Analysis

  • max time kernel
    63s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 04:04

General

  • Target

    freehacks.exe

  • Size

    105.5MB

  • MD5

    4647bc264b4344c7ca47ae9adc130ba9

  • SHA1

    08280768ffd55e06203fc8f13d3e6f1745c7ee0c

  • SHA256

    742e3f0ca6967c947c99cbbff7f3eaa7f5059a1bba1714a20afee3d85312a439

  • SHA512

    9d2a9f90746e74819c441da86086fc716f2e9f54fbf77e4a1cfec2badb1d64b9fe0ba3e3f5304ad797613c27cb038fbddc551d4824b6445ab5f8d063e1424981

  • SSDEEP

    3145728:iZGbexf7I4RniT0BEI43vBrYwY+pOhdFs8rBb:isbexTi64/Bbp0KG

Malware Config

Extracted

Path

C:\Users\Admin\Documents\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn

Extracted

Path

C:\Users\TMSUBXJNH-MANUAL.txt

Family

gandcrab

Ransom Note
---= GANDCRAB V5.2 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE ARE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .TMSUBXJNH The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/c21c0c0b91792d23 | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/c21c0c0b91792d23

Extracted

Path

C:\Recovery\README_HOW_TO_UNLOCK.TXT

Ransom Note
YOUR FILE HAS BEEN LOCKED In order to unlock your files, follow the instructions bellow: 1. Download and install Tor Browser 2. After a successful installation, run Tor Browser and wait for its initialization. 3. Type in the address bar: http://zvnvp2rhe3ljwf2m.onion 4. Follow the instructions on the site.
URLs

http://zvnvp2rhe3ljwf2m.onion

Signatures

  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Gandcrab family
  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Hawkeye family
  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • ASPack v2.12-2.42 5 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Binary Proxy Execution: Verclsid 1 TTPs 3 IoCs

    Adversaries may abuse Verclsid to proxy execution of malicious code.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Modifies registry key 1 TTPs 9 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\freehacks.exe
    "C:\Users\Admin\AppData\Local\Temp\freehacks.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Roaming\Avoid.exe
      "C:\Users\Admin\AppData\Roaming\Avoid.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:2884
    • C:\Users\Admin\AppData\Roaming\ChilledWindows.exe
      "C:\Users\Admin\AppData\Roaming\ChilledWindows.exe"
      2⤵
      • Executes dropped EXE
      PID:2140
    • C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe
      "C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe"
      2⤵
      • Executes dropped EXE
      PID:2796
    • C:\Users\Admin\AppData\Roaming\CrazyNCS.exe
      "C:\Users\Admin\AppData\Roaming\CrazyNCS.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2856
    • C:\Users\Admin\AppData\Roaming\Curfun.exe
      "C:\Users\Admin\AppData\Roaming\Curfun.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2848
    • C:\Users\Admin\AppData\Roaming\DesktopBoom.exe
      "C:\Users\Admin\AppData\Roaming\DesktopBoom.exe"
      2⤵
      • Executes dropped EXE
      PID:2864
    • C:\Users\Admin\AppData\Roaming\Flasher.exe
      "C:\Users\Admin\AppData\Roaming\Flasher.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2820
    • C:\Users\Admin\AppData\Roaming\Hydra.exe
      "C:\Users\Admin\AppData\Roaming\Hydra.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2636
    • C:\Users\Admin\AppData\Roaming\Launcher.exe
      "C:\Users\Admin\AppData\Roaming\Launcher.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1688
    • C:\Users\Admin\AppData\Roaming\Melting.exe
      "C:\Users\Admin\AppData\Roaming\Melting.exe"
      2⤵
      • Executes dropped EXE
      PID:2188
    • C:\Users\Admin\AppData\Roaming\Popup.exe
      "C:\Users\Admin\AppData\Roaming\Popup.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2572
    • C:\Users\Admin\AppData\Roaming\rickroll.exe
      "C:\Users\Admin\AppData\Roaming\rickroll.exe"
      2⤵
      • Executes dropped EXE
      PID:2992
    • C:\Users\Admin\AppData\Roaming\ScreenScrew.exe
      "C:\Users\Admin\AppData\Roaming\ScreenScrew.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2684
    • C:\Users\Admin\AppData\Roaming\Time.exe
      "C:\Users\Admin\AppData\Roaming\Time.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2940
    • C:\Users\Admin\AppData\Roaming\Trololo.exe
      "C:\Users\Admin\AppData\Roaming\Trololo.exe"
      2⤵
      • Executes dropped EXE
      PID:792
    • C:\Users\Admin\AppData\Roaming\Vista.exe
      "C:\Users\Admin\AppData\Roaming\Vista.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1508
    • C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe
      "C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2020
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 664
        3⤵
        • Program crash
        PID:4728
    • C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe
      "C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2560
    • C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe
      "C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe"
      2⤵
      • Executes dropped EXE
      PID:1276
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 736
        3⤵
        • Program crash
        PID:3528
    • C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe
      "C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe"
      2⤵
      • Executes dropped EXE
      PID:2068
    • C:\Users\Admin\AppData\Roaming\RedBoot.exe
      "C:\Users\Admin\AppData\Roaming\RedBoot.exe"
      2⤵
      • Executes dropped EXE
      PID:2060
      • C:\Users\Admin\63292958\protect.exe
        "C:\Users\Admin\63292958\protect.exe"
        3⤵
          PID:1636
        • C:\Users\Admin\63292958\assembler.exe
          "C:\Users\Admin\63292958\assembler.exe" -f bin "C:\Users\Admin\63292958\boot.asm" -o "C:\Users\Admin\63292958\boot.bin"
          3⤵
            PID:3324
        • C:\Users\Admin\AppData\Roaming\RedEye.exe
          "C:\Users\Admin\AppData\Roaming\RedEye.exe"
          2⤵
            PID:2204
          • C:\Users\Admin\AppData\Roaming\Rensenware.exe
            "C:\Users\Admin\AppData\Roaming\Rensenware.exe"
            2⤵
              PID:3048
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
                dw20.exe -x -s 516
                3⤵
                  PID:2040
              • C:\Users\Admin\AppData\Roaming\Rokku.exe
                "C:\Users\Admin\AppData\Roaming\Rokku.exe"
                2⤵
                  PID:1752
                  • C:\Windows\SysWOW64\wbem\WMIC.exe
                    "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                    3⤵
                      PID:4256
                    • C:\Windows\SysWOW64\vssadmin.exe
                      "C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet
                      3⤵
                      • Interacts with shadow copies
                      PID:4860
                    • C:\Windows\SysWOW64\verclsid.exe
                      "C:\Windows\system32\verclsid.exe" /S /C {871C5380-42A0-1069-A2EA-08002B30309D} /I {000214E6-0000-0000-C000-000000000046} /X 0x401
                      3⤵
                      • System Binary Proxy Execution: Verclsid
                      PID:5024
                  • C:\Users\Admin\AppData\Roaming\satan.exe
                    "C:\Users\Admin\AppData\Roaming\satan.exe"
                    2⤵
                      PID:776
                      • C:\Users\Admin\AppData\Roaming\satan.exe
                        "C:\Users\Admin\AppData\Roaming\satan.exe"
                        3⤵
                          PID:2496
                          • C:\Users\Admin\AppData\Roaming\Ipykty\ekda.exe
                            "C:\Users\Admin\AppData\Roaming\Ipykty\ekda.exe"
                            4⤵
                              PID:2764
                              • C:\Users\Admin\AppData\Roaming\Ipykty\ekda.exe
                                "C:\Users\Admin\AppData\Roaming\Ipykty\ekda.exe"
                                5⤵
                                  PID:1676
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_391a0dd6.bat"
                                4⤵
                                  PID:2580
                            • C:\Users\Admin\AppData\Roaming\Satana.exe
                              "C:\Users\Admin\AppData\Roaming\Satana.exe"
                              2⤵
                                PID:2440
                                • C:\Users\Admin\AppData\Roaming\Satana.exe
                                  "C:\Users\Admin\AppData\Roaming\Satana.exe"
                                  3⤵
                                    PID:936
                                • C:\Users\Admin\AppData\Roaming\Seftad.exe
                                  "C:\Users\Admin\AppData\Roaming\Seftad.exe"
                                  2⤵
                                    PID:628
                                  • C:\Users\Admin\AppData\Roaming\SporaRansomware.exe
                                    "C:\Users\Admin\AppData\Roaming\SporaRansomware.exe"
                                    2⤵
                                      PID:1804
                                      • C:\Windows\SysWOW64\verclsid.exe
                                        "C:\Windows\system32\verclsid.exe" /S /C {871C5380-42A0-1069-A2EA-08002B30309D} /I {000214E6-0000-0000-C000-000000000046} /X 0x401
                                        3⤵
                                        • System Binary Proxy Execution: Verclsid
                                        PID:4764
                                    • C:\Users\Admin\AppData\Roaming\ViraLock.exe
                                      "C:\Users\Admin\AppData\Roaming\ViraLock.exe"
                                      2⤵
                                        PID:1708
                                        • C:\Users\Admin\LEQYsUAM\FwQcgokk.exe
                                          "C:\Users\Admin\LEQYsUAM\FwQcgokk.exe"
                                          3⤵
                                            PID:2436
                                          • C:\ProgramData\IqwYAAwo\WIgwkUMw.exe
                                            "C:\ProgramData\IqwYAAwo\WIgwkUMw.exe"
                                            3⤵
                                              PID:2740
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /FI "USERNAME eq Admin" /F /IM FwQcgokk.exe
                                                4⤵
                                                • Kills process with taskkill
                                                PID:2044
                                              • C:\Users\Admin\LEQYsUAM\FwQcgokk.exe
                                                "C:\Users\Admin\LEQYsUAM\FwQcgokk.exe"
                                                4⤵
                                                  PID:4408
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /c "C:\Users\Admin\AppData\Roaming\ViraLock"
                                                3⤵
                                                  PID:516
                                                  • C:\Users\Admin\AppData\Roaming\ViraLock.exe
                                                    C:\Users\Admin\AppData\Roaming\ViraLock
                                                    4⤵
                                                      PID:4004
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /c "C:\Users\Admin\AppData\Roaming\ViraLock"
                                                        5⤵
                                                          PID:4924
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                          5⤵
                                                          • Modifies registry key
                                                          PID:5084
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                          5⤵
                                                          • Modifies registry key
                                                          PID:4352
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                          5⤵
                                                          • Modifies registry key
                                                          PID:3596
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\XaIYokoY.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""
                                                          5⤵
                                                            PID:3956
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                        3⤵
                                                        • Modifies registry key
                                                        PID:828
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                        3⤵
                                                        • Modifies registry key
                                                        PID:2520
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                        3⤵
                                                        • Modifies registry key
                                                        PID:1956
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\ckIwcIUI.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""
                                                        3⤵
                                                          PID:2968
                                                          • C:\Windows\SysWOW64\cscript.exe
                                                            cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                            4⤵
                                                              PID:3928
                                                        • C:\Users\Admin\AppData\Roaming\WannaCry.exe
                                                          "C:\Users\Admin\AppData\Roaming\WannaCry.exe"
                                                          2⤵
                                                            PID:1792
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /c 21841735013141.bat
                                                              3⤵
                                                                PID:1948
                                                                • C:\Windows\SysWOW64\cscript.exe
                                                                  cscript //nologo c.vbs
                                                                  4⤵
                                                                    PID:2816
                                                              • C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe
                                                                "C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe"
                                                                2⤵
                                                                  PID:268
                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                    attrib +h .
                                                                    3⤵
                                                                    • Views/modifies file attributes
                                                                    PID:2612
                                                                  • C:\Windows\SysWOW64\icacls.exe
                                                                    icacls . /grant Everyone:F /T /C /Q
                                                                    3⤵
                                                                    • Modifies file permissions
                                                                    PID:1244
                                                                  • C:\Users\Admin\AppData\Roaming\taskdl.exe
                                                                    taskdl.exe
                                                                    3⤵
                                                                      PID:2264
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /c 148191735013145.bat
                                                                      3⤵
                                                                        PID:1620
                                                                        • C:\Windows\SysWOW64\cscript.exe
                                                                          cscript.exe //nologo m.vbs
                                                                          4⤵
                                                                            PID:4824
                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                          attrib +h +s F:\$RECYCLE
                                                                          3⤵
                                                                          • Views/modifies file attributes
                                                                          PID:3836
                                                                        • C:\Users\Admin\AppData\Roaming\taskse.exe
                                                                          taskse.exe C:\Users\Admin\AppData\Roaming\@[email protected]
                                                                          3⤵
                                                                            PID:4436
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "lvjgtztip018" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\tasksche.exe\"" /f
                                                                            3⤵
                                                                              PID:4896
                                                                            • C:\Users\Admin\AppData\Roaming\taskdl.exe
                                                                              taskdl.exe
                                                                              3⤵
                                                                                PID:4444
                                                                            • C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe
                                                                              "C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe"
                                                                              2⤵
                                                                                PID:1732
                                                                              • C:\Users\Admin\AppData\Roaming\Xyeta.exe
                                                                                "C:\Users\Admin\AppData\Roaming\Xyeta.exe"
                                                                                2⤵
                                                                                  PID:1784
                                                                                • C:\Users\Admin\AppData\Roaming\$uckyLocker.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\$uckyLocker.exe"
                                                                                  2⤵
                                                                                    PID:2364
                                                                                  • C:\Users\Admin\AppData\Roaming\7ev3n.exe
                                                                                    "C:\Users\Admin\AppData\Roaming\7ev3n.exe"
                                                                                    2⤵
                                                                                      PID:2768
                                                                                      • C:\Users\Admin\AppData\Local\system.exe
                                                                                        "C:\Users\Admin\AppData\Local\system.exe"
                                                                                        3⤵
                                                                                          PID:2624
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            cmd /c C:\Users\Admin\AppData\Local\del.bat
                                                                                            4⤵
                                                                                              PID:4700
                                                                                            • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                              C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f
                                                                                              4⤵
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:4920
                                                                                            • C:\windows\SysWOW64\cmd.exe
                                                                                              C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                              4⤵
                                                                                                PID:3484
                                                                                              • C:\windows\SysWOW64\cmd.exe
                                                                                                C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                4⤵
                                                                                                  PID:2220
                                                                                                • C:\windows\SysWOW64\cmd.exe
                                                                                                  C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                  4⤵
                                                                                                    PID:4188
                                                                                                  • C:\windows\SysWOW64\cmd.exe
                                                                                                    C:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                    4⤵
                                                                                                      PID:3888
                                                                                                    • C:\windows\SysWOW64\cmd.exe
                                                                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                      4⤵
                                                                                                        PID:4500
                                                                                                      • C:\windows\SysWOW64\cmd.exe
                                                                                                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                        4⤵
                                                                                                          PID:4216
                                                                                                    • C:\Users\Admin\AppData\Roaming\Annabelle.exe
                                                                                                      "C:\Users\Admin\AppData\Roaming\Annabelle.exe"
                                                                                                      2⤵
                                                                                                        PID:932
                                                                                                      • C:\Users\Admin\AppData\Roaming\BadRabbit.exe
                                                                                                        "C:\Users\Admin\AppData\Roaming\BadRabbit.exe"
                                                                                                        2⤵
                                                                                                          PID:1604
                                                                                                        • C:\Users\Admin\AppData\Roaming\Birele.exe
                                                                                                          "C:\Users\Admin\AppData\Roaming\Birele.exe"
                                                                                                          2⤵
                                                                                                            PID:1900
                                                                                                          • C:\Users\Admin\AppData\Roaming\Cerber5.exe
                                                                                                            "C:\Users\Admin\AppData\Roaming\Cerber5.exe"
                                                                                                            2⤵
                                                                                                              PID:2812
                                                                                                            • C:\Users\Admin\AppData\Roaming\CoronaVirus.exe
                                                                                                              "C:\Users\Admin\AppData\Roaming\CoronaVirus.exe"
                                                                                                              2⤵
                                                                                                                PID:2056
                                                                                                              • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"
                                                                                                                2⤵
                                                                                                                  PID:2852
                                                                                                                  • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                    "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                    3⤵
                                                                                                                      PID:184
                                                                                                                    • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                      "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                      3⤵
                                                                                                                        PID:4532
                                                                                                                      • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                        "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                        3⤵
                                                                                                                          PID:4444
                                                                                                                        • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                          "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                          3⤵
                                                                                                                            PID:4476
                                                                                                                          • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                            "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                            3⤵
                                                                                                                              PID:4672
                                                                                                                            • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                              "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                              3⤵
                                                                                                                                PID:2260
                                                                                                                              • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                3⤵
                                                                                                                                  PID:1924
                                                                                                                                • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                  "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                  3⤵
                                                                                                                                    PID:3304
                                                                                                                                  • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                    "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                    3⤵
                                                                                                                                      PID:4632
                                                                                                                                    • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                      "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                      3⤵
                                                                                                                                        PID:168
                                                                                                                                      • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                        "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                        3⤵
                                                                                                                                          PID:3412
                                                                                                                                        • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                          "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                          3⤵
                                                                                                                                            PID:4612
                                                                                                                                          • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                            "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                            3⤵
                                                                                                                                              PID:152
                                                                                                                                            • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                              "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                              3⤵
                                                                                                                                                PID:140
                                                                                                                                              • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                3⤵
                                                                                                                                                  PID:772
                                                                                                                                                • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                  3⤵
                                                                                                                                                    PID:4396
                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                    3⤵
                                                                                                                                                      PID:148
                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                      3⤵
                                                                                                                                                        PID:4260
                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                        3⤵
                                                                                                                                                          PID:4436
                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                          3⤵
                                                                                                                                                            PID:4208
                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                            3⤵
                                                                                                                                                              PID:4476
                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                              3⤵
                                                                                                                                                                PID:4164
                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:1712
                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:3244
                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:4872
                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:2372
                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:4756
                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:4660
                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:1068
                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:4296
                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:3304
                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:1896
                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:3628
                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:4516
                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:4976
                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:4208
                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:4244
                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:4976
                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:4220
                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:4756
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:5144
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:5224
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:5308
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:5316
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:5324
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:5332
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:5352
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:5360
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:5368
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:5376
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:5392
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:5404
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:5412
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:5424
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:5432
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:5440
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:5448
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:5456
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:5492
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:5512
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:5520
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:5528
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:5540
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:5548
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:5560
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:5588
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:5596
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:5604
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\CryptoLocker.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C8
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:5648
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\CryptoWall.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\CryptoWall.exe"
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                              PID:452
                                                                                                                                                                                                                                                              • C:\Windows\syswow64\explorer.exe
                                                                                                                                                                                                                                                                "C:\Windows\syswow64\explorer.exe"
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:3436
                                                                                                                                                                                                                                                                  • C:\Windows\syswow64\svchost.exe
                                                                                                                                                                                                                                                                    -k netsvcs
                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                      PID:3692
                                                                                                                                                                                                                                                                    • C:\Windows\syswow64\vssadmin.exe
                                                                                                                                                                                                                                                                      vssadmin.exe Delete Shadows /All /Quiet
                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                                                                                                                                      PID:3724
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\DeriaLock.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\DeriaLock.exe"
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:2400
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 608
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                      • Program crash
                                                                                                                                                                                                                                                                      PID:5088
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Dharma.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Dharma.exe"
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:3348
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Fantom.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\Fantom.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:3816
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\GandCrab.exe
                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\GandCrab.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:4072
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe"
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:3204
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 596
                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                              • Program crash
                                                                                                                                                                                                                                                                              PID:4280
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Krotten.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\Krotten.exe"
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:3476
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe"
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:3616
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\NotPetya.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\NotPetya.exe"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:3788
                                                                                                                                                                                                                                                                                • C:\Windows\system32\rundll32.exe
                                                                                                                                                                                                                                                                                  "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\PetrWrap
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:3268
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Petya.A.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Petya.A.exe"
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:2984
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\PolyRansom.exe
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\PolyRansom.exe"
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:2236
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                          cmd /c "C:\Users\Admin\AppData\Roaming\PolyRansom"
                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                            PID:4052
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                            • Modifies registry key
                                                                                                                                                                                                                                                                                            PID:3512
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                            • Modifies registry key
                                                                                                                                                                                                                                                                                            PID:2904
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                            reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                            • Modifies registry key
                                                                                                                                                                                                                                                                                            PID:2152
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\haowoQcU.bat" "C:\Users\Admin\AppData\Roaming\PolyRansom.exe""
                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                              PID:572
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\PowerPoint.exe
                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\PowerPoint.exe"
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:3652
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\sys3.exe
                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\\sys3.exe
                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                  PID:1260
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Bezilom.exe
                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\Bezilom.exe"
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:3332
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Bumerang.exe
                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\Bumerang.exe"
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:3972
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\ddraw32.dll
                                                                                                                                                                                                                                                                                                      C:\Windows\system32\ddraw32.dll
                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                        PID:3752
                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 112
                                                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                                                                                                                          PID:4644
                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\ddraw32.dll
                                                                                                                                                                                                                                                                                                        C:\Windows\system32\ddraw32.dll :C:\Users\Admin\AppData\Roaming\Bumerang.exe
                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                          PID:3084
                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Fagot.a.exe
                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\Fagot.a.exe"
                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                          PID:3404
                                                                                                                                                                                                                                                                                                        • C:\Windows\System32\WScript.exe
                                                                                                                                                                                                                                                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\HeadTail.vbs"
                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                            PID:3880
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Heap41A.exe
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\Heap41A.exe"
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                              PID:3916
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mantas.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\Mantas.exe"
                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                PID:3432
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Netres.a.exe
                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\Netres.a.exe"
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                  PID:1168
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Nople.exe
                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\Nople.exe"
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                    PID:1124
                                                                                                                                                                                                                                                                                                                • C:\Windows\System32\vssadmin.exe
                                                                                                                                                                                                                                                                                                                  "C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                  • Interacts with shadow copies
                                                                                                                                                                                                                                                                                                                  PID:2532
                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\LogonUI.exe
                                                                                                                                                                                                                                                                                                                  "LogonUI.exe" /flags:0x0
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                    PID:4084
                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\verclsid.exe
                                                                                                                                                                                                                                                                                                                    "C:\Windows\system32\verclsid.exe" /S /C {ED228FDF-9EA8-4870-83B1-96B02CFE0D52} /I {000214E6-0000-0000-C000-000000000046} /X 0x401
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • System Binary Proxy Execution: Verclsid
                                                                                                                                                                                                                                                                                                                    PID:3536

                                                                                                                                                                                                                                                                                                                  Network

                                                                                                                                                                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                                                                                                                                  • C:\ProgramData\IqwYAAwo\WIgwkUMw.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    189KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    285e40dc437ba4a417ffa99f997b1639

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    0bbc4efac70b8f8a94f77536fb992c6d77a6c041

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    9245763e352d96cb04429c01011c458e56da773a5cb3b7a9c015df8cd0457d6b

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    663241eeabad8e9397695c70427c83e3a33a787adbf06f6789ddd49cab0da598a4b0d467cd90c495b30c1cd1f19a5a31b8227d9d6684b02787ceca713f2fa44e

                                                                                                                                                                                                                                                                                                                  • C:\Recovery\README_HOW_TO_UNLOCK.HTML

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    c784d96ca311302c6f2f8f0bee8c725b

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    dc68b518ce0eef4f519f9127769e3e3fa8edce46

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    a7836550412b0e0963d16d8442b894a1148326b86d119e4d30f1b11956380ef0

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    f97891dc3c3f15b9bc3446bc9d5913431f374aa54cced33d2082cf14d173a8178e29a8d9487c2a1ab87d2f6abf37e915f69f45c0d8b747ad3f17970645c35d98

                                                                                                                                                                                                                                                                                                                  • C:\Recovery\README_HOW_TO_UNLOCK.TXT

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    330B

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    04b892b779d04f3a906fde1a904d98bb

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    1a0d6cb6f921bc06ba9547a84b872ef61eb7e8a5

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    eb22c6ecfd4d7d0fcea5063201ccf5e7313780e007ef47cca01f1369ee0e6be0

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    e946aa4ac3ec9e5a178eac6f4c63a98f46bc85bed3efd6a53282d87aa56e53b4c11bb0d1c58c6c670f9f4ad9952b5e7fd1bb310a8bd7b5b04e7c607d1b74238a

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\63292958\assembler.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    589KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    7e3cea1f686207563c8369f64ea28e5b

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    a1736fd61555841396b0406d5c9ca55c4b6cdf41

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    2a5305369edb9c2d7354b2f210e91129e4b8c546b0adf883951ea7bf7ee0f2b2

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    4629bc32094bdb030e6c9be247068e7295599203284cb95921c98fcbe3ac60286670be7e5ee9f0374a4017286c7af9db211bd831e3ea871d31a509d7bbc1d6a3

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\HWgAccco.bat

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    4B

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    e2d4da69ce9a22e8ec6de325ed5e9ceb

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    287b0323c95f54641e3fa259a02db60ec858f7e6

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    adf31e8633772555d763bbbddd2a7764e8aaa5e1b52bd0fa9f709f760aba1c5e

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    2f85ea062a88209a8e3f43d82b468a1f9b724dc8b1ab9a37a8f47d8e275351a10e23d5977a6a9419694d9b867f4693cf7e48e37ea4c1f03a3d30c3169c48a88f

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ckIwcIUI.bat

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    112B

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\dAgIwocw.bat

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    4B

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    7290dc65b511ef7226a7fe9a7369f437

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    eca2c55fe3c106bb66360c873ff7a6c6baded33f

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    65e48c307fa68e0a2fc90dfccaf4c80528efd24ce8133b12d67b5173d16263de

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    b04b35250bfbc0c37f0392e2925bea34fd2e6bd3b26389cdf1e4f63c60c6736f0735efe740d75bfafb716902c185089b4dd097927417f9e522c94b2b67add139

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\jkgcoUYQ.bat

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    4B

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    f0f5120b695fd1fb637606ab2890e8ed

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    18b6712c4bd4f8bd202fa64ccd5a4fdcfaa27984

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    87db110aac25409736baeed6feacbf309add8289cd5e884bd5a6f5f96e2cb80a

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    0b01f62848d5d79852b8446484cd4e50b3e6309038a6cf0e330fa03d5ea6372724141dc3b710a24293ca4fefe4d7de530664adf090b84573ed3ce3d6da78da37

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\$uckyLocker.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    414KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    c850f942ccf6e45230169cc4bd9eb5c8

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    51c647e2b150e781bd1910cac4061a2cee1daf89

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    86e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    2b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\148191735013145.bat

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    334B

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    d60ef26cdec915e1e06f4ff89ce1ccff

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    fc64aa9411af7b4e33150bac85ead3b0303c1b9b

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    1e5a53b8996bb0672bc19e0a4bdd90fda584765cfb97a351ab3140e97bcd7dc2

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    fc863758a533eff85e933eb15b3e6707966807874ea92e8d5673f8624920ad3e718fd5baf86d16356679189226ea1604e4c9099683ddae33720f3e26686356f5

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\21841735013141.bat

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    330B

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    9f5718e808c505fa040e46bbccfe27f6

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    3f0db8829183ea2242d90c019ec681c8321512c8

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    a33f96b5bfcc643ba255fdd19b20a2efdb6c51639b522547dd4b59e08e2924dd

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    dd96bca36023a1e1463a14e5d3877cc78ee59bc9f06b5d82f83cfe2e0eacd1c6fb44f8b22ac23ff2fde3a518907a9b83f954dc062b113def875cb11b09a841cd

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\7ev3n.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    315KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    9f8bc96c96d43ecb69f883388d228754

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    61ed25a706afa2f6684bb4d64f69c5fb29d20953

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    7d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\@[email protected]

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    240KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    7bf2b57f2a205768755c07f238fb32cc

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    45356a9dd616ed7161a3b9192e2f318d0ab5ad10

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    91a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Avoid.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    248KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    20d2c71d6d9daf4499ffc4a5d164f1c3

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    38e5dcd93f25386d05a34a5b26d3fba1bf02f7c8

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    3ac8cc58dcbceaec3dab046aea050357e0e2248d30b0804c738c9a5b037c220d

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    8ffd56fb3538eb60da2dde9e3d6eee0dac8419c61532e9127f47c4351b6e53e01143af92b2e26b521e23cdbbf15d7a358d3757431e572e37a1eede57c7d39704

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Bezilom.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    28KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    8e9d7feb3b955e6def8365fd83007080

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    df7522e270506b1a2c874700a9beeb9d3d233e23

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    94d2b1da2c4ce7db94ee9603bc2f81386032687e7c664aff6460ba0f5dac0022

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    4157a5628dc7f47489be2c30dbf2b14458a813eb66e942bba881615c101df25001c09afb9a54f88831fa4c1858f42d897f8f55fbf6b4c1a82d2509bd52ba1536

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Birele.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    116KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    41789c704a0eecfdd0048b4b4193e752

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    fb1e8385691fa3293b7cbfb9b2656cf09f20e722

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    b2dcfdf9e7b09f2aa5004668370e77982963ace820e7285b2e264a294441da23

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    76391ac85fdc3be75441fcd6e19bed08b807d3946c7281c647f16a3be5388f7be307e6323fac8502430a4a6d800d52a88709592a49011ecc89de4f19102435ea

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Bumerang.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    26KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    b6c78677b83c0a5b02f48648a9b8e86d

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    0d90c40d2e9e8c58c1dafb528d6eab45e15fda81

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    706fce69fea67622b03fafb51ece076c1fdd38892318f8cce9f2ec80aabca822

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    302acca8c5dd310f86b65104f7accd290014e38d354e97e4ffafe1702b0a13b90e4823c274b51bcc9285419e69ff7111343ac0a64fd3c8b67c48d7bbd382337b

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Cerber5.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    313KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    fe1bc60a95b2c2d77cd5d232296a7fa4

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    c07dfdea8da2da5bad036e7c2f5d37582e1cf684

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ChilledWindows.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    4.4MB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    6a4853cd0584dc90067e15afb43c4962

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    ae59bbb123e98dc8379d08887f83d7e52b1b47fc

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    ccb9502bf8ba5becf8b758ca04a5625c30b79e2d10d2677cc43ae4253e1288ec

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    feb223e0de9bd64e32dc4f3227e175b58196b5e614bca8c2df0bbca2442a564e39d66bcd465154149dc7ebbd3e1ca644ed09d9a9174b52236c76e7388cb9d996

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    68KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    bc1e7d033a999c4fd006109c24599f4d

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    b927f0fc4a4232a023312198b33272e1a6d79cec

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    13adae722719839af8102f98730f3af1c5a56b58069bfce8995acd2123628401

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    f5d9b8c1fd9239894ec9c075542bff0bcef79871f31038e627ae257b8c1db9070f4d124448a78e60ccc8bc12f138102a54825e9d7647cd34832984c7c24a6276

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\CrazyNCS.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    122KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    d043ba91e42e0d9a68c9866f002e8a21

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    e9f177e1c57db0a15d1dc6b3e6c866d38d85b17c

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    6820c71df417e434c5ad26438c901c780fc5a80b28a466821b47d20b8424ef08

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    3e9783646e652e9482b3e7648fb0a5f7c8b6c386bbc373d5670d750f6f99f6137b5501e21332411609cbcc0c20f829ab8705c2835e2756455f6754c9975ac6bd

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\CryptoWall.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    132KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    919034c8efb9678f96b47a20fa6199f2

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    747070c74d0400cffeb28fbea17b64297f14cfbd

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    e036d68b8f8b7afc6c8b6252876e1e290f11a26d4ad18ac6f310662845b2c734

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    745a81c50bbfd62234edb9788c83a22e0588c5d25c00881901923a02d7096c71ef5f0cd5b73f92ad974e5174de064b0c5ea8044509039aab14b2aed83735a7c4

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Curfun.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    138KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    0b3b2dff5503cb032acd11d232a3af55

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    6efc31c1d67f70cf77c319199ac39f70d5a7fa95

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    ef878461a149024f3065121ff4e165731ecabef1b94b0b3ed2eda010ad39202b

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    484014d65875e706f7e5e5f54c2045d620e5cce5979bf7f37b45c613e6d948719c0b8e466df5d8908706133ce4c4b71a11b804417831c9dbaf72b6854231ea17

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\DesktopBoom.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    f0a661d33aac3a3ce0c38c89bec52f89

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    709d6465793675208f22f779f9e070ed31d81e61

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    c20e78ce9028299d566684d35b1230d055e5ea0e9b94d0aff58f650e0468778a

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    57cdb3c38f2e90d03e6dc1f9d8d1131d40d3919f390bb1783343c82465461319e70483dc3cd3efdbd9a62dfc88d74fc706f05d760ffd8506b16fd7686e414443

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Fagot.a.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    373KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    30cdab5cf1d607ee7b34f44ab38e9190

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    d4823f90d14eba0801653e8c970f47d54f655d36

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    1517527c1d705a6ebc6ec9194aa95459e875ac3902a9f4aab3bf24b6a6f8407f

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    b465f3b734beaea3951ff57759f13971649b549fafca71342b52d7e74949e152c0fbafe2df40354fc00b5dc8c767f3f5c6940e4ba308888e4395d8fd21e402b3

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Flasher.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    246KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    9254ca1da9ff8ad492ca5fa06ca181c6

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    70fa62e6232eae52467d29cf1c1dacb8a7aeab90

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    30676ad5dc94c3fec3d77d87439b2bf0a1aaa7f01900b68002a06f11caee9ce6

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    a84fbbdea4e743f3e41878b9cf6db219778f1479aa478100718af9fc8d7620fc7a3295507e11df39c7863cb896f946514e50368db480796b6603c8de5580685a

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\GandCrab.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    291KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    e6b43b1028b6000009253344632e69c4

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    e536b70e3ffe309f7ae59918da471d7bf4cadd1c

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    bfb9db791b8250ffa8ebc48295c5dbbca757a5ed3bbb01de12a871b5cd9afd5a

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    07da214314673407a7d3978ee6e1d20bf1e02f135bf557e86b50489ecc146014f2534515c1b613dba96e65489d8c82caaa8ed2e647684d61e5e86bd3e8251adf

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Hydra.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    43KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    b2eca909a91e1946457a0b36eaf90930

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    3200c4e4d0d4ece2b2aadb6939be59b91954bcfa

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    0b6c0af51cde971b3e5f8aa204f8205418ab8c180b79a5ac1c11a6e0676f0f7c

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    607d20e4a46932c7f4d9609ef9451e2303cd79e7c4778fe03f444e7dc800d6de7537fd2648c7c476b9f098588dc447e8c39d8b21cd528d002dfa513a19c6ebbf

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Launcher.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    197KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    7506eb94c661522aff09a5c96d6f182b

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    329bbdb1f877942d55b53b1d48db56a458eb2310

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    d5b962dfe37671b5134f0b741a662610b568c2b5374010ee92b5b7857d87872c

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    d815a9391ef3d508b89fc221506b95f4c92d586ec38f26aec0f239750f34cf398eed3d818fa439f6aa6ed3b30f555a1903d93eeeec133b80849a4aa6685ec070

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mantas.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    40KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    53f25f98742c5114eec23c6487af624c

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    671af46401450d6ed9c0904402391640a1bddcc2

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    7b5dec6a48ee2114c3056f4ccb6935f3e7418ef0b0bc4a58931f2c80fc94d705

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    f460775308b34552c930c3f256cef1069b28421673d71e3fa2712b0467485861a98285925ae49f1adea1faf59265b964c873c12a3bb5de216122ac20084e1048

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Melting.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    12KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    833619a4c9e8c808f092bf477af62618

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    b4a0efa26f790e991cb17542c8e6aeb5030d1ebf

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    92a284981c7ca33f1af45ce61738479fbcbb5a4111f5498e2cb54931c8a36c76

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    4f231fc16339d568b5cf9353133aeae835eb262dab68bc80d92f37b43df64dce4fae0e913cbaa3bb61351a759aeecf9d280bc5779b0853c980559a654d6cca11

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    131KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    bd65d387482def1fe00b50406f731763

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    d06a2ba2e29228f443f97d1dd3a8da5dd7df5903

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    1ab7375550516d7445c47fd9b551ed864f227401a14ff3f1ff0d70caca3bd997

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    351ecd109c4d49bc822e8ade73a9516c4a531ebcda63546c155e677dcff19708068dc588b2fcf30cad086238e8b206fc5f349d37dda02d3c3a8d9b570d92e4d9

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Netres.a.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    372KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    d543f8d2644b09445d9bc4a8a4b1a8c0

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    72a7b4fb767c47f15280c053fba80de1e44d7173

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    1c0e2b7981ffa9e86185b7a7aac93f13629d92d8f58769569483202b3a926ce5

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    9cd77db4a1fe1f0ec7779151714371c21ed798091d9022cec6643c79b2f3c87554a0b7f01c4014e59d0d1a131922a801413d37236ef1c49506f8e1aa5b96e167

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Nople.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    50KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    7d595027f9fdd0451b069c0c65f2a6e4

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    a4556275c6c45e19d5b784612c68b3ad90892537

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    d2518df72d5cce230d98a435977d9283b606a5a4cafe8cd596641f96d8555254

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    b8f37ecc78affa30a0c7c00409f2db1e2fd031f16c530a8c1d4b4bffaa5d55ac235b11540c8a611ae1a90b748b04498e3954cfb1529236937ef693c6b20e893b

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\PolyRansom.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    220KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    3ed3fb296a477156bc51aba43d825fc0

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    9caa5c658b1a88fee149893d3a00b34a8bb8a1a6

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    dc3d6e409cee4d54f48d1a25912243d07e2f800578c8e0e348ce515a047ecf5fa3089b46284e0956bbced345957a000eecdc082e6f3060971759d70a14c1c97e

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Popup.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    373KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    9c3e9e30d51489a891513e8a14d931e4

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    4e5a5898389eef8f464dee04a74f3b5c217b7176

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    f8f7b5f20ca57c61df6dc8ff49f2f5f90276a378ec17397249fdc099a6e1dcd8

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    bf45677b7dd6c67ad350ec6ecad5bc3f04dea179fae0ff0a695c69f7de919476dd7a69c25b04c8530a35119e4933f4a8c327ed6dcef892b1114dfd7e494a19a7

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\PowerPoint.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    136KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    70108103a53123201ceb2e921fcfe83c

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    c71799a6a6d09ee758b04cdf90a4ab76fbd2a7e3

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    9c3f8df80193c085912c9950c58051ae77c321975784cc069ceacd4f57d5861d

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    996701c65eee7f781c2d22dce63f4a95900f36b97a99dcf833045bce239a08b3c2f6326b3a808431cdab92d59161dd80763e44126578e160d79b7095175d276b

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\RedBoot.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    1.2MB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    e0340f456f76993fc047bc715dfdae6a

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    d47f6f7e553c4bc44a2fe88c2054de901390b2d7

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    cac10c675d81630eefca49b2ac4cc83f3eb29115ee28a560db4d6c33f70bf24980e48bb48ce20375349736e3e6b23a1ca504b9367917328853fffc5539626bbc

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\RedEye.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    10.6MB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    e9e5596b42f209cc058b55edc2737a80

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    f30232697b3f54e58af08421da697262c99ec48b

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    9ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Rensenware.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    96KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    60335edf459643a87168da8ed74c2b60

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    61f3e01174a6557f9c0bfc89ae682d37a7e91e2e

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    7bf5623f0a10dfa148a35bebd899b7758612f1693d2a9910f716cf15a921a76a

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    b4e5e4d4f0b4a52243d6756c66b4fe6f4b39e64df7790072046e8a3dadad3a1be30b8689a1bab8257cc35cb4df652888ddf62b4e1fccb33e1bbf1f5416d73efb

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Rokku.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    666KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    97512f4617019c907cd0f88193039e7c

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    24cfa261ee30f697e7d1e2215eee1c21eebf4579

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    438888ef36bad1079af79daf152db443b4472c5715a7b3da0ba24cc757c53499

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    cfbb8dd91434f917d507cb919aa7e6b16b7b2056d56185f6ad5b6149e05629325cdb3df907f58bb3f634b17a9989bf5b6d6b81f5396a3a556431742ed742ac4a

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Satana.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    49KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    46bfd4f1d581d7c0121d2b19a005d3df

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    5b063298bbd1670b4d39e1baef67f854b8dcba9d

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ScreenScrew.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    111KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    e87a04c270f98bb6b5677cc789d1ad1d

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    8c14cb338e23d4a82f6310d13b36729e543ff0ca

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    e03520794f00fb39ef3cfff012f72a5d03c60f89de28dbe69016f6ed151b5338

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    8784f4d42908e54ecedfb06b254992c63920f43a27903ccedd336daaeed346db44e1f40e7db971735da707b5b32206be1b1571bc0d6a2d6eb90bbf9d1f69de13

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Seftad.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    48KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    86a3a3ce16360e01933d71d0bf1f2c37

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    af54089e3601c742d523b507b3a0793c2b6e60be

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    2ebe23ba9897d9c127b9c0a737ba63af8d0bcd76ec866610cc0b5de2f62b87bd

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    65a3571cf5b057d2c3ce101346947679f162018fa5eadf79c5a6af6c0a3bc9b12731ff13f27629b14983ef8bc73fa9782cc0a9e6c44b0ffc2627da754c324d6e

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\SporaRansomware.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    24KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    4a4a6d26e6c8a7df0779b00a42240e7b

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    8072bada086040e07fa46ce8c12bf7c453c0e286

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    7ad9ed23a91643b517e82ad5740d24eca16bcae21cfe1c0da78ee80e0d1d3f02

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    c7a7b15d8dbf8e8f8346a4dab083bb03565050281683820319906da4d23b97b39e88f841b30fc8bd690c179a8a54870238506ca60c0f533d34ac11850cdc1a95

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Time.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    111KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    9d0d2fcb45b1ff9555711b47e0cd65e5

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    958f29a99cbb135c92c5d1cdffb9462be35ee9fd

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    dc476ae39effdd80399b6e36f1fde92c216a5bbdb6b8b2a7ecbe753e91e4c993

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    8fd4ce4674cd52a3c925149945a7a50a139302be17f6ee3f30271ebe1aa6d92bcb15a017dca989cd837a5d23cd56eaacc6344dc7730234a4629186976c857ca9

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Trololo.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    3.0MB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    b6d61b516d41e209b207b41d91e3b90d

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    e50d4b7bf005075cb63d6bd9ad48c92a00ee9444

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    3d0efd55bde5fb7a73817940bac2a901d934b496738b7c5cab7ea0f6228e28fe

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    3217fc904e4c71b399dd273786634a6a6c19064a9bf96960df9b3357001c12b9547813412173149f6185eb5d300492d290342ec955a8347c6f9dcac338c136da

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\USDCD-12XRT-XTRTX-HTOET-ZYYYY.KEY

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    b4864cee64d78d853d439949378f161f

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    fe06441ab98a8257702f765575e07b8d43ecd5be

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    1afdd6af61f04f08e03e7be272fff5d63beebd24fee6290a142deea6bbed37a5

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    70ad5e5e510932ef3979b19604e04d8e0429a6bbb01e4a3066af68e2f8aed358f66b02fe21c4c26657dd0b2a2cd8fdc4eedcd0a2e13722f190623228bc9bf682

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ViraLock.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    194KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    8803d517ac24b157431d8a462302b400

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    b56afcad22e8cda4d0e2a98808b8e8c5a1059d4e

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    418395efd269bc6534e02c92cb2c568631ada6e54bc55ade4e4a5986605ff786

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    38fdfe0bc873e546b05a8680335526eec61ccc8cf3f37c60eee0bc83ec54570077f1dc1da26142488930eabcc21cb7a33c1b545a194cbfb4c87e430c4b2bfb50

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Vista.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    1.9MB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    faa6cb3e816adaeaabf2930457c79c33

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    6539de41b48d271bf4237e6eb09b0ee40f9a2140

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    6680317e6eaa04315b47aaadd986262cd485c8a4bd843902f4c779c858a3e31b

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    58859556771203d736ee991b651a6a409de7e3059c2afe81d4545864295c383f75cfbabf3cffaa0c412a6ec27bf939f0893c28152f53512c7885e597db8d2c66

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\WannaCry.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    224KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    5c7fb0927db37372da25f270708103a2

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    120ed9279d85cbfa56e5b7779ffa7162074f7a29

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    3.4MB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    84c82835a5d21bbcf75a61706d8ab549

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    5ff465afaabcbf0150d1a3ab2c2e74f3a4426467

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    728KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    6e49c75f701aa059fa6ed5859650b910

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    ccb7898c509c3a1de96d2010d638f6a719f6f400

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    f91f02fd27ada64f36f6df59a611fef106ff7734833dea825d0612e73bdfb621

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    ccd1b581a29de52d2313a97eb3c3b32b223dba1e7a49c83f7774b374bc2d16b13fba9566de6762883f3b64ed8e80327b454e5d32392af2a032c22653fed0fff8

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    760KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    515198a8dfa7825f746d5921a4bc4db9

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    e1da0b7f046886c1c4ff6993f7f98ee9a1bc90ae

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    0fda176b199295f72fafc3bc25cefa27fa44ed7712c3a24ca2409217e430436d

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    9e47037fe40b79ebf056a9c6279e318d85da9cd7e633230129d77a1b8637ecbafc60be38dd21ca9077ebfcb9260d87ff7fcc85b8699b3135148fe956972de3e8

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\decoder.dll

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    126KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    3531cf7755b16d38d5e9e3c43280e7d2

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    19981b17ae35b6e9a0007551e69d3e50aa1afffe

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    76133e832c15aa5cbc49fb3ba09e0b8dd467c307688be2c9e85e79d3bf62c089

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    7b053ba2cf92ef2431b98b2a06bd56340dad94de36d11e326a80cd61b9acb378ac644ac407cf970f4ef8333b8d3fb4ff40b18bb41ec5aee49d79a6a2adcf28fd

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    2.4MB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    dbfbf254cfb84d991ac3860105d66fc6

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    893110d8c8451565caa591ddfccf92869f96c242

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    68b0e1932f3b4439865be848c2d592d5174dbdbaab8f66104a0e5b28c928ee0c

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    5e9ccdf52ebdb548c3fa22f22dd584e9a603ca1163a622db5707dbcc5d01e4835879dcfd28cb1589cbb25aed00f352f7a0a0962b1f38b68fc7d6693375e7666d

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Xyeta.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    9d15a3b314600b4c08682b0202700ee7

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    208e79cdb96328d5929248bb8a4dd622cf0684d1

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    3ab3833e31e4083026421c641304369acfd31b957b78af81f3c6ef4968ef0e15

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    9916397b782aaafa68eb6a781ea9a0db27f914035dd586142c818ccbd7e69036896767bedba97489d5100de262a554cf14bcdf4a24edda2c5d37217b265398d3

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    424KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    e263c5b306480143855655233f76dc5a

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    e7dcd6c23c72209ee5aa0890372de1ce52045815

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    1f69810b8fe71e30a8738278adf09dd982f7de0ab9891d296ce7ea61b3fa4f69

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    e95981eae02d0a8bf44493c64cca8b7e50023332e91d75164735a1d0e38138f358100c93633ff3a0652e1c12a5155cba77d81e01027422d7d5f71000eafb4113

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\msg\m_finnish.wnry

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    37KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    35c2f97eea8819b1caebd23fee732d8f

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    e354d1cc43d6a39d9732adea5d3b0f57284255d2

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    1adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\rickroll.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    129KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    0ec108e32c12ca7648254cf9718ad8d5

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    78e07f54eeb6af5191c744ebb8da83dad895eca1

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    48b08ea78124ca010784d9f0faae751fc4a0c72c0e7149ded81fc03819f5d723

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    1129e685f5dd0cb2fa22ef4fe5da3f1e2632e890333ce17d3d06d04a4097b4d9f4ca7d242611ffc9e26079900945cf04ab6565a1c322e88e161f1929d18a2072

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\satan.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    184KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    c9c341eaf04c89933ed28cbc2739d325

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    c5b7d47aef3bd33a24293138fcba3a5ff286c2a8

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    1a0a2fd546e3c05e15b2db3b531cb8e8755641f5f1c17910ce2fb7bbce2a05b7

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    7cfa6ec0be0f5ae80404c6c709a6fd00ca10a18b6def5ca746611d0d32a9552f7961ab0ebf8a336b27f7058d700205be7fcc859a30d7d185aa9457267090f99b

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\taskdl.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    20KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    4fef5e34143e646dbf9907c4374276f5

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    47a9ad4125b6bd7c55e4e7da251e23f089407b8f

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    4550dd1787deb353ebd28363dd2cdccca861f6a5d9358120fa6aa23baa478b2a9eb43cef5e3f6426f708a0753491710ac05483fac4a046c26bec4234122434d5

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\Documents\@[email protected]

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    933B

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    f97d2e6f8d820dbd3b66f21137de4f09

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    596799b75b5d60aa9cd45646f68e9c0bd06df252

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    0e5ece918132a2b1a190906e74becb8e4ced36eec9f9d1c70f5da72ac4c6b92a

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    efda21d83464a6a32fdeef93152ffd32a648130754fdd3635f7ff61cc1664f7fc050900f0f871b0ddd3a3846222bf62ab5df8eed42610a76be66fff5f7b4c4c0

                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\Documents\sweet.jpg

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    23KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    58b1840b979ae31f23aa8eb3594d5c17

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    6b28b8e047cee70c7fa42715c552ea13a5671bbb

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    b2bb460aa299c6064e7fc947bff314e0f915c6ee6f8f700007129e3b6a314f47

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    13548e5900bddc6797d573fcca24cec1f1eefa0662e9d07c4055a3899460f4e135e1c76197b57a49b452e61e201cb86d1960f3e8b00828a2d0031dc9aa78666a

                                                                                                                                                                                                                                                                                                                  • C:\Users\TMSUBXJNH-MANUAL.txt

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    f8725492f504be0e9e40be86a8a2f6ed

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    9f3cfdc21a0176ea6eb29937383d80b76ff1f553

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    ec31d1d033763448ef01de91362c7fb093434f8ee772230ee57351c586c6572c

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    71599cbdee16445170411a341e6e3637527972a37a84d9669c1a695a138cd0c0ffe83923de602bc2cc526d5b529e469129a0123931ceec716500a957090833a8

                                                                                                                                                                                                                                                                                                                  • F:\USDCD-12XRT-XTRTX-HTOET-ZYYYY.HTML

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    7fab0fbc9c8d5939074f69b092395c89

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    298bcc966a0af2d8a7c47d665a5dd3ab68caf36b

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    289bb9032ccb65f8a8bcc58246b20fc0f0e9aadff790c79429f45dbcd15239dc

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    f2c39e86169c64cb165b31a9d742a21835b4bd59a2199549471a6fdfa26489f6984eb28f94dcbc32d909a0131f76403fbf39d3ea0bba7f7c9a3c6c1c715cc993

                                                                                                                                                                                                                                                                                                                  • F:\USDCD-12XRT-XTRTX-HTOET-ZYYYY.LST

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    3137beb433769a4985d215ffe37040aa

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    a5aeb3f0f03f8ac1e08fe4e08544fefa2eea6496

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    0022da6fdb24d19734dd8b3922f6a1e1c82811a4ef8087d8b9a1e7e0e4247cc0

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    45ce39057ad3e18c09316dbf00a9c4041d04aee5fae51b58ba2e7ed452a6079a915abba5379e661cb6948545a787d761c32e00a1023fa8cac9385964adf759b8

                                                                                                                                                                                                                                                                                                                  • \Users\Admin\AppData\Roaming\Annabelle.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    15.9MB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    0f743287c9911b4b1c726c7c7edcaf7d

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    9760579e73095455fcbaddfe1e7e98a2bb28bfe0

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    716335ba5cd1e7186c40295b199190e2b6655e48f1c1cbe12139ba67faa5e1ac

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    2a6dd6288303700ef9cb06ae1efeb1e121c89c97708e5ecd15ed9b2a35d0ecff03d8da58b30daeadad89bd38dc4649521ada149fb457408e5a2bdf1512f88677

                                                                                                                                                                                                                                                                                                                  • \Users\Admin\AppData\Roaming\Ipykty\ekda.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    67KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    f3f6f568e4c5a25e003f043d77b52c34

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    ed6d0988303e51b480d094611e9c464b56a718b8

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    459ae3dd068297c65c168aab0150abe81a672b8570daca491310c3e6246a091e

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    506ea1a6bd4839d3583221216500afcd02d0fe99a7b1911b94d2537cc7240d7d3b87f855956e4baae12bd2fae431476ba64144926a25d6713c5a2680b7fb80a4

                                                                                                                                                                                                                                                                                                                  • \Users\Admin\LEQYsUAM\FwQcgokk.exe

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    203KB

                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                    f73338506b9a44ef01a40242c2a1dd98

                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                    944b329dab8b94a0013a973730c69f3f6cb63526

                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                    23494e28d1385bca208a6f8ba8e8969e04670ea759022bfae4982dfdd4d62783

                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                    cfd5d66122d086cabd10a1d96d31da5b41b1b801e07f134ede4efac0c535bddd7903e1e8522eebd6e395cca01946f13a3c5d0191b68a048863169fe4ef08caa5

                                                                                                                                                                                                                                                                                                                  • memory/268-343-0x0000000010000000-0x0000000010010000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    64KB

                                                                                                                                                                                                                                                                                                                  • memory/516-1982-0x0000000000160000-0x0000000000192000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    200KB

                                                                                                                                                                                                                                                                                                                  • memory/620-376-0x0000000001E20000-0x0000000001E37000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/620-380-0x0000000001E20000-0x0000000001E37000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/620-378-0x0000000001E20000-0x0000000001E37000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/932-3259-0x000000001D120000-0x000000001E6AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    21.6MB

                                                                                                                                                                                                                                                                                                                  • memory/932-1330-0x000000013F180000-0x0000000140174000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    16.0MB

                                                                                                                                                                                                                                                                                                                  • memory/1204-357-0x0000000001CB0000-0x0000000001CC7000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1204-359-0x0000000001CB0000-0x0000000001CC7000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1204-353-0x0000000001CB0000-0x0000000001CC7000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1204-355-0x0000000001CB0000-0x0000000001CC7000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1276-216-0x0000000000C60000-0x0000000000CD2000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    456KB

                                                                                                                                                                                                                                                                                                                  • memory/1312-362-0x00000000001B0000-0x00000000001C7000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1312-364-0x00000000001B0000-0x00000000001C7000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1312-366-0x00000000001B0000-0x00000000001C7000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1368-373-0x0000000002790000-0x00000000027A7000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1368-369-0x0000000002790000-0x00000000027A7000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1368-371-0x0000000002790000-0x00000000027A7000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1676-326-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1676-341-0x0000000000670000-0x000000000079D000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    1.2MB

                                                                                                                                                                                                                                                                                                                  • memory/1676-348-0x0000000002180000-0x0000000002289000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                                                                                                                                  • memory/1676-352-0x0000000001FC0000-0x0000000001FD7000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1676-340-0x00000000002B0000-0x00000000002CF000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    124KB

                                                                                                                                                                                                                                                                                                                  • memory/1676-342-0x00000000007A0000-0x0000000000811000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    452KB

                                                                                                                                                                                                                                                                                                                  • memory/1676-339-0x00000000004F0000-0x000000000058F000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    636KB

                                                                                                                                                                                                                                                                                                                  • memory/1676-338-0x0000000000420000-0x00000000004E9000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    804KB

                                                                                                                                                                                                                                                                                                                  • memory/1676-347-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1708-194-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    200KB

                                                                                                                                                                                                                                                                                                                  • memory/1708-322-0x0000000000470000-0x00000000004A4000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    208KB

                                                                                                                                                                                                                                                                                                                  • memory/1708-267-0x0000000000470000-0x00000000004A4000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    208KB

                                                                                                                                                                                                                                                                                                                  • memory/1708-602-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    200KB

                                                                                                                                                                                                                                                                                                                  • memory/1708-323-0x0000000000470000-0x00000000004A1000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    196KB

                                                                                                                                                                                                                                                                                                                  • memory/1752-157-0x0000000000400000-0x000000000058D000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    1.6MB

                                                                                                                                                                                                                                                                                                                  • memory/1784-258-0x0000000000400000-0x000000000044F000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    316KB

                                                                                                                                                                                                                                                                                                                  • memory/1784-876-0x0000000000400000-0x000000000044F000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    316KB

                                                                                                                                                                                                                                                                                                                  • memory/1792-283-0x0000000010000000-0x0000000010012000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    72KB

                                                                                                                                                                                                                                                                                                                  • memory/1804-184-0x0000000000400000-0x0000000000407200-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    28KB

                                                                                                                                                                                                                                                                                                                  • memory/1900-1442-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    224KB

                                                                                                                                                                                                                                                                                                                  • memory/1900-559-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    224KB

                                                                                                                                                                                                                                                                                                                  • memory/1952-388-0x00000000006C0000-0x00000000006D7000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1952-0-0x000007FEF5833000-0x000007FEF5834000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                                                                                                                  • memory/1952-1-0x0000000000C90000-0x0000000001C90000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    16.0MB

                                                                                                                                                                                                                                                                                                                  • memory/1952-386-0x00000000006C0000-0x00000000006D7000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1952-384-0x00000000006C0000-0x00000000006D7000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/1952-137-0x000007FEF5833000-0x000007FEF5834000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                                                                                                                  • memory/2020-129-0x0000000000840000-0x00000000008FC000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    752KB

                                                                                                                                                                                                                                                                                                                  • memory/2056-642-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    1.4MB

                                                                                                                                                                                                                                                                                                                  • memory/2060-524-0x0000000001150000-0x00000000013DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    2.6MB

                                                                                                                                                                                                                                                                                                                  • memory/2060-138-0x0000000001150000-0x00000000013DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    2.6MB

                                                                                                                                                                                                                                                                                                                  • memory/2140-30-0x0000000000390000-0x00000000007F4000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    4.4MB

                                                                                                                                                                                                                                                                                                                  • memory/2140-29-0x000007FEF5833000-0x000007FEF5834000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                                                                                                                  • memory/2204-1159-0x0000000000570000-0x0000000000576000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    24KB

                                                                                                                                                                                                                                                                                                                  • memory/2204-1025-0x000000001BE20000-0x000000001CE36000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    16.1MB

                                                                                                                                                                                                                                                                                                                  • memory/2204-335-0x0000000000B90000-0x000000000162C000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    10.6MB

                                                                                                                                                                                                                                                                                                                  • memory/2236-1727-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    228KB

                                                                                                                                                                                                                                                                                                                  • memory/2236-2597-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    228KB

                                                                                                                                                                                                                                                                                                                  • memory/2364-1139-0x0000000000A80000-0x0000000000AEE000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    440KB

                                                                                                                                                                                                                                                                                                                  • memory/2400-1274-0x00000000010A0000-0x0000000001122000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    520KB

                                                                                                                                                                                                                                                                                                                  • memory/2436-324-0x0000000000400000-0x0000000000434000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    208KB

                                                                                                                                                                                                                                                                                                                  • memory/2496-308-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    72KB

                                                                                                                                                                                                                                                                                                                  • memory/2496-213-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    72KB

                                                                                                                                                                                                                                                                                                                  • memory/2496-218-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    72KB

                                                                                                                                                                                                                                                                                                                  • memory/2560-328-0x0000000000400000-0x00000000006BC000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    2.7MB

                                                                                                                                                                                                                                                                                                                  • memory/2560-121-0x0000000000400000-0x00000000006BC000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    2.7MB

                                                                                                                                                                                                                                                                                                                  • memory/2636-116-0x0000000000980000-0x0000000000990000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    64KB

                                                                                                                                                                                                                                                                                                                  • memory/2740-3432-0x00000000046A0000-0x00000000046D4000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    208KB

                                                                                                                                                                                                                                                                                                                  • memory/2740-325-0x0000000000400000-0x0000000000431000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    196KB

                                                                                                                                                                                                                                                                                                                  • memory/2764-297-0x00000000004E0000-0x000000000057F000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    636KB

                                                                                                                                                                                                                                                                                                                  • memory/2764-309-0x0000000000A90000-0x0000000000B99000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                                                                                                                                  • memory/2764-298-0x0000000000240000-0x000000000025F000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    124KB

                                                                                                                                                                                                                                                                                                                  • memory/2764-299-0x0000000000660000-0x000000000078D000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    1.2MB

                                                                                                                                                                                                                                                                                                                  • memory/2764-321-0x0000000002130000-0x0000000002147000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                                                                                                                  • memory/2764-296-0x0000000000410000-0x00000000004D9000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    804KB

                                                                                                                                                                                                                                                                                                                  • memory/2856-330-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    328KB

                                                                                                                                                                                                                                                                                                                  • memory/2884-329-0x0000000000400000-0x00000000004A6000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    664KB

                                                                                                                                                                                                                                                                                                                  • memory/2884-9-0x0000000000220000-0x0000000000221000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                                                                                                                  • memory/3084-3462-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    64KB

                                                                                                                                                                                                                                                                                                                  • memory/3204-2798-0x0000000000FB0000-0x0000000000FEC000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    240KB

                                                                                                                                                                                                                                                                                                                  • memory/3432-2132-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                  • memory/3432-3181-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                                                                                                                  • memory/3652-2151-0x000000002AA00000-0x000000002AA24000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    144KB

                                                                                                                                                                                                                                                                                                                  • memory/3652-2133-0x0000000000220000-0x0000000000244000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    144KB

                                                                                                                                                                                                                                                                                                                  • memory/3652-1925-0x000000002AA00000-0x000000002AA24000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    144KB

                                                                                                                                                                                                                                                                                                                  • memory/3752-3461-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    64KB

                                                                                                                                                                                                                                                                                                                  • memory/3816-1485-0x0000000001EE0000-0x0000000001F12000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    200KB

                                                                                                                                                                                                                                                                                                                  • memory/3816-1543-0x00000000046B0000-0x00000000046E2000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    200KB

                                                                                                                                                                                                                                                                                                                  • memory/3972-2238-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    64KB

                                                                                                                                                                                                                                                                                                                  • memory/3972-2171-0x0000000000220000-0x0000000000230000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    64KB

                                                                                                                                                                                                                                                                                                                  • memory/3972-1947-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    64KB

                                                                                                                                                                                                                                                                                                                  • memory/4004-1983-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    200KB

                                                                                                                                                                                                                                                                                                                  • memory/4004-3446-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                    200KB