000000001EFD8000-memory.dmp

memory/2944-225-0x0000000000400000-0x00000000006BC000-memory.dmp

C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe

MD5 e263c5b306480143855655233f76dc5a
SHA1 e7dcd6c23c72209ee5aa0890372de1ce52045815
SHA256 1f69810b8fe71e30a8738278adf09dd982f7de0ab9891d296ce7ea61b3fa4f69
SHA512 e95981eae02d0a8bf44493c64cca8b7e50023332e91d75164735a1d0e38138f358100c93633ff3a0652e1c12a5155cba77d81e01027422d7d5f71000eafb4113

C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe

MD5 bd65d387482def1fe00b50406f731763
SHA1 d06a2ba2e29228f443f97d1dd3a8da5dd7df5903
SHA256 1ab7375550516d7445c47fd9b551ed864f227401a14ff3f1ff0d70caca3bd997
SHA512 351ecd109c4d49bc822e8ade73a9516c4a531ebcda63546c155e677dcff19708068dc588b2fcf30cad086238e8b206fc5f349d37dda02d3c3a8d9b570d92e4d9

C:\Users\Admin\AppData\Roaming\RedBoot.exe

MD5 e0340f456f76993fc047bc715dfdae6a
SHA1 d47f6f7e553c4bc44a2fe88c2054de901390b2d7
SHA256 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887
SHA512 cac10c675d81630eefca49b2ac4cc83f3eb29115ee28a560db4d6c33f70bf24980e48bb48ce20375349736e3e6b23a1ca504b9367917328853fffc5539626bbc

memory/2292-248-0x00000000049B0000-0x0000000004A4C000-memory.dmp

memory/2292-250-0x0000000004D30000-0x0000000004D86000-memory.dmp

memory/2292-247-0x0000000000090000-0x0000000000102000-memory.dmp

memory/2444-252-0x00000000005C0000-0x000000000084E000-memory.dmp

memory/1476-242-0x000000001F030000-0x000000001F03E000-memory.dmp

memory/1476-241-0x000000001F060000-0x000000001F098000-memory.dmp

C:\Users\Admin\AppData\Roaming\RedEye.exe

MD5 e9e5596b42f209cc058b55edc2737a80
SHA1 f30232697b3f54e58af08421da697262c99ec48b
SHA256 9ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305
SHA512 e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7

C:\Users\Admin\AppData\Roaming\Rensenware.exe

MD5 60335edf459643a87168da8ed74c2b60
SHA1 61f3e01174a6557f9c0bfc89ae682d37a7e91e2e
SHA256 7bf5623f0a10dfa148a35bebd899b7758612f1693d2a9910f716cf15a921a76a
SHA512 b4e5e4d4f0b4a52243d6756c66b4fe6f4b39e64df7790072046e8a3dadad3a1be30b8689a1bab8257cc35cb4df652888ddf62b4e1fccb33e1bbf1f5416d73efb

C:\Users\Admin\42355084\protect.exe

MD5 fd414666a5b2122c3d9e3e380cf225ed
SHA1 de139747b42a807efa8a2dcc1a8304f9a29b862d
SHA256 e61a8382f7293e40cb993ddcbcaa53a4e5f07a3d6b6a1bfe5377a1a74a8dcac6
SHA512 9ab2163d7deff29c202ed88dba36d5b28f6c67e647a0cadb3d03cc725796e19e5f298c04b1c8523d1d1ee4307e1a5d6f8156fa4021627d6ca1bbd0830695ae05

C:\Users\Admin\AppData\Roaming\Rokku.exe

MD5 97512f4617019c907cd0f88193039e7c
SHA1 24cfa261ee30f697e7d1e2215eee1c21eebf4579
SHA256 438888ef36bad1079af79daf152db443b4472c5715a7b3da0ba24cc757c53499
SHA512 cfbb8dd91434f917d507cb919aa7e6b16b7b2056d56185f6ad5b6149e05629325cdb3df907f58bb3f634b17a9989bf5b6d6b81f5396a3a556431742ed742ac4a

C:\Users\Admin\AppData\Roaming\Satana.exe

MD5 46bfd4f1d581d7c0121d2b19a005d3df
SHA1 5b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256 683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512 b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5

C:\Users\Admin\AppData\Roaming\satan.exe

MD5 c9c341eaf04c89933ed28cbc2739d325
SHA1 c5b7d47aef3bd33a24293138fcba3a5ff286c2a8
SHA256 1a0a2fd546e3c05e15b2db3b531cb8e8755641f5f1c17910ce2fb7bbce2a05b7
SHA512 7cfa6ec0be0f5ae80404c6c709a6fd00ca10a18b6def5ca746611d0d32a9552f7961ab0ebf8a336b27f7058d700205be7fcc859a30d7d185aa9457267090f99b

C:\Users\Admin\42355084\assembler.exe

MD5 7e3cea1f686207563c8369f64ea28e5b
SHA1 a1736fd61555841396b0406d5c9ca55c4b6cdf41
SHA256 2a5305369edb9c2d7354b2f210e91129e4b8c546b0adf883951ea7bf7ee0f2b2
SHA512 4629bc32094bdb030e6c9be247068e7295599203284cb95921c98fcbe3ac60286670be7e5ee9f0374a4017286c7af9db211bd831e3ea871d31a509d7bbc1d6a3

memory/920-331-0x0000027A72540000-0x0000027A72FDC000-memory.dmp

memory/3332-345-0x0000000000400000-0x0000000000412000-memory.dmp

C:\Users\Admin\AppData\Roaming\SporaRansomware.exe

MD5 4a4a6d26e6c8a7df0779b00a42240e7b
SHA1 8072bada086040e07fa46ce8c12bf7c453c0e286
SHA256 7ad9ed23a91643b517e82ad5740d24eca16bcae21cfe1c0da78ee80e0d1d3f02
SHA512 c7a7b15d8dbf8e8f8346a4dab083bb03565050281683820319906da4d23b97b39e88f841b30fc8bd690c179a8a54870238506ca60c0f533d34ac11850cdc1a95

C:\Users\Admin\AppData\Roaming\Olza\gohix.exe

MD5 2fc045985c02043baa02df691a6edd87
SHA1 f17350f693b09a67f8e6c645a2298cae2d620fee
SHA256 8236699ec1d4031ae589329887e0852177b6f430469917f2c8e16ec709cbfac3
SHA512 530cdeba7c74b7fb8f5a0234ce72314b85656e92a5cfe4afb41a33168a90f7e887f91630ddf2f72d981e2c5cea78727b041e8685948347bac557aed841099f62

memory/1336-373-0x0000000000400000-0x0000000000407200-memory.dmp

C:\Users\Admin\AppData\Roaming\WannaCry.exe

MD5 5c7fb0927db37372da25f270708103a2
SHA1 120ed9279d85cbfa56e5b7779ffa7162074f7a29
SHA256 be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844
SHA512 a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206

C:\Users\Admin\AppData\Roaming\ViraLock.exe

MD5 8803d517ac24b157431d8a462302b400
SHA1 b56afcad22e8cda4d0e2a98808b8e8c5a1059d4e
SHA256 418395efd269bc6534e02c92cb2c568631ada6e54bc55ade4e4a5986605ff786
SHA512 38fdfe0bc873e546b05a8680335526eec61ccc8cf3f37c60eee0bc83ec54570077f1dc1da26142488930eabcc21cb7a33c1b545a194cbfb4c87e430c4b2bfb50

C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe

MD5 84c82835a5d21bbcf75a61706d8ab549
SHA1 5ff465afaabcbf0150d1a3ab2c2e74f3a4426467
SHA256 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
SHA512 90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244

memory/2956-455-0x0000000000FF0000-0x00000000010FB000-memory.dmp

memory/2956-447-0x0000000000E20000-0x0000000000EBB000-memory.dmp

memory/3236-401-0x0000000000400000-0x0000000000432000-memory.dmp

memory/1128-468-0x0000023704160000-0x0000023704177000-memory.dmp

memory/212-486-0x00000000021B0000-0x00000000021C7000-memory.dmp

C:\Users\Admin\AppData\Roaming\Xyeta.exe

MD5 9d15a3b314600b4c08682b0202700ee7
SHA1 208e79cdb96328d5929248bb8a4dd622cf0684d1
SHA256 3ab3833e31e4083026421c641304369acfd31b957b78af81f3c6ef4968ef0e15
SHA512 9916397b782aaafa68eb6a781ea9a0db27f914035dd586142c818ccbd7e69036896767bedba97489d5100de262a554cf14bcdf4a24edda2c5d37217b265398d3

memory/5912-618-0x0000000000400000-0x000000000044F000-memory.dmp

C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\decoder.dll

MD5 3531cf7755b16d38d5e9e3c43280e7d2
SHA1 19981b17ae35b6e9a0007551e69d3e50aa1afffe
SHA256 76133e832c15aa5cbc49fb3ba09e0b8dd467c307688be2c9e85e79d3bf62c089
SHA512 7b053ba2cf92ef2431b98b2a06bd56340dad94de36d11e326a80cd61b9acb378ac644ac407cf970f4ef8333b8d3fb4ff40b18bb41ec5aee49d79a6a2adcf28fd

C:\Users\Admin\AppData\Roaming\7ev3n.exe

MD5 9f8bc96c96d43ecb69f883388d228754
SHA1 61ed25a706afa2f6684bb4d64f69c5fb29d20953
SHA256 7d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5
SHA512 550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6

C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi

MD5 27bc9540828c59e1ca1997cf04f6c467
SHA1 bfa6d1ce9d4df8beba2bedf59f86a698de0215f3
SHA256 05c18698c3dc3b2709afd3355ad5b91a60b2121a52e5fcc474e4e47fb8e95e2a
SHA512 a3ae822116cddb52d859de7ffc958541bb47c355a835c5129aade9cc0e5fba3ff25387061deb5b55b5694a535f09fe8669485282eb6e7c818cc7092eb3392848

C:\Users\Admin\AppData\Roaming\Annabelle.exe

MD5 62c174d3fbf0855fc55177f4e8248a1b
SHA1 9983467382641159412a29a39fc942c55c826f49
SHA256 6d5bafb5f97a71ce226c2083d6769cca955500af73d056087c9f52e5abb4560c
SHA512 9315c8ada8d5a4852c464948fd6a99b64369ad01eb47e9b6836a8f763aa09378fc5a9c6ac6f8d88abacf005985d6773cc7a31b528df4965cda3b00776920d98b

memory/2444-650-0x00000000005C0000-0x000000000084E000-memory.dmp

memory/6020-632-0x0000000000DD0000-0x0000000000E3E000-memory.dmp

C:\Users\Admin\AppData\Roaming\@[email protected]

MD5 f97d2e6f8d820dbd3b66f21137de4f09
SHA1 596799b75b5d60aa9cd45646f68e9c0bd06df252
SHA256 0e5ece918132a2b1a190906e74becb8e4ced36eec9f9d1c70f5da72ac4c6b92a
SHA512 efda21d83464a6a32fdeef93152ffd32a648130754fdd3635f7ff61cc1664f7fc050900f0f871b0ddd3a3846222bf62ab5df8eed42610a76be66fff5f7b4c4c0

memory/3372-707-0x0000000000400000-0x000000000058D000-memory.dmp

C:\Users\Admin\AppData\Roaming\@[email protected]

MD5 7bf2b57f2a205768755c07f238fb32cc
SHA1 45356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256 b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA512 91a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9

memory/376-805-0x0000000000400000-0x0000000000432000-memory.dmp

memory/376-828-0x0000000000400000-0x0000000000432000-memory.dmp

memory/920-956-0x0000027A75510000-0x0000027A76526000-memory.dmp

memory/5408-957-0x000002006A360000-0x000002006B354000-memory.dmp

C:\Users\Admin\AppData\Roaming\Cerber5.exe

MD5 fe1bc60a95b2c2d77cd5d232296a7fa4
SHA1 c07dfdea8da2da5bad036e7c2f5d37582e1cf684
SHA256 b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d
SHA512 266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89

memory/920-1018-0x0000027A733B0000-0x0000027A733B6000-memory.dmp

memory/3744-1023-0x0000000000400000-0x0000000000438000-memory.dmp

C:\Users\Admin\AppData\Roaming\DeriaLock.exe

MD5 0a7b70efba0aa93d4bc0857b87ac2fcb
SHA1 01a6c963b2f5f36ff21a1043587dcf921ae5f5cd
SHA256 4f5bff64160044d9a769ab277ff85ba954e2a2e182c6da4d0672790cf1d48309
SHA512 2033f9637b8d023242c93f54c140dd561592a3380a15a9fdc8ebfa33385ff4fc569d66c846a01b4ac005f0521b3c219e87f4b1ed2a83557f9d95fa066ad25e14

memory/4204-1113-0x0000000000400000-0x000000000056F000-memory.dmp

memory/4552-1156-0x0000000000110000-0x0000000000192000-memory.dmp

C:\Users\Admin\AppData\Roaming\Dharma.exe

MD5 14c828927d4b46b94dd086a8f338f6a5
SHA1 4e73ea9f3e97c7e8c086c7bde71cb992b0d9aee5
SHA256 b210f1456ae00c1f861e502d7f82ebd40f9308cad2d58ce6b7f76c3885f6c7c3
SHA512 81cbd07408ea71d87bdb954babac529a00e2733eac1e540e304f722aa8a1106ca59654a818c6a318a77cb1d6d5c2951c7f2e79e70879182a86078e8db9d92157

memory/2076-1430-0x0000000000400000-0x0000000000432000-memory.dmp

C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe

MD5 63210f8f1dde6c40a7f3643ccf0ff313
SHA1 57edd72391d710d71bead504d44389d0462ccec9
SHA256 2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f
SHA512 87a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11

C:\Users\Admin\AppData\Roaming\NotPetya.exe

MD5 5b7e6e352bacc93f7b80bc968b6ea493
SHA1 e686139d5ed8528117ba6ca68fe415e4fb02f2be
SHA256 63545fa195488ff51955f09833332b9660d18f8afb16bdf579134661962e548a
SHA512 9d24af0cb00fb8a5e61e9d19cd603b5541a22ae6229c2acf498447e0e7d4145fee25c8ab9d5d5f18f554e6cbf8ca56b7ca3144e726d7dfd64076a42a25b3dfb6

memory/6200-1644-0x00000000049B0000-0x00000000049E2000-memory.dmp

C:\Users\Admin\AppData\Roaming\USAD2-54HTZ-TZTXH-TFTZY.LST

MD5 ec778ad3d2589b8a55ef658592dc7591
SHA1 8c834da8e9ee489a3afeaf26636102bd41b8b9de
SHA256 078dc6766d800c38ff40eb14977d96dee71fb8298b416c454e50b238d41366e4
SHA512 1f532197af6fa33f68baa8118f98d2525cc6d8e6fc87368138386b8c83d3733c4c8ce1007526563d0a121adc52294cda4b88b0ceb3da91582c19f03ef79003b6

C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{925951D7-4C16-4987-8C2E-58EF01B1BCD4}.session

MD5 10fc0ebe242b5a816051d93176b98c18
SHA1 cbe6511aa5a58280c49d4c82b7955d60a2ee7b2d
SHA256 2d4e5f1543c3d268c58c9258215ed227b11d30f0af45c3af25ffb2ad31eb8bc0
SHA512 adfc88db67f9d34766cb92eaa892dd06f6399db1f9604a46e1559229e8d55fe7c3ab168496c4f9248768f4079f4c86727d0bbdc8318d7d5bddb346c33179078e

C:\Users\Admin\AppData\Roaming\USAD2-54HTZ-TZTXH-TFTZY.HTML

MD5 deaaf086dd1052538305a0ecd24225b2
SHA1 6f8ecfe97dc210b976c28bb9782192c57b27fecb
SHA256 66f18b2a083c4e89b598f915307f989ef0c7be61011cf64409cfc2fa59a70189
SHA512 a3029c88e7a03ff7a56e9f1f98abbd82aee41b7a6098016114e4150f61562a7bfd68792ce8d1fe4e5ccab55aacc46d4a000b01be266be674f67997e3aa8dcec3

C:\Users\Admin\Documents\ReadReset.ppsm.WNCRY.locked

MD5 553dda8f9d6b50d4b2087d9b908e5ac5
SHA1 b5f9dbf4646ab7aea0fdadd4ce6e528b96f5a57b
SHA256 8288480cd94c59fce9ac64396943716caf1d0d20b21e459fed07abc490117909
SHA512 5c9a0d9e19ef8cc5994957b947cf8a6b0cc3997ea7f0535bed223866d7ccd26622ac1a9e72d46802af81b30fb204f5b4d36ff96158afa5e13b7feab89e7c1eb4

C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\tracking.ini

MD5 d6fd28eac341342fe37568de91fd573e
SHA1 f55105eff1482ef66b2ec7a1d94ace78d2528dbe
SHA256 ebee7c5ed5a5fa597ea299d22aa7ad61df0dc258afe03b58b52da46f75f6aad9
SHA512 38cac53af3c9a10e0eb79ca53473a16bb2fb02b13305d5b5952642247835cd760f657ec074dd9af9813015ddb33d215600289b1207da4f9af336647c9c1aecfd

memory/7620-2803-0x0000000000400000-0x0000000000432000-memory.dmp

C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.2BEAD9CFC7E2258C33225CBC4710820119A0810F043852923177A88F79346476

MD5 9ed6a4e10338e0264d3323400cef8939
SHA1 0bf318308a192e317ec78a152e0535e9967d563f
SHA256 a9326a8269c54f52a9bb0e00506b9e71caba0ae83563b58c7f1e91094502862f
SHA512 40cbeb0619288a35a541e3788bed334b47b662be8939c9a44d9a1e526fa7f0026ce73a0e5361e36bcd18828b32b82af943276fb93b5e58d457fdfab30f0d636d

C:\$Recycle.Bin\S-1-5-21-3756129449-3121373848-4276368241-1000\HQUIB-MANUAL.txt

MD5 e3a98d2f1b933c53b849438b4856cb53
SHA1 63376bda6412066c1282f5182880de3c70f103dc
SHA256 4fd901666b7f18c4dceed3b62ac27f0212513424a9315e244e24d603ce64ade6
SHA512 25ce109efa97ea52093917ea5791957e2589ea9e0bf67b4b96f072c7a6b83d3659f6f080fd537fba02f73d4fd4606e1e82e3dae2338eec538ae891dc0ba34ff3

C:\Users\Admin\AppData\Local\Temp\ac\mssql2.exe

MD5 d0821dd66ddfb5e7acbc57eef54d7358
SHA1 b9519b0a8ea507e2c4b1b09d3cf755ee4c97c821
SHA256 7b33c1db2cd01f831d108b72448280ef2bf9c1927782294f359917622871aba7
SHA512 c58d23611ebfb528345486c214d7598b5eee21a6118ed8aa83b70424179e2e571175fa6c79a24f009a0387419c225d14a0745724f12eae3513171970a90779fa

C:\Program Files\7-Zip\7z.dll.id-35318BDF.[[email protected]].ncov

MD5 f7c9c13cc0dcd5ad7828d98342c73691
SHA1 616fa58ed4bd53abe6a676ca51436c2c10a60459
SHA256 a0f9932b9f2f0922ba5aa518d2cae9a71a3a053d364d34e6cd9344aad1967f16
SHA512 4d4d1749ca3ca6081b13d7b21ab918a5c365c6b844cbaa264561f00e39f18865eacacb1b353d6df3b57f79b068ba3e387d81b12a64a2fb2b598743fde735a053

memory/7752-7712-0x0000000000400000-0x0000000000B02000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ac\lydgkhimpjyhfmuy.sys

MD5 b2233d1efb0b7a897ea477a66cd08227
SHA1 835a198a11c9d106fc6aabe26b9b3e59f6ec68fd
SHA256 5fd17e3b8827b5bb515343bc4066be0814f6466fb4294501becac284a378c0da
SHA512 6ca61854db877d767ce587ac3d7526cda8254d937a159fd985e0475d062d07ae83e7ff4f9f42c7e1e1cad5e1f408f6849866aa4e9e48b29d80510e5c695cee37

memory/17032-13235-0x0000000000400000-0x0000000000434000-memory.dmp

memory/47908-21330-0x0000000000400000-0x000000000042E000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 fff5429eb52f2b7a62d7b4fe7ab8da55
SHA1 c5b500bc2dcdfd5e0ff08ced32b67c2d3c2638ff
SHA256 c24dc3fe792370d9ab360a409d9cfe4d826c08c2b0dd98073377341326d0a1fa
SHA512 97f815b35395236f2743d464496064e391d833bc7117faaa1f3c18cf45b9671ca02eb40392666273fb67b3b7edabac982b3112c7d4c025c6ce1d538b4da720e7

memory/7752-30259-0x0000000000400000-0x0000000000B02000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\SooE.exe

MD5 298930e2d03e6744bc902c7ad63d8ff4
SHA1 1999a7ada2842536a58c4e1e76cce8fba7355f47
SHA256 844a47177a15644f1aa4412ec69c80b829fb543069fec3038fcc623c6c5830ed
SHA512 18a6ad16ef6ba02330fec807e1ff27211d32295c04b8fb672143a3e6ec666e7c268ecbf2812b3e985609974c9deafff16cb8393c69220f8687b6e7f41cf30c41

memory/20468-30450-0x0000000000400000-0x0000000000410000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\wIME.exe

MD5 e1ac74b091a004f52ddd69a494cbe1df
SHA1 51f621c82a548fb3b67be9ea1021a1ab7ffd9c17
SHA256 c70833df974b6f35b4604b2d9185a8ddf07b6fbf6e8d7f21e5f6e8481fe3d6d4
SHA512 f87323d749cc9d17c6fb6fe7a744696a7890d9f1ebd73bfe3730e8205fb825fb25717308852a608e7b1e72bcefb7c45d2f85f016e06083eece02a8b82695fae2

C:\Users\Admin\AppData\Local\Temp\OEwy.exe

MD5 0f86946151484373ef6e9a343251b5eb
SHA1 d7ec4f668744a2fd0b7124750404a23cd18642e6
SHA256 a9e5821a525d79e29b9416c03a9f77fe6b2b6b969b4169e31fc2639b4dc73312
SHA512 aeb21214ff9427a5d7c6f76fee60de43a15772028045f5a83162ba5b77ecd814af530611c0513896f6b449a27c4b947ae9f40ec3ccd489c11557b77308ca2d89

C:\Users\Admin\AppData\Roaming\Heap41A.exe

MD5 4f30003916cc70fca3ce6ec3f0ff1429
SHA1 7a12afdc041a03da58971a0f7637252ace834353
SHA256 746153871f816ece357589b2351818e449b1beecfb21eb75a3305899ce9ae37c
SHA512 e679a0f4b7292aedc9cd3a33cf150312ea0b1d712dd8ae8b719dedf92cc230330862f395e4f8da21c37d55a613d82a07d28b7fe6b5db6009ba8a30396caa5029

C:\Users\Admin\FqsUogEI\cOIEMksU.inf

MD5 7985d2bf2c936965507122e10979a5b0
SHA1 94e786006549ac8da07e3d34e7028fa23eda5870
SHA256 eb1ca20a8f8de24a214bebda418c9bcdc1f098f5c73280b6b546e1756ee8688e
SHA512 26d0a848ae18b24c55cb735ceeb7a590c4e08dba90e78d93572388cbc933677b47816089b0a6a8f7a7413446daf5524cfe53ee84c28e99fee8bba9cb1e9dfdc9

memory/15164-30547-0x0000000000400000-0x0000000000410000-memory.dmp

memory/4748-30559-0x0000000000400000-0x000000000042E000-memory.dmp

memory/556-30571-0x0000000000400000-0x0000000000434000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-02 09:16

Reported

2024-12-02 09:19

Platform

win7-20240903-en

Max time kernel

17s

Max time network

34s

Command Line

"taskhost.exe"

Signatures

Gandcrab

ransomware backdoor gandcrab

Gandcrab family

gandcrab

HawkEye

keylogger trojan stealer spyware hawkeye

Hawkeye family

hawkeye

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\Xyeta.exe" C:\Users\Admin\AppData\Roaming\Xyeta.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\Xyeta.exe" C:\Users\Admin\AppData\Roaming\Xyeta.exe N/A

Satana

ransomware satana

Satana family

satana

Wannacry

ransomware worm wannacry

Wannacry family

wannacry

Deletes shadow copies

ransomware defense_evasion impact execution

Renames multiple (272) files with added filename extension

ransomware

Event Triggered Execution: Image File Execution Options Injection

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe C:\Users\Admin\AppData\Roaming\Xyeta.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "calc.exe" C:\Users\Admin\AppData\Roaming\Xyeta.exe N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Credentials from Password Stores: Windows Credential Manager

credential_access stealer

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9bf0c776.exe C:\Windows\syswow64\explorer.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\RFSDBRWMX-MANUAL.txt C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6b2043326b2044d56a.lock C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\US3AC-DAXFT-XTXTX-HTOHT-XYYYY.HTML C:\Users\Admin\AppData\Roaming\SporaRansomware.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SDF8EB.tmp C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SDF8FF.tmp C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Avoid.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChilledWindows.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\CrazyNCS.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Curfun.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\DesktopBoom.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Flasher.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Hydra.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Launcher.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Melting.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Popup.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\rickroll.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ScreenScrew.exe N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Time.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Trololo.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Vista.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\RedBoot.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\RedEye.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Rensenware.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Rokku.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Satana.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Seftad.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\SporaRansomware.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ViraLock.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\WannaCry.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Xyeta.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\$uckyLocker.exe N/A
N/A N/A C:\Users\Admin\wyskgMYs\GmoEYggY.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\7ev3n.exe N/A
N/A N/A C:\ProgramData\igIEgssk\RQEcIwQg.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Annabelle.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\taskdl.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\BadRabbit.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Birele.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Cerber5.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\CoronaVirus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\CryptoLocker.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\CryptoWall.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Satana.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\DeriaLock.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Dharma.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Fantom.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Krotten.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\NotPetya.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ViraLock.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Petya.A.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\PolyRansom.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\PowerPoint.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Bezilom.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Bumerang.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*bf0c776 = "C:\\Users\\Admin\\AppData\\Roaming\\9bf0c776.exe" C:\Windows\syswow64\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Update Task Scheduler = "\"C:\\Users\\Admin\\AppData\\Roaming\\WannaCry.exe\" /r" C:\Users\Admin\AppData\Roaming\WannaCry.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\GmoEYggY.exe = "C:\\Users\\Admin\\wyskgMYs\\GmoEYggY.exe" C:\Users\Admin\AppData\Roaming\ViraLock.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RQEcIwQg.exe = "C:\\ProgramData\\igIEgssk\\RQEcIwQg.exe" C:\Users\Admin\AppData\Roaming\ViraLock.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\{3AA72D4F-4A3E-65F4-C3E9-D97C02965D68} = "C:\\Users\\Admin\\AppData\\Roaming\\Gona\\okgai.exe" C:\Windows\system32\taskhost.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\GmoEYggY.exe = "C:\\Users\\Admin\\wyskgMYs\\GmoEYggY.exe" C:\Users\Admin\wyskgMYs\GmoEYggY.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*bf0c77 = "C:\\9bf0c776\\9bf0c776.exe" C:\Windows\syswow64\explorer.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\9bf0c776 = "C:\\Users\\Admin\\AppData\\Roaming\\9bf0c776.exe" C:\Windows\syswow64\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RQEcIwQg.exe = "C:\\ProgramData\\igIEgssk\\RQEcIwQg.exe" C:\ProgramData\igIEgssk\RQEcIwQg.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\erexru = "C:\\Users\\Admin\\AppData\\Local\\Temp\\!satana!.txt" C:\Users\Admin\AppData\Roaming\Satana.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\9bf0c77 = "C:\\9bf0c776\\9bf0c776.exe" C:\Windows\syswow64\explorer.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A

File and Directory Permissions Modification: Windows File and Directory Permissions Modification

defense_evasion

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-addr.es N/A N/A
N/A myexternalip.com N/A N/A

System Binary Proxy Execution: Verclsid

defense_evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\verclsid.exe N/A
N/A N/A C:\Windows\SysWOW64\verclsid.exe N/A

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PHYSICALDRIVE0 C:\Users\Admin\AppData\Roaming\Seftad.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Sets desktop wallpaper using registry

ransomware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskhost.exe N/A
N/A N/A C:\Windows\system32\Dwm.exe N/A
N/A N/A C:\Windows\system32\taskhost.exe N/A
N/A N/A C:\Windows\system32\Dwm.exe N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\system32\taskhost.exe N/A
N/A N/A C:\Windows\system32\Dwm.exe N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\system32\taskhost.exe N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3032 set thread context of 888 N/A C:\Users\Admin\AppData\Roaming\satan.exe C:\Users\Admin\AppData\Roaming\satan.exe
PID 2404 set thread context of 1792 N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe C:\Users\Admin\AppData\Roaming\Gona\okgai.exe
PID 1340 set thread context of 1816 N/A C:\Users\Admin\AppData\Roaming\Satana.exe C:\Users\Admin\AppData\Roaming\Satana.exe

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\BlockResume.mhtml C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\UnpublishBackup.jpeg C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File created C:\Program Files (x86)\6b2043326b2044d56a.lock C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\RFSDBRWMX-MANUAL.txt C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\6b2043326b2044d56a.lock C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File created C:\Program Files\6b2043326b2044d56a.lock C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\EnterMount.vsdx C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\SkipResolve.3gp2 C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\StepReceive.php C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6b2043326b2044d56a.lock C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\CloseClear.dwg C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\ConvertSelect.aif C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\ExitRemove.dib C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\HideRepair.rmi C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\LockPing.xlsb C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\PushSubmit.avi C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\RepairExport.wm C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\ResolveStop.sql C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\ShowDismount.odt C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\SuspendUnlock.ppsx C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\WatchEnable.zip C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\WatchHide.xla C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\WatchRestore.mp3 C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\ClearCheckpoint.vsd C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\EnterResume.xlsb C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\NewJoin.eps C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\SubmitRestart.htm C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\UnprotectStop.mpeg2 C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\RFSDBRWMX-MANUAL.txt C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File created C:\Program Files\RFSDBRWMX-MANUAL.txt C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\CompressTrace.tiff C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\GroupRequest.vsx C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\InvokeUnblock.rm C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\StopCompress.tiff C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\UnpublishUpdate.M2T C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\FormatBackup.mpg C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\FormatInvoke.pps C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\LockCopy.pps C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\ReadInvoke.mhtml C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\ConvertFromEnable.bmp C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\InitializeDisable.xml C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\RegisterDisconnect.vdx C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\RFSDBRWMX-MANUAL.txt C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\RemoveHide.vssx C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File opened for modification C:\Program Files\UnprotectLock.dotx C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File created C:\Program Files (x86)\RFSDBRWMX-MANUAL.txt C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6b2043326b2044d56a.lock C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\perfc.dat C:\Users\Admin\AppData\Roaming\NotPetya.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Cerber5.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\syswow64\svchost.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Launcher.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Hydra.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Avoid.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Vista.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\CryptoWall.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\attrib.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Popup.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\ScreenScrew.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\wyskgMYs\GmoEYggY.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\ProgramData\igIEgssk\RQEcIwQg.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\CoronaVirus.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\CryptoLocker.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\icacls.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\CrazyNCS.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Flasher.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Fantom.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Bezilom.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\ViraLock.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Satana.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\syswow64\explorer.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cscript.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\satan.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\WannaCry.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\satan.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Time.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\RedBoot.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\SporaRansomware.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\ViraLock.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\DeriaLock.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cscript.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Curfun.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Satana.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\$uckyLocker.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Birele.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Krotten.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\PowerPoint.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Seftad.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\System32\vssadmin.exe N/A
N/A N/A C:\Windows\syswow64\vssadmin.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\satan.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ViraLock.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ViraLock.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Gona\okgai.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GandCrab.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\CryptoWall.exe N/A
N/A N/A C:\Windows\syswow64\explorer.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Roaming\Time.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Roaming\Krotten.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Fantom.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Avoid.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Xyeta.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChilledWindows.exe N/A

Suspicious use of UnmapMainImage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Cerber5.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2400 wrote to memory of 2136 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Avoid.exe
PID 2400 wrote to memory of 2136 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Avoid.exe
PID 2400 wrote to memory of 2136 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Avoid.exe
PID 2400 wrote to memory of 2136 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Avoid.exe
PID 2400 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\ChilledWindows.exe
PID 2400 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\ChilledWindows.exe
PID 2400 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\ChilledWindows.exe
PID 2400 wrote to memory of 2104 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe
PID 2400 wrote to memory of 2104 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe
PID 2400 wrote to memory of 2104 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe
PID 2400 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\CrazyNCS.exe
PID 2400 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\CrazyNCS.exe
PID 2400 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\CrazyNCS.exe
PID 2400 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\CrazyNCS.exe
PID 2400 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Curfun.exe
PID 2400 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Curfun.exe
PID 2400 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Curfun.exe
PID 2400 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Curfun.exe
PID 2400 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\DesktopBoom.exe
PID 2400 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\DesktopBoom.exe
PID 2400 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\DesktopBoom.exe
PID 2400 wrote to memory of 2832 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Flasher.exe
PID 2400 wrote to memory of 2832 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Flasher.exe
PID 2400 wrote to memory of 2832 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Flasher.exe
PID 2400 wrote to memory of 2832 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Flasher.exe
PID 2400 wrote to memory of 2728 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Hydra.exe
PID 2400 wrote to memory of 2728 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Hydra.exe
PID 2400 wrote to memory of 2728 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Hydra.exe
PID 2400 wrote to memory of 2728 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Hydra.exe
PID 2400 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Launcher.exe
PID 2400 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Launcher.exe
PID 2400 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Launcher.exe
PID 2400 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Launcher.exe
PID 2400 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Launcher.exe
PID 2400 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Launcher.exe
PID 2400 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Launcher.exe
PID 2400 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Melting.exe
PID 2400 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Melting.exe
PID 2400 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Melting.exe
PID 2400 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Popup.exe
PID 2400 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Popup.exe
PID 2400 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Popup.exe
PID 2400 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Popup.exe
PID 2400 wrote to memory of 1868 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\rickroll.exe
PID 2400 wrote to memory of 1868 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\rickroll.exe
PID 2400 wrote to memory of 1868 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\rickroll.exe
PID 2400 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\ScreenScrew.exe
PID 2400 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\ScreenScrew.exe
PID 2400 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\ScreenScrew.exe
PID 2400 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\ScreenScrew.exe
PID 2400 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Time.exe
PID 2400 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Time.exe
PID 2400 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Time.exe
PID 2400 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Time.exe
PID 2400 wrote to memory of 1384 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Trololo.exe
PID 2400 wrote to memory of 1384 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Trololo.exe
PID 2400 wrote to memory of 1384 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Trololo.exe
PID 2400 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Vista.exe
PID 2400 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Vista.exe
PID 2400 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Vista.exe
PID 2400 wrote to memory of 1600 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Vista.exe
PID 2400 wrote to memory of 2016 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe
PID 2400 wrote to memory of 2016 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe
PID 2400 wrote to memory of 2016 N/A C:\Users\Admin\AppData\Local\Temp\freehacks.exe C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Windows\system32\taskhost.exe

"taskhost.exe"

C:\Windows\system32\Dwm.exe

"C:\Windows\system32\Dwm.exe"

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}

C:\Users\Admin\AppData\Local\Temp\freehacks.exe

"C:\Users\Admin\AppData\Local\Temp\freehacks.exe"

C:\Users\Admin\AppData\Roaming\Avoid.exe

"C:\Users\Admin\AppData\Roaming\Avoid.exe"

C:\Users\Admin\AppData\Roaming\ChilledWindows.exe

"C:\Users\Admin\AppData\Roaming\ChilledWindows.exe"

C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe

"C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe"

C:\Users\Admin\AppData\Roaming\CrazyNCS.exe

"C:\Users\Admin\AppData\Roaming\CrazyNCS.exe"

C:\Users\Admin\AppData\Roaming\Curfun.exe

"C:\Users\Admin\AppData\Roaming\Curfun.exe"

C:\Users\Admin\AppData\Roaming\DesktopBoom.exe

"C:\Users\Admin\AppData\Roaming\DesktopBoom.exe"

C:\Users\Admin\AppData\Roaming\Flasher.exe

"C:\Users\Admin\AppData\Roaming\Flasher.exe"

C:\Users\Admin\AppData\Roaming\Hydra.exe

"C:\Users\Admin\AppData\Roaming\Hydra.exe"

C:\Users\Admin\AppData\Roaming\Launcher.exe

"C:\Users\Admin\AppData\Roaming\Launcher.exe"

C:\Users\Admin\AppData\Roaming\Melting.exe

"C:\Users\Admin\AppData\Roaming\Melting.exe"

C:\Users\Admin\AppData\Roaming\Popup.exe

"C:\Users\Admin\AppData\Roaming\Popup.exe"

C:\Users\Admin\AppData\Roaming\rickroll.exe

"C:\Users\Admin\AppData\Roaming\rickroll.exe"

C:\Users\Admin\AppData\Roaming\ScreenScrew.exe

"C:\Users\Admin\AppData\Roaming\ScreenScrew.exe"

C:\Users\Admin\AppData\Roaming\Time.exe

"C:\Users\Admin\AppData\Roaming\Time.exe"

C:\Users\Admin\AppData\Roaming\Trololo.exe

"C:\Users\Admin\AppData\Roaming\Trololo.exe"

C:\Users\Admin\AppData\Roaming\Vista.exe

"C:\Users\Admin\AppData\Roaming\Vista.exe"

C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe

"C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe"

C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe

"C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe"

C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe

"C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe"

C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe

"C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe"

C:\Users\Admin\AppData\Roaming\RedBoot.exe

"C:\Users\Admin\AppData\Roaming\RedBoot.exe"

C:\Users\Admin\AppData\Roaming\RedEye.exe

"C:\Users\Admin\AppData\Roaming\RedEye.exe"

C:\Users\Admin\AppData\Roaming\Rensenware.exe

"C:\Users\Admin\AppData\Roaming\Rensenware.exe"

C:\Users\Admin\AppData\Roaming\Rokku.exe

"C:\Users\Admin\AppData\Roaming\Rokku.exe"

C:\Windows\system32\conhost.exe

\??\C:\Windows\system32\conhost.exe "1514662147-1101916255-870117591127602195429391355420297047011497896101595886359"

C:\Users\Admin\AppData\Roaming\satan.exe

"C:\Users\Admin\AppData\Roaming\satan.exe"

C:\Users\Admin\AppData\Roaming\Satana.exe

"C:\Users\Admin\AppData\Roaming\Satana.exe"

C:\Users\Admin\AppData\Roaming\Seftad.exe

"C:\Users\Admin\AppData\Roaming\Seftad.exe"

C:\Users\Admin\AppData\Roaming\SporaRansomware.exe

"C:\Users\Admin\AppData\Roaming\SporaRansomware.exe"

C:\Users\Admin\AppData\Roaming\satan.exe

"C:\Users\Admin\AppData\Roaming\satan.exe"

C:\Users\Admin\AppData\Roaming\ViraLock.exe

"C:\Users\Admin\AppData\Roaming\ViraLock.exe"

C:\Users\Admin\AppData\Roaming\Gona\okgai.exe

"C:\Users\Admin\AppData\Roaming\Gona\okgai.exe"

C:\Users\Admin\AppData\Roaming\WannaCry.exe

"C:\Users\Admin\AppData\Roaming\WannaCry.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_768663b8.bat"

C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe

"C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe"

C:\Users\Admin\AppData\Roaming\Gona\okgai.exe

"C:\Users\Admin\AppData\Roaming\Gona\okgai.exe"

C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe

"C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe"

C:\Windows\system32\conhost.exe

\??\C:\Windows\system32\conhost.exe "533515787-1738167246258916508748044399742047307869905828-17967773021113131873"

C:\Users\Admin\AppData\Roaming\Xyeta.exe

"C:\Users\Admin\AppData\Roaming\Xyeta.exe"

C:\Users\Admin\AppData\Roaming\$uckyLocker.exe

"C:\Users\Admin\AppData\Roaming\$uckyLocker.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c 35461733135397.bat

C:\Windows\system32\conhost.exe

\??\C:\Windows\system32\conhost.exe "-1711119370-113709395218865051219053838441387485019-1942401196-1339430302-1180878217"

C:\Users\Admin\AppData\Roaming\7ev3n.exe

"C:\Users\Admin\AppData\Roaming\7ev3n.exe"

C:\Windows\SysWOW64\attrib.exe

attrib +h .

C:\Users\Admin\wyskgMYs\GmoEYggY.exe

"C:\Users\Admin\wyskgMYs\GmoEYggY.exe"

C:\Windows\SysWOW64\icacls.exe

icacls . /grant Everyone:F /T /C /Q

C:\Windows\system32\conhost.exe

\??\C:\Windows\system32\conhost.exe "254497598412324902-2065445553-20748075291419358680-1421429058-21255895881080975784"

C:\Windows\system32\conhost.exe

\??\C:\Windows\system32\conhost.exe "-1378428098549471286-1421370185-1890501149-16662438-328566376-905356993-1927572050"

C:\ProgramData\igIEgssk\RQEcIwQg.exe

"C:\ProgramData\igIEgssk\RQEcIwQg.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c "C:\Users\Admin\AppData\Roaming\ViraLock"

C:\Windows\SysWOW64\reg.exe

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1

C:\Windows\SysWOW64\reg.exe

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2

C:\Windows\SysWOW64\reg.exe

reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\RwMMYIAc.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""

C:\Users\Admin\AppData\Roaming\taskdl.exe

taskdl.exe

C:\Users\Admin\AppData\Roaming\Annabelle.exe

"C:\Users\Admin\AppData\Roaming\Annabelle.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c 126641733135400.bat

C:\Users\Admin\AppData\Roaming\BadRabbit.exe

"C:\Users\Admin\AppData\Roaming\BadRabbit.exe"

C:\Users\Admin\AppData\Roaming\Birele.exe

"C:\Users\Admin\AppData\Roaming\Birele.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 732

C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe

dw20.exe -x -s 512

C:\Users\Admin\AppData\Roaming\Cerber5.exe

"C:\Users\Admin\AppData\Roaming\Cerber5.exe"

C:\Users\Admin\AppData\Roaming\CoronaVirus.exe

"C:\Users\Admin\AppData\Roaming\CoronaVirus.exe"

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"

C:\Windows\System32\vssadmin.exe

"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet

C:\Users\Admin\AppData\Roaming\CryptoWall.exe

"C:\Users\Admin\AppData\Roaming\CryptoWall.exe"

C:\Users\Admin\AppData\Roaming\Satana.exe

"C:\Users\Admin\AppData\Roaming\Satana.exe"

C:\Users\Admin\AppData\Roaming\DeriaLock.exe

"C:\Users\Admin\AppData\Roaming\DeriaLock.exe"

C:\Users\Admin\AppData\Roaming\Dharma.exe

"C:\Users\Admin\AppData\Roaming\Dharma.exe"

C:\Users\Admin\AppData\Roaming\Fantom.exe

"C:\Users\Admin\AppData\Roaming\Fantom.exe"

C:\Windows\syswow64\explorer.exe

"C:\Windows\syswow64\explorer.exe"

C:\Users\Admin\AppData\Roaming\GandCrab.exe

"C:\Users\Admin\AppData\Roaming\GandCrab.exe"

C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe

"C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe"

C:\Users\Admin\AppData\Roaming\Krotten.exe

"C:\Users\Admin\AppData\Roaming\Krotten.exe"

C:\Windows\SysWOW64\attrib.exe

attrib +h +s F:\$RECYCLE

C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe

"C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe"

C:\Users\Admin\AppData\Roaming\NotPetya.exe

"C:\Users\Admin\AppData\Roaming\NotPetya.exe"

C:\Windows\SysWOW64\cscript.exe

cscript //nologo c.vbs

C:\Users\Admin\AppData\Roaming\ViraLock.exe

C:\Users\Admin\AppData\Roaming\ViraLock

C:\Windows\syswow64\svchost.exe

-k netsvcs

C:\Windows\syswow64\vssadmin.exe

vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\PetrWrap

C:\Users\Admin\AppData\Roaming\Petya.A.exe

"C:\Users\Admin\AppData\Roaming\Petya.A.exe"

C:\Windows\SysWOW64\cscript.exe

cscript C:\Users\Admin\AppData\Local\Temp/file.vbs

C:\Windows\SysWOW64\cmd.exe

cmd /c "C:\Users\Admin\AppData\Roaming\ViraLock"

C:\Users\Admin\AppData\Roaming\PolyRansom.exe

"C:\Users\Admin\AppData\Roaming\PolyRansom.exe"

C:\Windows\SysWOW64\reg.exe

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1

C:\Users\Admin\AppData\Roaming\PowerPoint.exe

"C:\Users\Admin\AppData\Roaming\PowerPoint.exe"

C:\Windows\SysWOW64\cscript.exe

cscript.exe //nologo m.vbs

C:\Users\Admin\AppData\Roaming\Bezilom.exe

"C:\Users\Admin\AppData\Roaming\Bezilom.exe"

C:\Windows\SysWOW64\reg.exe

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2

C:\Users\Admin\AppData\Roaming\Bumerang.exe

"C:\Users\Admin\AppData\Roaming\Bumerang.exe"

C:\Users\Admin\AppData\Roaming\Fagot.a.exe

"C:\Users\Admin\AppData\Roaming\Fagot.a.exe"

C:\Windows\SysWOW64\reg.exe

reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\BkEQoUAk.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""

C:\Users\Admin\AppData\Roaming\@[email protected]

@[email protected] co

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c start /b @[email protected] vs

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\HeadTail.vbs"

C:\Windows\SysWOW64\ddraw32.dll

C:\Windows\system32\ddraw32.dll

C:\Windows\SysWOW64\cmd.exe

cmd /c "C:\Users\Admin\AppData\Roaming\PolyRansom"

C:\Windows\SysWOW64\ddraw32.dll

C:\Windows\system32\ddraw32.dll :C:\Users\Admin\AppData\Roaming\Bumerang.exe

C:\Windows\SysWOW64\reg.exe

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1

C:\Windows\SysWOW64\reg.exe

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2

C:\Windows\SysWOW64\reg.exe

reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\RQwcAEcI.bat" "C:\Users\Admin\AppData\Roaming\PolyRansom.exe""

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 656

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 600

C:\Windows\system32\verclsid.exe

"C:\Windows\system32\verclsid.exe" /S /C {871C5380-42A0-1069-A2EA-08002B30309D} /I {000214E6-0000-0000-C000-000000000046} /X 0x401

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 612

C:\Users\Admin\AppData\Local\system.exe

"C:\Users\Admin\AppData\Local\system.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 632

C:\Users\Admin\AppData\Roaming\@[email protected]

@[email protected] vs

C:\Users\Admin\91111980\protect.exe

"C:\Users\Admin\91111980\protect.exe"

C:\Users\Admin\91111980\assembler.exe

"C:\Users\Admin\91111980\assembler.exe" -f bin "C:\Users\Admin\91111980\boot.asm" -o "C:\Users\Admin\91111980\boot.bin"

C:\Users\Admin\91111980\overwrite.exe

"C:\Users\Admin\91111980\overwrite.exe" "C:\Users\Admin\91111980\boot.bin"

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Windows\SysWOW64\msiexec.exe

"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe SETUPEXEDIR=C:\Users\Admin\AppData\Roaming\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Windows\system32\taskkill.exe

taskkill.exe /f /im explorer.exe

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Windows\SysWOW64\verclsid.exe

"C:\Windows\system32\verclsid.exe" /S /C {871C5380-42A0-1069-A2EA-08002B30309D} /I {000214E6-0000-0000-C000-000000000046} /X 0x401

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Windows\SysWOW64\rundll32.exe

C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 88

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

C:\Users\Admin\AppData\Roaming\CryptoLocker.exe

"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8

Network

Country Destination Domain Proto
BO 200.87.164.69:9999 tcp
BO 200.87.164.69:9999 tcp
US 8.8.8.8:53 google.com udp
US 8.8.8.8:53 google.com udp
GB 142.250.187.238:80 google.com tcp
GB 142.250.187.238:80 google.com tcp
RU 185.127.26.186:80 tcp
US 8.8.8.8:53 ip-addr.es udp
FR 188.165.164.184:80 ip-addr.es tcp
US 8.8.8.8:53 myexternalip.com udp
US 34.160.111.145:80 myexternalip.com tcp
FR 94.247.31.19:8080 tcp
US 8.8.8.8:53 blockchain.info udp
US 104.16.236.243:443 blockchain.info tcp
BO 200.119.204.12:9999 tcp
BO 200.119.204.12:9999 tcp

Files

memory/2400-0-0x000007FEF5213000-0x000007FEF5214000-memory.dmp

memory/2400-1-0x0000000000100000-0x0000000001100000-memory.dmp

C:\Users\Admin\AppData\Roaming\Avoid.exe

MD5 20d2c71d6d9daf4499ffc4a5d164f1c3
SHA1 38e5dcd93f25386d05a34a5b26d3fba1bf02f7c8
SHA256 3ac8cc58dcbceaec3dab046aea050357e0e2248d30b0804c738c9a5b037c220d
SHA512 8ffd56fb3538eb60da2dde9e3d6eee0dac8419c61532e9127f47c4351b6e53e01143af92b2e26b521e23cdbbf15d7a358d3757431e572e37a1eede57c7d39704

memory/2136-10-0x0000000000220000-0x0000000000221000-memory.dmp

C:\Users\Admin\AppData\Roaming\ChilledWindows.exe

MD5 6a4853cd0584dc90067e15afb43c4962
SHA1 ae59bbb123e98dc8379d08887f83d7e52b1b47fc
SHA256 ccb9502bf8ba5becf8b758ca04a5625c30b79e2d10d2677cc43ae4253e1288ec
SHA512 feb223e0de9bd64e32dc4f3227e175b58196b5e614bca8c2df0bbca2442a564e39d66bcd465154149dc7ebbd3e1ca644ed09d9a9174b52236c76e7388cb9d996

memory/2516-17-0x000007FEF5213000-0x000007FEF5214000-memory.dmp

C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe

MD5 bc1e7d033a999c4fd006109c24599f4d
SHA1 b927f0fc4a4232a023312198b33272e1a6d79cec
SHA256 13adae722719839af8102f98730f3af1c5a56b58069bfce8995acd2123628401
SHA512 f5d9b8c1fd9239894ec9c075542bff0bcef79871f31038e627ae257b8c1db9070f4d124448a78e60ccc8bc12f138102a54825e9d7647cd34832984c7c24a6276

memory/2516-23-0x0000000000CA0000-0x0000000001104000-memory.dmp

C:\Users\Admin\AppData\Roaming\CrazyNCS.exe

MD5 d043ba91e42e0d9a68c9866f002e8a21
SHA1 e9f177e1c57db0a15d1dc6b3e6c866d38d85b17c
SHA256 6820c71df417e434c5ad26438c901c780fc5a80b28a466821b47d20b8424ef08
SHA512 3e9783646e652e9482b3e7648fb0a5f7c8b6c386bbc373d5670d750f6f99f6137b5501e21332411609cbcc0c20f829ab8705c2835e2756455f6754c9975ac6bd

C:\Users\Admin\AppData\Roaming\Curfun.exe

MD5 0b3b2dff5503cb032acd11d232a3af55
SHA1 6efc31c1d67f70cf77c319199ac39f70d5a7fa95
SHA256 ef878461a149024f3065121ff4e165731ecabef1b94b0b3ed2eda010ad39202b
SHA512 484014d65875e706f7e5e5f54c2045d620e5cce5979bf7f37b45c613e6d948719c0b8e466df5d8908706133ce4c4b71a11b804417831c9dbaf72b6854231ea17

C:\Users\Admin\AppData\Roaming\DesktopBoom.exe

MD5 f0a661d33aac3a3ce0c38c89bec52f89
SHA1 709d6465793675208f22f779f9e070ed31d81e61
SHA256 c20e78ce9028299d566684d35b1230d055e5ea0e9b94d0aff58f650e0468778a
SHA512 57cdb3c38f2e90d03e6dc1f9d8d1131d40d3919f390bb1783343c82465461319e70483dc3cd3efdbd9a62dfc88d74fc706f05d760ffd8506b16fd7686e414443

C:\Users\Admin\AppData\Roaming\Flasher.exe

MD5 9254ca1da9ff8ad492ca5fa06ca181c6
SHA1 70fa62e6232eae52467d29cf1c1dacb8a7aeab90
SHA256 30676ad5dc94c3fec3d77d87439b2bf0a1aaa7f01900b68002a06f11caee9ce6
SHA512 a84fbbdea4e743f3e41878b9cf6db219778f1479aa478100718af9fc8d7620fc7a3295507e11df39c7863cb896f946514e50368db480796b6603c8de5580685a

C:\Users\Admin\AppData\Roaming\Hydra.exe

MD5 b2eca909a91e1946457a0b36eaf90930
SHA1 3200c4e4d0d4ece2b2aadb6939be59b91954bcfa
SHA256 0b6c0af51cde971b3e5f8aa204f8205418ab8c180b79a5ac1c11a6e0676f0f7c
SHA512 607d20e4a46932c7f4d9609ef9451e2303cd79e7c4778fe03f444e7dc800d6de7537fd2648c7c476b9f098588dc447e8c39d8b21cd528d002dfa513a19c6ebbf

C:\Users\Admin\AppData\Roaming\Launcher.exe

MD5 7506eb94c661522aff09a5c96d6f182b
SHA1 329bbdb1f877942d55b53b1d48db56a458eb2310
SHA256 d5b962dfe37671b5134f0b741a662610b568c2b5374010ee92b5b7857d87872c
SHA512 d815a9391ef3d508b89fc221506b95f4c92d586ec38f26aec0f239750f34cf398eed3d818fa439f6aa6ed3b30f555a1903d93eeeec133b80849a4aa6685ec070

C:\Users\Admin\AppData\Roaming\Popup.exe

MD5 9c3e9e30d51489a891513e8a14d931e4
SHA1 4e5a5898389eef8f464dee04a74f3b5c217b7176
SHA256 f8f7b5f20ca57c61df6dc8ff49f2f5f90276a378ec17397249fdc099a6e1dcd8
SHA512 bf45677b7dd6c67ad350ec6ecad5bc3f04dea179fae0ff0a695c69f7de919476dd7a69c25b04c8530a35119e4933f4a8c327ed6dcef892b1114dfd7e494a19a7

C:\Users\Admin\AppData\Roaming\rickroll.exe

MD5 0ec108e32c12ca7648254cf9718ad8d5
SHA1 78e07f54eeb6af5191c744ebb8da83dad895eca1
SHA256 48b08ea78124ca010784d9f0faae751fc4a0c72c0e7149ded81fc03819f5d723
SHA512 1129e685f5dd0cb2fa22ef4fe5da3f1e2632e890333ce17d3d06d04a4097b4d9f4ca7d242611ffc9e26079900945cf04ab6565a1c322e88e161f1929d18a2072

C:\Users\Admin\AppData\Roaming\Time.exe

MD5 9d0d2fcb45b1ff9555711b47e0cd65e5
SHA1 958f29a99cbb135c92c5d1cdffb9462be35ee9fd
SHA256 dc476ae39effdd80399b6e36f1fde92c216a5bbdb6b8b2a7ecbe753e91e4c993
SHA512 8fd4ce4674cd52a3c925149945a7a50a139302be17f6ee3f30271ebe1aa6d92bcb15a017dca989cd837a5d23cd56eaacc6344dc7730234a4629186976c857ca9

C:\Users\Admin\AppData\Roaming\ScreenScrew.exe

MD5 e87a04c270f98bb6b5677cc789d1ad1d
SHA1 8c14cb338e23d4a82f6310d13b36729e543ff0ca
SHA256 e03520794f00fb39ef3cfff012f72a5d03c60f89de28dbe69016f6ed151b5338
SHA512 8784f4d42908e54ecedfb06b254992c63920f43a27903ccedd336daaeed346db44e1f40e7db971735da707b5b32206be1b1571bc0d6a2d6eb90bbf9d1f69de13

C:\Users\Admin\AppData\Roaming\Trololo.exe

MD5 b6d61b516d41e209b207b41d91e3b90d
SHA1 e50d4b7bf005075cb63d6bd9ad48c92a00ee9444
SHA256 3d0efd55bde5fb7a73817940bac2a901d934b496738b7c5cab7ea0f6228e28fe
SHA512 3217fc904e4c71b399dd273786634a6a6c19064a9bf96960df9b3357001c12b9547813412173149f6185eb5d300492d290342ec955a8347c6f9dcac338c136da

C:\Users\Admin\AppData\Roaming\Melting.exe

MD5 833619a4c9e8c808f092bf477af62618
SHA1 b4a0efa26f790e991cb17542c8e6aeb5030d1ebf
SHA256 92a284981c7ca33f1af45ce61738479fbcbb5a4111f5498e2cb54931c8a36c76
SHA512 4f231fc16339d568b5cf9353133aeae835eb262dab68bc80d92f37b43df64dce4fae0e913cbaa3bb61351a759aeecf9d280bc5779b0853c980559a654d6cca11

C:\Users\Admin\AppData\Roaming\Vista.exe

MD5 faa6cb3e816adaeaabf2930457c79c33
SHA1 6539de41b48d271bf4237e6eb09b0ee40f9a2140
SHA256 6680317e6eaa04315b47aaadd986262cd485c8a4bd843902f4c779c858a3e31b
SHA512 58859556771203d736ee991b651a6a409de7e3059c2afe81d4545864295c383f75cfbabf3cffaa0c412a6ec27bf939f0893c28152f53512c7885e597db8d2c66

C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe

MD5 6e49c75f701aa059fa6ed5859650b910
SHA1 ccb7898c509c3a1de96d2010d638f6a719f6f400
SHA256 f91f02fd27ada64f36f6df59a611fef106ff7734833dea825d0612e73bdfb621
SHA512 ccd1b581a29de52d2313a97eb3c3b32b223dba1e7a49c83f7774b374bc2d16b13fba9566de6762883f3b64ed8e80327b454e5d32392af2a032c22653fed0fff8

memory/1084-122-0x0000000000400000-0x00000000006BC000-memory.dmp

C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe

MD5 515198a8dfa7825f746d5921a4bc4db9
SHA1 e1da0b7f046886c1c4ff6993f7f98ee9a1bc90ae
SHA256 0fda176b199295f72fafc3bc25cefa27fa44ed7712c3a24ca2409217e430436d
SHA512 9e47037fe40b79ebf056a9c6279e318d85da9cd7e633230129d77a1b8637ecbafc60be38dd21ca9077ebfcb9260d87ff7fcc85b8699b3135148fe956972de3e8

C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe

MD5 bd65d387482def1fe00b50406f731763
SHA1 d06a2ba2e29228f443f97d1dd3a8da5dd7df5903
SHA256 1ab7375550516d7445c47fd9b551ed864f227401a14ff3f1ff0d70caca3bd997
SHA512 351ecd109c4d49bc822e8ade73a9516c4a531ebcda63546c155e677dcff19708068dc588b2fcf30cad086238e8b206fc5f349d37dda02d3c3a8d9b570d92e4d9

C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe

MD5 e263c5b306480143855655233f76dc5a
SHA1 e7dcd6c23c72209ee5aa0890372de1ce52045815
SHA256 1f69810b8fe71e30a8738278adf09dd982f7de0ab9891d296ce7ea61b3fa4f69
SHA512 e95981eae02d0a8bf44493c64cca8b7e50023332e91d75164735a1d0e38138f358100c93633ff3a0652e1c12a5155cba77d81e01027422d7d5f71000eafb4113

memory/2016-128-0x0000000000350000-0x000000000040C000-memory.dmp

memory/2728-127-0x0000000000E90000-0x0000000000EA0000-memory.dmp

C:\Users\Admin\AppData\Roaming\RedBoot.exe

MD5 e0340f456f76993fc047bc715dfdae6a
SHA1 d47f6f7e553c4bc44a2fe88c2054de901390b2d7
SHA256 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887
SHA512 cac10c675d81630eefca49b2ac4cc83f3eb29115ee28a560db4d6c33f70bf24980e48bb48ce20375349736e3e6b23a1ca504b9367917328853fffc5539626bbc

memory/2268-138-0x0000000001320000-0x00000000015AE000-memory.dmp

C:\Users\Admin\AppData\Roaming\RedEye.exe

MD5 e9e5596b42f209cc058b55edc2737a80
SHA1 f30232697b3f54e58af08421da697262c99ec48b
SHA256 9ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305
SHA512 e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7

C:\Users\Admin\AppData\Roaming\Rensenware.exe

MD5 60335edf459643a87168da8ed74c2b60
SHA1 61f3e01174a6557f9c0bfc89ae682d37a7e91e2e
SHA256 7bf5623f0a10dfa148a35bebd899b7758612f1693d2a9910f716cf15a921a76a
SHA512 b4e5e4d4f0b4a52243d6756c66b4fe6f4b39e64df7790072046e8a3dadad3a1be30b8689a1bab8257cc35cb4df652888ddf62b4e1fccb33e1bbf1f5416d73efb

C:\Users\Admin\AppData\Roaming\Rokku.exe

MD5 97512f4617019c907cd0f88193039e7c
SHA1 24cfa261ee30f697e7d1e2215eee1c21eebf4579
SHA256 438888ef36bad1079af79daf152db443b4472c5715a7b3da0ba24cc757c53499
SHA512 cfbb8dd91434f917d507cb919aa7e6b16b7b2056d56185f6ad5b6149e05629325cdb3df907f58bb3f634b17a9989bf5b6d6b81f5396a3a556431742ed742ac4a

memory/1936-158-0x0000000000400000-0x000000000058D000-memory.dmp

C:\Users\Admin\AppData\Roaming\satan.exe

MD5 c9c341eaf04c89933ed28cbc2739d325
SHA1 c5b7d47aef3bd33a24293138fcba3a5ff286c2a8
SHA256 1a0a2fd546e3c05e15b2db3b531cb8e8755641f5f1c17910ce2fb7bbce2a05b7
SHA512 7cfa6ec0be0f5ae80404c6c709a6fd00ca10a18b6def5ca746611d0d32a9552f7961ab0ebf8a336b27f7058d700205be7fcc859a30d7d185aa9457267090f99b

C:\Users\Admin\AppData\Roaming\Satana.exe

MD5 46bfd4f1d581d7c0121d2b19a005d3df
SHA1 5b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256 683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512 b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5

C:\Users\Admin\AppData\Roaming\Seftad.exe

MD5 86a3a3ce16360e01933d71d0bf1f2c37
SHA1 af54089e3601c742d523b507b3a0793c2b6e60be
SHA256 2ebe23ba9897d9c127b9c0a737ba63af8d0bcd76ec866610cc0b5de2f62b87bd
SHA512 65a3571cf5b057d2c3ce101346947679f162018fa5eadf79c5a6af6c0a3bc9b12731ff13f27629b14983ef8bc73fa9782cc0a9e6c44b0ffc2627da754c324d6e

memory/892-185-0x0000000000400000-0x0000000000407200-memory.dmp

memory/1988-186-0x0000000001200000-0x0000000001272000-memory.dmp

C:\Users\Admin\AppData\Roaming\SporaRansomware.exe

MD5 4a4a6d26e6c8a7df0779b00a42240e7b
SHA1 8072bada086040e07fa46ce8c12bf7c453c0e286
SHA256 7ad9ed23a91643b517e82ad5740d24eca16bcae21cfe1c0da78ee80e0d1d3f02
SHA512 c7a7b15d8dbf8e8f8346a4dab083bb03565050281683820319906da4d23b97b39e88f841b30fc8bd690c179a8a54870238506ca60c0f533d34ac11850cdc1a95

memory/888-189-0x0000000000400000-0x0000000000412000-memory.dmp

memory/888-187-0x0000000000400000-0x0000000000412000-memory.dmp

memory/2304-192-0x0000000001020000-0x0000000001ABC000-memory.dmp

C:\Users\Admin\AppData\Roaming\ViraLock.exe

MD5 8803d517ac24b157431d8a462302b400
SHA1 b56afcad22e8cda4d0e2a98808b8e8c5a1059d4e
SHA256 418395efd269bc6534e02c92cb2c568631ada6e54bc55ade4e4a5986605ff786
SHA512 38fdfe0bc873e546b05a8680335526eec61ccc8cf3f37c60eee0bc83ec54570077f1dc1da26142488930eabcc21cb7a33c1b545a194cbfb4c87e430c4b2bfb50

memory/2472-200-0x0000000000400000-0x0000000000432000-memory.dmp

\Users\Admin\AppData\Roaming\Gona\okgai.exe

MD5 5273029483e8165cc31937a9e8e4f366
SHA1 231c0c04be69860c9f6b40dc755ac7a2d1c1f2ea
SHA256 c2c82c154e7fc3f0dd09f16b9928b8720b7820a2dfa6c1640c894e88bf44f3cb
SHA512 0c86e3b51be48ebbfb3a707a276e45f61ed1e966f3af81c01dbe7623d9199933f5325cff82fb2391efcd706a0c0d7c8a3eec79f03f60fbedfa0e30c4670071ac

C:\Users\Admin\AppData\Roaming\WannaCry.exe

MD5 5c7fb0927db37372da25f270708103a2
SHA1 120ed9279d85cbfa56e5b7779ffa7162074f7a29
SHA256 be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844
SHA512 a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206

memory/2404-217-0x0000000000660000-0x000000000078D000-memory.dmp

memory/2404-216-0x00000000002B0000-0x00000000002CF000-memory.dmp

memory/2404-215-0x00000000004E0000-0x000000000057F000-memory.dmp

memory/2404-214-0x0000000000410000-0x00000000004D9000-memory.dmp

memory/888-218-0x0000000000400000-0x0000000000412000-memory.dmp

C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe

MD5 dbfbf254cfb84d991ac3860105d66fc6
SHA1 893110d8c8451565caa591ddfccf92869f96c242
SHA256 68b0e1932f3b4439865be848c2d592d5174dbdbaab8f66104a0e5b28c928ee0c
SHA512 5e9ccdf52ebdb548c3fa22f22dd584e9a603ca1163a622db5707dbcc5d01e4835879dcfd28cb1589cbb25aed00f352f7a0a0962b1f38b68fc7d6693375e7666d

C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe

MD5 84c82835a5d21bbcf75a61706d8ab549
SHA1 5ff465afaabcbf0150d1a3ab2c2e74f3a4426467
SHA256 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
SHA512 90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244

memory/2404-223-0x0000000002140000-0x0000000002157000-memory.dmp

memory/2404-221-0x0000000000AA0000-0x0000000000BA9000-memory.dmp

memory/1792-249-0x00000000007A0000-0x0000000000811000-memory.dmp

C:\Users\Admin\AppData\Roaming\Xyeta.exe

MD5 9d15a3b314600b4c08682b0202700ee7
SHA1 208e79cdb96328d5929248bb8a4dd622cf0684d1
SHA256 3ab3833e31e4083026421c641304369acfd31b957b78af81f3c6ef4968ef0e15
SHA512 9916397b782aaafa68eb6a781ea9a0db27f914035dd586142c818ccbd7e69036896767bedba97489d5100de262a554cf14bcdf4a24edda2c5d37217b265398d3

C:\Users\Admin\AppData\Roaming\msg\m_finnish.wnry

MD5 35c2f97eea8819b1caebd23fee732d8f
SHA1 e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA256 1adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512 908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf

C:\Users\Admin\AppData\Roaming\$uckyLocker.exe

MD5 c850f942ccf6e45230169cc4bd9eb5c8
SHA1 51c647e2b150e781bd1910cac4061a2cee1daf89
SHA256 86e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f
SHA512 2b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9

memory/2188-271-0x0000000010000000-0x0000000010012000-memory.dmp

memory/2396-268-0x0000000000400000-0x000000000044F000-memory.dmp

memory/2400-267-0x000007FEF5213000-0x000007FEF5214000-memory.dmp

memory/1792-265-0x00000000021A0000-0x00000000022A9000-memory.dmp

memory/2304-252-0x000000001BDC0000-0x000000001CDD6000-memory.dmp

memory/1792-251-0x0000000000400000-0x0000000000417000-memory.dmp

memory/1792-248-0x0000000000670000-0x000000000079D000-memory.dmp

memory/1792-247-0x00000000003C0000-0x00000000003DF000-memory.dmp

memory/1792-246-0x00000000004F0000-0x000000000058F000-memory.dmp

memory/1792-245-0x0000000000420000-0x00000000004E9000-memory.dmp

memory/1792-243-0x0000000000400000-0x0000000000417000-memory.dmp

C:\Users\Admin\AppData\Roaming\35461733135397.bat

MD5 9f5718e808c505fa040e46bbccfe27f6
SHA1 3f0db8829183ea2242d90c019ec681c8321512c8
SHA256 a33f96b5bfcc643ba255fdd19b20a2efdb6c51639b522547dd4b59e08e2924dd
SHA512 dd96bca36023a1e1463a14e5d3877cc78ee59bc9f06b5d82f83cfe2e0eacd1c6fb44f8b22ac23ff2fde3a518907a9b83f954dc062b113def875cb11b09a841cd

memory/2304-294-0x00000000003C0000-0x00000000003C6000-memory.dmp

\Users\Admin\wyskgMYs\GmoEYggY.exe

MD5 1807ed10424f82eee06db5aac64d3089
SHA1 bc541fc52f4f3e11d46aa8d81f311a521f87e5a1
SHA256 91e5cd0d9abe642b325d718b28d93c2014abf842cb048e04b5352ceaff16a49f
SHA512 d6fdd7903e1a9ddfbb4ab0146a8b64baf59a75ed41614dbf70d89bafe87e7aa9bd59ffbcda7a1856d7a2687de7d40b41e084e0785275c3445779104566101b62

memory/2472-324-0x0000000000460000-0x000000000048E000-memory.dmp

C:\Users\Admin\AppData\Roaming\7ev3n.exe

MD5 9f8bc96c96d43ecb69f883388d228754
SHA1 61ed25a706afa2f6684bb4d64f69c5fb29d20953
SHA256 7d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5
SHA512 550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6

memory/2400-378-0x0000000008880000-0x0000000008897000-memory.dmp

memory/2400-376-0x0000000008880000-0x0000000008897000-memory.dmp

memory/2400-374-0x0000000008880000-0x0000000008897000-memory.dmp

memory/1580-371-0x0000000001D90000-0x0000000001DA7000-memory.dmp

memory/1580-369-0x0000000001D90000-0x0000000001DA7000-memory.dmp

memory/1580-367-0x0000000001D90000-0x0000000001DA7000-memory.dmp

memory/1208-364-0x0000000003BE0000-0x0000000003BF7000-memory.dmp

memory/1208-362-0x0000000003BE0000-0x0000000003BF7000-memory.dmp

memory/1208-360-0x0000000003BE0000-0x0000000003BF7000-memory.dmp

memory/1176-357-0x00000000001B0000-0x00000000001C7000-memory.dmp

memory/1176-355-0x00000000001B0000-0x00000000001C7000-memory.dmp

memory/1176-353-0x00000000001B0000-0x00000000001C7000-memory.dmp

memory/1108-350-0x0000000001FF0000-0x0000000002007000-memory.dmp

memory/1108-348-0x0000000001FF0000-0x0000000002007000-memory.dmp

memory/1108-346-0x0000000001FF0000-0x0000000002007000-memory.dmp

memory/1108-344-0x0000000001FF0000-0x0000000002007000-memory.dmp

memory/1792-343-0x0000000001FC0000-0x0000000001FD7000-memory.dmp

memory/1088-471-0x0000000000400000-0x000000000042E000-memory.dmp

memory/2472-340-0x0000000000460000-0x000000000048E000-memory.dmp

memory/1760-335-0x0000000010000000-0x0000000010010000-memory.dmp

memory/1084-470-0x0000000000400000-0x00000000006BC000-memory.dmp

memory/1864-516-0x0000000000400000-0x000000000042F000-memory.dmp

memory/2472-515-0x0000000000460000-0x000000000048F000-memory.dmp

\ProgramData\igIEgssk\RQEcIwQg.exe

MD5 c796362136932d94f1c47a349a9c61fe
SHA1 152519d89a888a54e94cfa8924cf7414ed4d0c41
SHA256 a66bf1549f7bab43c6310f86f51babab9aa3359536c8841e28fd51f5d24f613e
SHA512 cbda9c7e69b19f3dd2447da7ea5ebbfe4ae32a02632b140076b12cd50c3f5650a0409b325353fb82786ae3d6a802586250ab4631cacd187060fd164c4ab0a8ec

memory/2472-501-0x0000000000460000-0x000000000048F000-memory.dmp

memory/2268-500-0x0000000001320000-0x00000000015AE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\dsAkMkow.bat

MD5 0c8173d09ff82698fb72f8a6c31e2ad5
SHA1 8b62ed5095143495dbc4e97260155cb8b1a16678
SHA256 bed6212f185b417636b434ff529f83a256d47867b99b4343d7b7bbc527f22fb6
SHA512 e054f94201b03ac6971d118f795731b781c7b56dbaad44bd012448d17aaa451b73765f2357492af9948e7d1d0aeaa96ef489deb950cff9df0d3dd1b15e46c165

memory/2472-538-0x0000000000400000-0x0000000000432000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\RwMMYIAc.bat

MD5 bae1095f340720d965898063fede1273
SHA1 455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256 ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA512 4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

C:\Users\Admin\AppData\Roaming\US3AC-DAXFT-XTXTX-HTOHT-XYYYY.KEY

MD5 122b48076e0ef7eeb1216486abe7bb43
SHA1 44897c8f83db930da995ad8b40f117f6bb47c7b8
SHA256 71c3b0b9f65b6fa69f440cc8665cd6d4197bfc78d9db6c9c7aa7c972177c034e
SHA512 e35db63f5c6028379feeeb81671473cfef82f3126d9952f4e7322fdf49817f12e3df61ba06c6e5867a07f7a31a240a0388e464595b43ecf92ccaa632b0e711d5

C:\Users\Admin\AppData\Roaming\taskdl.exe

MD5 4fef5e34143e646dbf9907c4374276f5
SHA1 47a9ad4125b6bd7c55e4e7da251e23f089407b8f
SHA256 4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79
SHA512 4550dd1787deb353ebd28363dd2cdccca861f6a5d9358120fa6aa23baa478b2a9eb43cef5e3f6426f708a0753491710ac05483fac4a046c26bec4234122434d5

C:\Users\Admin\AppData\Roaming\126641733135400.bat

MD5 d60ef26cdec915e1e06f4ff89ce1ccff
SHA1 fc64aa9411af7b4e33150bac85ead3b0303c1b9b
SHA256 1e5a53b8996bb0672bc19e0a4bdd90fda584765cfb97a351ab3140e97bcd7dc2
SHA512 fc863758a533eff85e933eb15b3e6707966807874ea92e8d5673f8624920ad3e718fd5baf86d16356679189226ea1604e4c9099683ddae33720f3e26686356f5

C:\Users\Admin\AppData\Roaming\Birele.exe

MD5 41789c704a0eecfdd0048b4b4193e752
SHA1 fb1e8385691fa3293b7cbfb9b2656cf09f20e722
SHA256 b2dcfdf9e7b09f2aa5004668370e77982963ace820e7285b2e264a294441da23
SHA512 76391ac85fdc3be75441fcd6e19bed08b807d3946c7281c647f16a3be5388f7be307e6323fac8502430a4a6d800d52a88709592a49011ecc89de4f19102435ea

C:\Users\Admin\AppData\Roaming\@[email protected]

MD5 7bf2b57f2a205768755c07f238fb32cc
SHA1 45356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256 b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA512 91a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9

memory/2092-666-0x0000000000400000-0x0000000000438000-memory.dmp

C:\Users\Admin\AppData\Roaming\Cerber5.exe

MD5 fe1bc60a95b2c2d77cd5d232296a7fa4
SHA1 c07dfdea8da2da5bad036e7c2f5d37582e1cf684
SHA256 b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d
SHA512 266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89

memory/2396-751-0x0000000000400000-0x000000000044F000-memory.dmp

memory/316-752-0x0000000000400000-0x000000000056F000-memory.dmp

C:\Users\Admin\AppData\Roaming\CryptoWall.exe

MD5 919034c8efb9678f96b47a20fa6199f2
SHA1 747070c74d0400cffeb28fbea17b64297f14cfbd
SHA256 e036d68b8f8b7afc6c8b6252876e1e290f11a26d4ad18ac6f310662845b2c734
SHA512 745a81c50bbfd62234edb9788c83a22e0588c5d25c00881901923a02d7096c71ef5f0cd5b73f92ad974e5174de064b0c5ea8044509039aab14b2aed83735a7c4

memory/2680-783-0x0000000000810000-0x000000000087E000-memory.dmp

C:\Users\Admin\AppData\Roaming\GandCrab.exe

MD5 e6b43b1028b6000009253344632e69c4
SHA1 e536b70e3ffe309f7ae59918da471d7bf4cadd1c
SHA256 bfb9db791b8250ffa8ebc48295c5dbbca757a5ed3bbb01de12a871b5cd9afd5a
SHA512 07da214314673407a7d3978ee6e1d20bf1e02f135bf557e86b50489ecc146014f2534515c1b613dba96e65489d8c82caaa8ed2e647684d61e5e86bd3e8251adf

F:\US3AC-DAXFT-XTXTX-HTOHT-XYYYY.LST

MD5 88044ca96fde1be1c30c35dfd0a47799
SHA1 5275c8cd1b2174d054cdf48f3da4e4caba637e3d
SHA256 93da79086d4432bea05e44d35240b25eeb9216359fa58469d9f9a676e98f7fa7
SHA512 f2df2196c68933f6830fe94288f9e9efc87168762e2e726de9943246fe577b8227b373b31faef6e9cf79d670d2689d33584edcd7800d77b6006369ec44967ad5

F:\US3AC-DAXFT-XTXTX-HTOHT-XYYYY.HTML

MD5 90ea51439c3cb111c10499b2df09f869
SHA1 45a3735e62f9ca94faf037273c5cbce51a0eaa8e
SHA256 61af748c357e934d33f56734de241c89bb2e13a061b6d1aa7f0c1797f6aaf58a
SHA512 3165c620ca866a41ef787184a3e8204d5bc43513a0c08882082fc03410d0fe7582bf07eabca2d3fc7f905eaee89e8624a48e6cc5c62f9a576372595bc7834ce8

C:\Users\Admin\Documents\@[email protected]

MD5 f97d2e6f8d820dbd3b66f21137de4f09
SHA1 596799b75b5d60aa9cd45646f68e9c0bd06df252
SHA256 0e5ece918132a2b1a190906e74becb8e4ced36eec9f9d1c70f5da72ac4c6b92a
SHA512 efda21d83464a6a32fdeef93152ffd32a648130754fdd3635f7ff61cc1664f7fc050900f0f871b0ddd3a3846222bf62ab5df8eed42610a76be66fff5f7b4c4c0

C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\decoder.dll

MD5 3531cf7755b16d38d5e9e3c43280e7d2
SHA1 19981b17ae35b6e9a0007551e69d3e50aa1afffe
SHA256 76133e832c15aa5cbc49fb3ba09e0b8dd467c307688be2c9e85e79d3bf62c089
SHA512 7b053ba2cf92ef2431b98b2a06bd56340dad94de36d11e326a80cd61b9acb378ac644ac407cf970f4ef8333b8d3fb4ff40b18bb41ec5aee49d79a6a2adcf28fd

C:\Users\Admin\AppData\Roaming\Krotten.exe

MD5 87ccd6f4ec0e6b706d65550f90b0e3c7
SHA1 213e6624bff6064c016b9cdc15d5365823c01f5f
SHA256 e79f164ccc75a5d5c032b4c5a96d6ad7604faffb28afe77bc29b9173fa3543e4
SHA512 a72403d462e2e2e181dbdabfcc02889f001387943571391befed491aaecba830b0869bdd4d82bca137bd4061bbbfb692871b1b4622c4a7d9f16792c60999c990

memory/2976-1237-0x000000013FF30000-0x0000000140F24000-memory.dmp

C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\RFSDBRWMX-MANUAL.txt

MD5 110bc8138007013261f83b8808af568f
SHA1 3cfcd68097453a82bfec7d2265acbfddea5a9694
SHA256 664261c13650851730429276e8e1ae7947c08e6d44999b01bff0db2ddbe00ff4
SHA512 ea592286813475321898c804780bdbf9a26d90035dd217072fa5c4914e4782ac11f2922234db219734de9dd5b1b7af6845d3273f413f95c8d683f5b73997c7e5

memory/2504-1370-0x0000000000280000-0x00000000002B2000-memory.dmp

memory/3648-1371-0x0000000000400000-0x0000000000432000-memory.dmp

memory/668-1595-0x0000000000CF0000-0x0000000000D72000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\UyQYsMcc.bat

MD5 9a79da2b5f2311396019f832f2250956
SHA1 a409a7fb4baf0b70826eab6f9a59b61d9c284664
SHA256 89451ecf442f1ad9a69fa84e1ad591753c82d350b1f3faa202497c5ba122a67b
SHA512 9a075f3ba399c0868f4f50a7f2d36a3cb157bacc478ca43f52fe9daac2b89681e93ca4d2cf265a06a4b7c65dff6691b59eb0ab18a9495f2664163222cec2f65d

memory/2440-1804-0x0000000001F70000-0x0000000001FA2000-memory.dmp

memory/2440-1809-0x0000000001FC0000-0x0000000001FF2000-memory.dmp

C:\Users\Admin\AppData\Roaming\PolyRansom.exe

MD5 3ed3fb296a477156bc51aba43d825fc0
SHA1 9caa5c658b1a88fee149893d3a00b34a8bb8a1a6
SHA256 1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423
SHA512 dc3d6e409cee4d54f48d1a25912243d07e2f800578c8e0e348ce515a047ecf5fa3089b46284e0956bbced345957a000eecdc082e6f3060971759d70a14c1c97e

memory/3912-1821-0x0000000000400000-0x0000000000439000-memory.dmp

C:\Users\Admin\AppData\Roaming\PowerPoint.exe

MD5 70108103a53123201ceb2e921fcfe83c
SHA1 c71799a6a6d09ee758b04cdf90a4ab76fbd2a7e3
SHA256 9c3f8df80193c085912c9950c58051ae77c321975784cc069ceacd4f57d5861d
SHA512 996701c65eee7f781c2d22dce63f4a95900f36b97a99dcf833045bce239a08b3c2f6326b3a808431cdab92d59161dd80763e44126578e160d79b7095175d276b

memory/1072-2022-0x000000002AA00000-0x000000002AA24000-memory.dmp

C:\Users\Admin\AppData\Roaming\Bezilom.exe

MD5 8e9d7feb3b955e6def8365fd83007080
SHA1 df7522e270506b1a2c874700a9beeb9d3d233e23
SHA256 94d2b1da2c4ce7db94ee9603bc2f81386032687e7c664aff6460ba0f5dac0022
SHA512 4157a5628dc7f47489be2c30dbf2b14458a813eb66e942bba881615c101df25001c09afb9a54f88831fa4c1858f42d897f8f55fbf6b4c1a82d2509bd52ba1536

memory/3364-2176-0x0000000000400000-0x0000000000410000-memory.dmp

C:\Users\Admin\AppData\Roaming\Bumerang.exe

MD5 b6c78677b83c0a5b02f48648a9b8e86d
SHA1 0d90c40d2e9e8c58c1dafb528d6eab45e15fda81
SHA256 706fce69fea67622b03fafb51ece076c1fdd38892318f8cce9f2ec80aabca822
SHA512 302acca8c5dd310f86b65104f7accd290014e38d354e97e4ffafe1702b0a13b90e4823c274b51bcc9285419e69ff7111343ac0a64fd3c8b67c48d7bbd382337b

memory/1876-2239-0x0000000000370000-0x00000000003AC000-memory.dmp

C:\Users\Admin\AppData\Roaming\Fagot.a.exe

MD5 30cdab5cf1d607ee7b34f44ab38e9190
SHA1 d4823f90d14eba0801653e8c970f47d54f655d36
SHA256 1517527c1d705a6ebc6ec9194aa95459e875ac3902a9f4aab3bf24b6a6f8407f
SHA512 b465f3b734beaea3951ff57759f13971649b549fafca71342b52d7e74949e152c0fbafe2df40354fc00b5dc8c767f3f5c6940e4ba308888e4395d8fd21e402b3

memory/2092-2463-0x0000000000400000-0x0000000000438000-memory.dmp

memory/3648-2472-0x0000000000400000-0x0000000000432000-memory.dmp

memory/2976-2718-0x000000001C1B0000-0x000000001D73E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\WMUAYocg.bat

MD5 762778409ddcbfd1ac06b94605b78c1d
SHA1 eb9c8bec27a8efc596b06bd605ead76db9c25123
SHA256 aafd80e601becad93c141684b8166d3b4ddfe65d7bbd29c3e7b47c0084aed4cc
SHA512 3512bcfc5be9d4f10f87dbc170a6a15c8dec8e427a392d9ae6c539f96518d50d1dc782bb1f9a2398a73c65fea8f19f988788ecff1e84e9aeae834c383d4bc51c

memory/3272-2749-0x0000000000400000-0x0000000000410000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IkAy.exe

MD5 e1c90002f97b22b0756e18e60e37cf6d
SHA1 a46c7eddc835a2e4786bfea74803326a64fca0e1
SHA256 7d37dad36011310c7af86ea642c785cd4b3d1c9befc8d33fb1e63d397b0c0983
SHA512 739de8b2177e34e96d4284b8322b3b5b2c40e43232c184afa0bb3834f0c81f4986a98e3b29d0f202bf8d6c1f85aada9003f7846a8e23bd7a5a56685feffad2dc

memory/3364-2763-0x0000000000220000-0x0000000000230000-memory.dmp

memory/3364-2762-0x0000000000220000-0x0000000000230000-memory.dmp

memory/3364-2777-0x0000000000400000-0x0000000000410000-memory.dmp

memory/3912-2778-0x0000000000400000-0x0000000000439000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\RGI197A.tmp

MD5 73d1da91a59b3cb4715e28bfc6cb95e4
SHA1 45fbd7d45b5a805cfd708bbde0092455de2b657f
SHA256 d23dd97fb2b812af621146a912d2cdaccff29e836ba33266d1f81e083ad1c39d
SHA512 1cc73b0fb0c8f3f53e039071dfc15e8b5f4e4872f66f1dfb4a37532f48417dfa227564f024ebf472635690f2c284ff0c53c14fe4b9854f0b660be854afa350dd

memory/2268-3222-0x0000000001320000-0x00000000015AE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\KAUK.exe

MD5 ebe75f3285a9952cc313e96e6f49f684
SHA1 b3dbc7fcd3c219a21aa5d9e4106dd9a3548d2ac4
SHA256 39a2fd03dbd94f40bb6fecb7ed59b047815c766da0c74d4286bc1adfb0158d71
SHA512 d4f8f53648b382ea2eec9cd3fb2d90745c19ccca8c341a80612ba04b3629706c07a2b8544eb85b1acb9fbd350f6acdaa60bfedda339c5895bc5a2bce385f361a