Analysis

  • max time kernel
    139s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/02/2025, 22:09

General

  • Target

    Output.exe

  • Size

    17.4MB

  • MD5

    6c5f34449df54c94c0899b79f4e0daf9

  • SHA1

    f37a250a00fb1637e0584853a5aa46af82d8282a

  • SHA256

    b288adfbd1da93be69b9acd59ca421bfdba59b4dd457c5b457652b61628a9645

  • SHA512

    78875fda16cce785e758dd13f861164b212f5a2b5a0c64e59bc0baeaea1d3362c6987a588c19cf7b8c635bc4bccb69e81c02dbe9d0b0fd94670382ca660a5f0f

  • SSDEEP

    393216:JYJK+TcfoYVSvwM5DpxXUpyW68E52KWfLhgB7jn/1Pn6V5J:28Ng8ebXZJRGhghT/1CV5J

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Hawkeye family
  • Disables Task Manager via registry modification
  • ASPack v2.12-2.42 5 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 32 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Output.exe
    "C:\Users\Admin\AppData\Local\Temp\Output.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Roaming\DeskScroller.exe
      "C:\Users\Admin\AppData\Roaming\DeskScroller.exe"
      2⤵
      • Executes dropped EXE
      PID:2988
    • C:\Users\Admin\AppData\Roaming\DesktopBoom.exe
      "C:\Users\Admin\AppData\Roaming\DesktopBoom.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2400
    • C:\Users\Admin\AppData\Roaming\DScroller.exe
      "C:\Users\Admin\AppData\Roaming\DScroller.exe"
      2⤵
      • Executes dropped EXE
      PID:2064
    • C:\Users\Admin\AppData\Roaming\Flasher.exe
      "C:\Users\Admin\AppData\Roaming\Flasher.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2792
    • C:\Users\Admin\AppData\Roaming\Flip.exe
      "C:\Users\Admin\AppData\Roaming\Flip.exe"
      2⤵
      • Executes dropped EXE
      PID:3020
    • C:\Users\Admin\AppData\Roaming\halyava.exe
      "C:\Users\Admin\AppData\Roaming\halyava.exe"
      2⤵
      • Executes dropped EXE
      PID:2712
    • C:\Users\Admin\AppData\Roaming\Hello.exe
      "C:\Users\Admin\AppData\Roaming\Hello.exe"
      2⤵
      • Executes dropped EXE
      PID:2660
    • C:\Users\Admin\AppData\Roaming\Hydra.exe
      "C:\Users\Admin\AppData\Roaming\Hydra.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2796
    • C:\Users\Admin\AppData\Roaming\Invert.exe
      "C:\Users\Admin\AppData\Roaming\Invert.exe"
      2⤵
      • Executes dropped EXE
      PID:2852
    • C:\Users\Admin\AppData\Roaming\Launcher.exe
      "C:\Users\Admin\AppData\Roaming\Launcher.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2532
    • C:\Users\Admin\AppData\Roaming\Melting.exe
      "C:\Users\Admin\AppData\Roaming\Melting.exe"
      2⤵
      • Executes dropped EXE
      PID:2556
    • C:\Users\Admin\AppData\Roaming\myWeb.exe
      "C:\Users\Admin\AppData\Roaming\myWeb.exe"
      2⤵
      • Executes dropped EXE
      PID:2504
    • C:\Users\Admin\AppData\Roaming\Patterns.exe
      "C:\Users\Admin\AppData\Roaming\Patterns.exe"
      2⤵
      • Executes dropped EXE
      PID:2628
    • C:\Users\Admin\AppData\Roaming\Popup.exe
      "C:\Users\Admin\AppData\Roaming\Popup.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2956
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\readme.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:1140
    • C:\Users\Admin\AppData\Roaming\rickroll.exe
      "C:\Users\Admin\AppData\Roaming\rickroll.exe"
      2⤵
      • Executes dropped EXE
      PID:1740
    • C:\Users\Admin\AppData\Roaming\ScreenScrew.exe
      "C:\Users\Admin\AppData\Roaming\ScreenScrew.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:316
    • C:\Users\Admin\AppData\Roaming\stretch.exe
      "C:\Users\Admin\AppData\Roaming\stretch.exe"
      2⤵
      • Executes dropped EXE
      PID:1840
    • C:\Users\Admin\AppData\Roaming\stretcher.exe
      "C:\Users\Admin\AppData\Roaming\stretcher.exe"
      2⤵
      • Executes dropped EXE
      PID:2300
    • C:\Users\Admin\AppData\Roaming\Time.exe
      "C:\Users\Admin\AppData\Roaming\Time.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2296
    • C:\Users\Admin\AppData\Roaming\Trololo.exe
      "C:\Users\Admin\AppData\Roaming\Trololo.exe"
      2⤵
      • Executes dropped EXE
      PID:2596
      • C:\Windows\system32\taskkill.exe
        taskkill.exe /f /im explorer.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1512
      • C:\Windows\system32\taskkill.exe
        taskkill.exe /f /im taskmgr.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1636
    • C:\Users\Admin\AppData\Roaming\Vista.exe
      "C:\Users\Admin\AppData\Roaming\Vista.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2836
    • C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe
      "C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1772
    • C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe
      "C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1392
    • C:\Users\Admin\AppData\Roaming\Avoid.exe
      "C:\Users\Admin\AppData\Roaming\Avoid.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:2488
    • C:\Users\Admin\AppData\Roaming\Black&White.exe
      "C:\Users\Admin\AppData\Roaming\Black&White.exe"
      2⤵
      • Executes dropped EXE
      PID:2172
    • C:\Users\Admin\AppData\Roaming\Blank.exe
      "C:\Users\Admin\AppData\Roaming\Blank.exe"
      2⤵
      • Executes dropped EXE
      PID:1716
    • C:\Users\Admin\AppData\Roaming\Bubbler.exe
      "C:\Users\Admin\AppData\Roaming\Bubbler.exe"
      2⤵
      • Executes dropped EXE
      PID:2236
    • C:\Users\Admin\AppData\Roaming\ChilledWindows.exe
      "C:\Users\Admin\AppData\Roaming\ChilledWindows.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2188
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2188 -s 2252
        3⤵
          PID:2948
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Roaming\chilledwindows.mp4"
        2⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:660
      • C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe
        "C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe"
        2⤵
        • Executes dropped EXE
        PID:1460
      • C:\Users\Admin\AppData\Roaming\CrazyNCS.exe
        "C:\Users\Admin\AppData\Roaming\CrazyNCS.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3040
      • C:\Users\Admin\AppData\Roaming\Curfun.exe
        "C:\Users\Admin\AppData\Roaming\Curfun.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Avoid.exe

      Filesize

      248KB

      MD5

      20d2c71d6d9daf4499ffc4a5d164f1c3

      SHA1

      38e5dcd93f25386d05a34a5b26d3fba1bf02f7c8

      SHA256

      3ac8cc58dcbceaec3dab046aea050357e0e2248d30b0804c738c9a5b037c220d

      SHA512

      8ffd56fb3538eb60da2dde9e3d6eee0dac8419c61532e9127f47c4351b6e53e01143af92b2e26b521e23cdbbf15d7a358d3757431e572e37a1eede57c7d39704

    • C:\Users\Admin\AppData\Roaming\Black&White.exe

      Filesize

      14KB

      MD5

      00dd057add024c605c0414a985d31c32

      SHA1

      1d00812873ff86b33120923b705c872e13efd5cc

      SHA256

      2665f52d47ee7dfbffabcf58c0da31e311d3efa97442e85944a61bac8629e2af

      SHA512

      3eb9439c75ac9b32a121ee959aa94f11a5c73d26aa24d76bf0af149a045ad1368711797ef949ba834cb6da970005b5e829bc96fba5d841a2256022b973000226

    • C:\Users\Admin\AppData\Roaming\Blank.exe

      Filesize

      71KB

      MD5

      5c70d18d0078e484a9a0a40f8f585bbb

      SHA1

      b3f886d37be5d04bfa5ac93b5d30c9b5cab72e21

      SHA256

      81252087cbffce0278cb4fc96ef4e38902d3a2a353fa761fe1a979c7bf959dcf

      SHA512

      67020862c4409ed267819016c1a76fd08010a5e34274ab17bab76d6fda0d8792deabb509b43580c3ee7c870b770151aa196d812f1cc4040b8ac2bc286fe8c6c5

    • C:\Users\Admin\AppData\Roaming\Bubbler.exe

      Filesize

      67KB

      MD5

      5c8434c362e791e2d40dc47603d2b552

      SHA1

      3181705211deaa2204b4e936e196411a2f0e7b87

      SHA256

      65ee141434e58dddb67d135728d5f8dfb38ee28fc4627b4c5ce3a831c3a724ae

      SHA512

      a4907232d77278cfdbd67ba75dc6fb48f0ce162623126f57efd04ef816fe396f4eb68dca1eaa7876d3a683472f473e229e689b3f75b9fd80a2ceb369dc227110

    • C:\Users\Admin\AppData\Roaming\ChilledWindows.exe

      Filesize

      4.4MB

      MD5

      6a4853cd0584dc90067e15afb43c4962

      SHA1

      ae59bbb123e98dc8379d08887f83d7e52b1b47fc

      SHA256

      ccb9502bf8ba5becf8b758ca04a5625c30b79e2d10d2677cc43ae4253e1288ec

      SHA512

      feb223e0de9bd64e32dc4f3227e175b58196b5e614bca8c2df0bbca2442a564e39d66bcd465154149dc7ebbd3e1ca644ed09d9a9174b52236c76e7388cb9d996

    • C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe

      Filesize

      68KB

      MD5

      bc1e7d033a999c4fd006109c24599f4d

      SHA1

      b927f0fc4a4232a023312198b33272e1a6d79cec

      SHA256

      13adae722719839af8102f98730f3af1c5a56b58069bfce8995acd2123628401

      SHA512

      f5d9b8c1fd9239894ec9c075542bff0bcef79871f31038e627ae257b8c1db9070f4d124448a78e60ccc8bc12f138102a54825e9d7647cd34832984c7c24a6276

    • C:\Users\Admin\AppData\Roaming\CrazyNCS.exe

      Filesize

      122KB

      MD5

      d043ba91e42e0d9a68c9866f002e8a21

      SHA1

      e9f177e1c57db0a15d1dc6b3e6c866d38d85b17c

      SHA256

      6820c71df417e434c5ad26438c901c780fc5a80b28a466821b47d20b8424ef08

      SHA512

      3e9783646e652e9482b3e7648fb0a5f7c8b6c386bbc373d5670d750f6f99f6137b5501e21332411609cbcc0c20f829ab8705c2835e2756455f6754c9975ac6bd

    • C:\Users\Admin\AppData\Roaming\Curfun.exe

      Filesize

      138KB

      MD5

      0b3b2dff5503cb032acd11d232a3af55

      SHA1

      6efc31c1d67f70cf77c319199ac39f70d5a7fa95

      SHA256

      ef878461a149024f3065121ff4e165731ecabef1b94b0b3ed2eda010ad39202b

      SHA512

      484014d65875e706f7e5e5f54c2045d620e5cce5979bf7f37b45c613e6d948719c0b8e466df5d8908706133ce4c4b71a11b804417831c9dbaf72b6854231ea17

    • C:\Users\Admin\AppData\Roaming\DScroller.exe

      Filesize

      11KB

      MD5

      c6aac231bd73d7cd9fe9474265fb2a0a

      SHA1

      693742b31b1f33761062744a9d317c6cb30e7e17

      SHA256

      3558cbfb4478d2f47b600c52bd5018443b86221639602f33ea0385ef3eef6ec5

      SHA512

      a32daa9b7e98b45aba2fc1c9620fca7cda218fb30fce5fa48231c4de92adeb15c8a856179a21f14b5a7acdf7294748f464c2448f3d38ddf71e9e714d913f1988

    • C:\Users\Admin\AppData\Roaming\DeskScroller.exe

      Filesize

      8KB

      MD5

      d704b61a5521a22261ee9025259374fb

      SHA1

      a55a7211c0b2ef2d04824b897ee8ba4d20af6874

      SHA256

      8d4383f98fb673652fda948463e2cd0957ce3c6a1f7912d38245b14cc0e7c4dc

      SHA512

      105f600c76d591909c315ccdb56917badc8b03f81dfe46530db4c4fc03459bfd2b527cc1f81e9d63cbd5c7f7e2447ecfbfb541bb2dca9efd6fca5ade9a0eaa58

    • C:\Users\Admin\AppData\Roaming\Flasher.exe

      Filesize

      246KB

      MD5

      9254ca1da9ff8ad492ca5fa06ca181c6

      SHA1

      70fa62e6232eae52467d29cf1c1dacb8a7aeab90

      SHA256

      30676ad5dc94c3fec3d77d87439b2bf0a1aaa7f01900b68002a06f11caee9ce6

      SHA512

      a84fbbdea4e743f3e41878b9cf6db219778f1479aa478100718af9fc8d7620fc7a3295507e11df39c7863cb896f946514e50368db480796b6603c8de5580685a

    • C:\Users\Admin\AppData\Roaming\Flip.exe

      Filesize

      10KB

      MD5

      fc3fcc73569dc5917637de3c0271d9a5

      SHA1

      9efe1d66d9a4df5868ef12ad70b179517bab0f56

      SHA256

      008b1fbf3dc9b576733d066d69cb0038c8f58699b10f2f2a589e685c2f63fbe3

      SHA512

      92b6dbe06489f9e69ecd0fdba3c29b83ac2a85c12aebf04e493fc30bd72e78c363b9cd8ffd8c4d9643de79581c3e4ab6fc72eae1602b2fc97443e0f982155bf0

    • C:\Users\Admin\AppData\Roaming\Hello.exe

      Filesize

      10KB

      MD5

      9bbf8c162b7d054161ed1f4db8d478b0

      SHA1

      157bffed52c8c7abfeeef731bea33086e713ec74

      SHA256

      2aabaa220e383a19c27bfad1262e972ec443e3bf56ea116a7600fe7f72661a02

      SHA512

      bf62209c8e1cb93a60f944f0342d2c0b8ff31abddc1b31c80130b6c175e060581f51a1252bdd95e481016aac16778bfe208e67fd0ba5e6e9297622c878416912

    • C:\Users\Admin\AppData\Roaming\Hydra.exe

      Filesize

      43KB

      MD5

      b2eca909a91e1946457a0b36eaf90930

      SHA1

      3200c4e4d0d4ece2b2aadb6939be59b91954bcfa

      SHA256

      0b6c0af51cde971b3e5f8aa204f8205418ab8c180b79a5ac1c11a6e0676f0f7c

      SHA512

      607d20e4a46932c7f4d9609ef9451e2303cd79e7c4778fe03f444e7dc800d6de7537fd2648c7c476b9f098588dc447e8c39d8b21cd528d002dfa513a19c6ebbf

    • C:\Users\Admin\AppData\Roaming\Invert.exe

      Filesize

      13KB

      MD5

      0cdadd11f9888e0beed3b914fdd1308a

      SHA1

      5fdb5aab369e8873a9ddf9858fb40427479b198f

      SHA256

      3ec6564b1fab7c90167e287e01ae26e800d049098332b42e67fa00a416b6cc93

      SHA512

      493d94db6c8075d85fb0069e314f47b9939431d7e18f9c5ec332efa91397e5a09c653bce22c5f7b4cc73f5e180b0c8b505b550e882ad39866f6799526701638a

    • C:\Users\Admin\AppData\Roaming\Launcher.exe

      Filesize

      197KB

      MD5

      7506eb94c661522aff09a5c96d6f182b

      SHA1

      329bbdb1f877942d55b53b1d48db56a458eb2310

      SHA256

      d5b962dfe37671b5134f0b741a662610b568c2b5374010ee92b5b7857d87872c

      SHA512

      d815a9391ef3d508b89fc221506b95f4c92d586ec38f26aec0f239750f34cf398eed3d818fa439f6aa6ed3b30f555a1903d93eeeec133b80849a4aa6685ec070

    • C:\Users\Admin\AppData\Roaming\Melting.exe

      Filesize

      12KB

      MD5

      833619a4c9e8c808f092bf477af62618

      SHA1

      b4a0efa26f790e991cb17542c8e6aeb5030d1ebf

      SHA256

      92a284981c7ca33f1af45ce61738479fbcbb5a4111f5498e2cb54931c8a36c76

      SHA512

      4f231fc16339d568b5cf9353133aeae835eb262dab68bc80d92f37b43df64dce4fae0e913cbaa3bb61351a759aeecf9d280bc5779b0853c980559a654d6cca11

    • C:\Users\Admin\AppData\Roaming\Patterns.exe

      Filesize

      11KB

      MD5

      b03dfd6a6d029948924b5486a5bd1931

      SHA1

      bf04f4cf5d98fbfc6f6d9a8cb12c3d60823f3f11

      SHA256

      33644f58e9eb469a733dba31db9af9fde1ba5298fc18389c0a78879a4406fc4f

      SHA512

      1903a9c0e106ceeb340d4a66460b4af8fee40b7c12872b5ca91bf470d56edc1b91e7c57b1f6388efe50c70d379b12858eaaf08269f6e2d658ad8102a2f89d6e5

    • C:\Users\Admin\AppData\Roaming\Popup.exe

      Filesize

      373KB

      MD5

      9c3e9e30d51489a891513e8a14d931e4

      SHA1

      4e5a5898389eef8f464dee04a74f3b5c217b7176

      SHA256

      f8f7b5f20ca57c61df6dc8ff49f2f5f90276a378ec17397249fdc099a6e1dcd8

      SHA512

      bf45677b7dd6c67ad350ec6ecad5bc3f04dea179fae0ff0a695c69f7de919476dd7a69c25b04c8530a35119e4933f4a8c327ed6dcef892b1114dfd7e494a19a7

    • C:\Users\Admin\AppData\Roaming\ScreenScrew.exe

      Filesize

      111KB

      MD5

      e87a04c270f98bb6b5677cc789d1ad1d

      SHA1

      8c14cb338e23d4a82f6310d13b36729e543ff0ca

      SHA256

      e03520794f00fb39ef3cfff012f72a5d03c60f89de28dbe69016f6ed151b5338

      SHA512

      8784f4d42908e54ecedfb06b254992c63920f43a27903ccedd336daaeed346db44e1f40e7db971735da707b5b32206be1b1571bc0d6a2d6eb90bbf9d1f69de13

    • C:\Users\Admin\AppData\Roaming\Time.exe

      Filesize

      111KB

      MD5

      9d0d2fcb45b1ff9555711b47e0cd65e5

      SHA1

      958f29a99cbb135c92c5d1cdffb9462be35ee9fd

      SHA256

      dc476ae39effdd80399b6e36f1fde92c216a5bbdb6b8b2a7ecbe753e91e4c993

      SHA512

      8fd4ce4674cd52a3c925149945a7a50a139302be17f6ee3f30271ebe1aa6d92bcb15a017dca989cd837a5d23cd56eaacc6344dc7730234a4629186976c857ca9

    • C:\Users\Admin\AppData\Roaming\Trololo.exe

      Filesize

      3.0MB

      MD5

      b6d61b516d41e209b207b41d91e3b90d

      SHA1

      e50d4b7bf005075cb63d6bd9ad48c92a00ee9444

      SHA256

      3d0efd55bde5fb7a73817940bac2a901d934b496738b7c5cab7ea0f6228e28fe

      SHA512

      3217fc904e4c71b399dd273786634a6a6c19064a9bf96960df9b3357001c12b9547813412173149f6185eb5d300492d290342ec955a8347c6f9dcac338c136da

    • C:\Users\Admin\AppData\Roaming\Vista.exe

      Filesize

      1.9MB

      MD5

      faa6cb3e816adaeaabf2930457c79c33

      SHA1

      6539de41b48d271bf4237e6eb09b0ee40f9a2140

      SHA256

      6680317e6eaa04315b47aaadd986262cd485c8a4bd843902f4c779c858a3e31b

      SHA512

      58859556771203d736ee991b651a6a409de7e3059c2afe81d4545864295c383f75cfbabf3cffaa0c412a6ec27bf939f0893c28152f53512c7885e597db8d2c66

    • C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe

      Filesize

      728KB

      MD5

      6e49c75f701aa059fa6ed5859650b910

      SHA1

      ccb7898c509c3a1de96d2010d638f6a719f6f400

      SHA256

      f91f02fd27ada64f36f6df59a611fef106ff7734833dea825d0612e73bdfb621

      SHA512

      ccd1b581a29de52d2313a97eb3c3b32b223dba1e7a49c83f7774b374bc2d16b13fba9566de6762883f3b64ed8e80327b454e5d32392af2a032c22653fed0fff8

    • C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe

      Filesize

      760KB

      MD5

      515198a8dfa7825f746d5921a4bc4db9

      SHA1

      e1da0b7f046886c1c4ff6993f7f98ee9a1bc90ae

      SHA256

      0fda176b199295f72fafc3bc25cefa27fa44ed7712c3a24ca2409217e430436d

      SHA512

      9e47037fe40b79ebf056a9c6279e318d85da9cd7e633230129d77a1b8637ecbafc60be38dd21ca9077ebfcb9260d87ff7fcc85b8699b3135148fe956972de3e8

    • C:\Users\Admin\AppData\Roaming\chilledwindows.mp4

      Filesize

      3.6MB

      MD5

      698ddcaec1edcf1245807627884edf9c

      SHA1

      c7fcbeaa2aadffaf807c096c51fb14c47003ac20

      SHA256

      cde975f975d21edb2e5faa505205ab8a2c5a565ba1ff8585d1f0e372b2a1d78b

      SHA512

      a2c326f0c653edcd613a3cefc8d82006e843e69afc787c870aa1b9686a20d79e5ab4e9e60b04d1970f07d88318588c1305117810e73ac620afd1fb6511394155

    • C:\Users\Admin\AppData\Roaming\halyava.exe

      Filesize

      8KB

      MD5

      9f32f1fb5155d01ce47a6b0e679ff2fe

      SHA1

      ad131beb815ca355a09cb2e4572d2d85f1d1259c

      SHA256

      c9bcd8aa2ba6364e441f609494a57a729b53e0360b7a8317e2baed76770e6d3c

      SHA512

      34ac158c558a967b8bd2ac99d8c236174f2aabd62604c8890c6236ab89e7d9345753483ad91285a02a29d4a7e1c297e0bd20767605243ed1cc03a976a226ad83

    • C:\Users\Admin\AppData\Roaming\myWeb.exe

      Filesize

      15KB

      MD5

      68cabf111614c64cc454a6a5fe9ee4ff

      SHA1

      74a036f32c37025699280fb474b6f7815a9d118c

      SHA256

      81162716b98c2af6e76c0acc1188c03db1e8f9485ebdff38a6364bff4aa59406

      SHA512

      cc01c441172de1bc9a414b2660d8a5330adf12fcdf2721caebadf45937864577a48fba9dd202f154f91a7a028dd8679896ecc22b9bddea9839d7af918835dad7

    • C:\Users\Admin\AppData\Roaming\readme.txt

      Filesize

      819B

      MD5

      98c32890244ae9bce586cd45c41372a1

      SHA1

      09455ab292743be38487f9ce1e1f1dceb50d86be

      SHA256

      eaa59e61ff4049f95acfb07b49063740be923153bf570cb329ffcfe88f119375

      SHA512

      7adecdd5843a014c5513803f60eb2563c539d2bb70dd9bfd327a795cfe9295e822d26c5d12dc289c0ae7487cdb008a7e3c5efeb9b4b2a1fbdbbfa5225a3f59e6

    • C:\Users\Admin\AppData\Roaming\stretch.exe

      Filesize

      10KB

      MD5

      709fe771c0771fd218966de90d2b8083

      SHA1

      d57956ba2116a02c8e7a8d5d1118b62195f9e239

      SHA256

      137773df88edfdfbba296b1354666c3b57a810dd229dea1c3566f5d3390858a2

      SHA512

      fb9566efeb5edd81b49a6e175c8516381fafae487b88b8510598de038d767c27bd493cc889041857683db12b7a860c226990221f12b3467968329742441a36ea

    • C:\Users\Admin\AppData\Roaming\stretcher.exe

      Filesize

      11KB

      MD5

      8362e99800b0893acde429974e3bec18

      SHA1

      171fcd759a711ccfae5c17bc28733d96b3c4c501

      SHA256

      0fa2eed94a65179a43b1435b0a9f450632b35f03eb46562edd95433bcf27afac

      SHA512

      cd4de6bfb80bf7c9666e2119a8ec9630b4f150f3a492be6c6d9ef37bc93e05deaf99733eeba7ea78024de905dfb9cc666752db1cfe3a8f0dafd26e7e92a4f9a9

    • \Users\Admin\AppData\Roaming\DesktopBoom.exe

      Filesize

      1.1MB

      MD5

      f0a661d33aac3a3ce0c38c89bec52f89

      SHA1

      709d6465793675208f22f779f9e070ed31d81e61

      SHA256

      c20e78ce9028299d566684d35b1230d055e5ea0e9b94d0aff58f650e0468778a

      SHA512

      57cdb3c38f2e90d03e6dc1f9d8d1131d40d3919f390bb1783343c82465461319e70483dc3cd3efdbd9a62dfc88d74fc706f05d760ffd8506b16fd7686e414443

    • \Users\Admin\AppData\Roaming\rickroll.exe

      Filesize

      129KB

      MD5

      0ec108e32c12ca7648254cf9718ad8d5

      SHA1

      78e07f54eeb6af5191c744ebb8da83dad895eca1

      SHA256

      48b08ea78124ca010784d9f0faae751fc4a0c72c0e7149ded81fc03819f5d723

      SHA512

      1129e685f5dd0cb2fa22ef4fe5da3f1e2632e890333ce17d3d06d04a4097b4d9f4ca7d242611ffc9e26079900945cf04ab6565a1c322e88e161f1929d18a2072

    • memory/316-260-0x0000000000400000-0x000000000044A000-memory.dmp

      Filesize

      296KB

    • memory/316-311-0x0000000000400000-0x000000000044A000-memory.dmp

      Filesize

      296KB

    • memory/660-282-0x000007FEEFFE0000-0x000007FEEFFF1000-memory.dmp

      Filesize

      68KB

    • memory/660-293-0x000007FEEF8C0000-0x000007FEEF8D7000-memory.dmp

      Filesize

      92KB

    • memory/660-318-0x000007FEEF990000-0x000007FEEFC46000-memory.dmp

      Filesize

      2.7MB

    • memory/660-295-0x000007FEE42D0000-0x000007FEE44D6000-memory.dmp

      Filesize

      2.0MB

    • memory/660-296-0x000007FEE6E60000-0x000007FEE6E72000-memory.dmp

      Filesize

      72KB

    • memory/660-297-0x000007FEE6E10000-0x000007FEE6E52000-memory.dmp

      Filesize

      264KB

    • memory/660-298-0x000007FEE6DC0000-0x000007FEE6E0D000-memory.dmp

      Filesize

      308KB

    • memory/660-299-0x000007FEE39B0000-0x000007FEE39C1000-memory.dmp

      Filesize

      68KB

    • memory/660-300-0x000007FEE3990000-0x000007FEE39A5000-memory.dmp

      Filesize

      84KB

    • memory/660-301-0x000007FEE26C0000-0x000007FEE2734000-memory.dmp

      Filesize

      464KB

    • memory/660-302-0x000007FEFBFE0000-0x000007FEFC02E000-memory.dmp

      Filesize

      312KB

    • memory/660-294-0x000007FEE44E0000-0x000007FEE5D4F000-memory.dmp

      Filesize

      24.4MB

    • memory/660-303-0x000007FEFBF10000-0x000007FEFBF44000-memory.dmp

      Filesize

      208KB

    • memory/660-288-0x000007FEE7970000-0x000007FEE8A20000-memory.dmp

      Filesize

      16.7MB

    • memory/660-289-0x000007FEE7700000-0x000007FEE777C000-memory.dmp

      Filesize

      496KB

    • memory/660-292-0x000007FEE7520000-0x000007FEE76A0000-memory.dmp

      Filesize

      1.5MB

    • memory/660-290-0x000007FEEF8E0000-0x000007FEEF8F1000-memory.dmp

      Filesize

      68KB

    • memory/660-291-0x000007FEE76A0000-0x000007FEE76F7000-memory.dmp

      Filesize

      348KB

    • memory/660-278-0x000007FEF03D0000-0x000007FEF03F1000-memory.dmp

      Filesize

      132KB

    • memory/660-279-0x000007FEF0040000-0x000007FEF0058000-memory.dmp

      Filesize

      96KB

    • memory/660-280-0x000007FEF0020000-0x000007FEF0031000-memory.dmp

      Filesize

      68KB

    • memory/660-281-0x000007FEF0000000-0x000007FEF0011000-memory.dmp

      Filesize

      68KB

    • memory/660-283-0x000007FEEF970000-0x000007FEEF98B000-memory.dmp

      Filesize

      108KB

    • memory/660-284-0x000007FEEF950000-0x000007FEEF961000-memory.dmp

      Filesize

      68KB

    • memory/660-285-0x000007FEEF930000-0x000007FEEF948000-memory.dmp

      Filesize

      96KB

    • memory/660-286-0x000007FEEF900000-0x000007FEEF930000-memory.dmp

      Filesize

      192KB

    • memory/660-287-0x000007FEEF650000-0x000007FEEF6B7000-memory.dmp

      Filesize

      412KB

    • memory/660-266-0x000000013F200000-0x000000013F2F8000-memory.dmp

      Filesize

      992KB

    • memory/660-267-0x000007FEF2240000-0x000007FEF2274000-memory.dmp

      Filesize

      208KB

    • memory/660-269-0x000007FEF20F0000-0x000007FEF2108000-memory.dmp

      Filesize

      96KB

    • memory/660-270-0x000007FEF20D0000-0x000007FEF20E7000-memory.dmp

      Filesize

      92KB

    • memory/660-268-0x000007FEEF990000-0x000007FEEFC46000-memory.dmp

      Filesize

      2.7MB

    • memory/660-277-0x000007FEF0060000-0x000007FEF00A1000-memory.dmp

      Filesize

      260KB

    • memory/660-276-0x000007FEE8A20000-0x000007FEE8C2B000-memory.dmp

      Filesize

      2.0MB

    • memory/660-275-0x000007FEF0400000-0x000007FEF0411000-memory.dmp

      Filesize

      68KB

    • memory/660-274-0x000007FEF0420000-0x000007FEF043D000-memory.dmp

      Filesize

      116KB

    • memory/660-273-0x000007FEF0440000-0x000007FEF0451000-memory.dmp

      Filesize

      68KB

    • memory/660-272-0x000007FEF1CB0000-0x000007FEF1CC7000-memory.dmp

      Filesize

      92KB

    • memory/660-271-0x000007FEF20B0000-0x000007FEF20C1000-memory.dmp

      Filesize

      68KB

    • memory/1392-162-0x0000000000400000-0x00000000006BC000-memory.dmp

      Filesize

      2.7MB

    • memory/1392-232-0x0000000000400000-0x00000000006BC000-memory.dmp

      Filesize

      2.7MB

    • memory/1716-597-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1716-185-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1740-259-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1772-186-0x0000000000D30000-0x0000000000DEC000-memory.dmp

      Filesize

      752KB

    • memory/1960-1-0x0000000001300000-0x000000000246C000-memory.dmp

      Filesize

      17.4MB

    • memory/1960-0-0x000007FEF59F3000-0x000007FEF59F4000-memory.dmp

      Filesize

      4KB

    • memory/2188-230-0x0000000000CA0000-0x0000000000CAA000-memory.dmp

      Filesize

      40KB

    • memory/2188-231-0x0000000000CA0000-0x0000000000CAA000-memory.dmp

      Filesize

      40KB

    • memory/2188-263-0x0000000000CA0000-0x0000000000CAA000-memory.dmp

      Filesize

      40KB

    • memory/2188-255-0x0000000000CA0000-0x0000000000CAA000-memory.dmp

      Filesize

      40KB

    • memory/2188-253-0x0000000000CA0000-0x0000000000CAA000-memory.dmp

      Filesize

      40KB

    • memory/2188-252-0x0000000000CA0000-0x0000000000CAA000-memory.dmp

      Filesize

      40KB

    • memory/2188-251-0x00000000006D0000-0x00000000006DA000-memory.dmp

      Filesize

      40KB

    • memory/2188-249-0x0000000000CC0000-0x0000000000CCA000-memory.dmp

      Filesize

      40KB

    • memory/2188-250-0x00000000006D0000-0x00000000006DA000-memory.dmp

      Filesize

      40KB

    • memory/2188-248-0x0000000000CC0000-0x0000000000CCA000-memory.dmp

      Filesize

      40KB

    • memory/2188-306-0x0000000000CC0000-0x0000000000CCA000-memory.dmp

      Filesize

      40KB

    • memory/2188-218-0x00000000013D0000-0x0000000001834000-memory.dmp

      Filesize

      4.4MB

    • memory/2188-221-0x00000000006D0000-0x00000000006DA000-memory.dmp

      Filesize

      40KB

    • memory/2188-233-0x0000000000CA0000-0x0000000000CAA000-memory.dmp

      Filesize

      40KB

    • memory/2188-305-0x0000000000CC0000-0x0000000000CCA000-memory.dmp

      Filesize

      40KB

    • memory/2188-254-0x0000000000CA0000-0x0000000000CAA000-memory.dmp

      Filesize

      40KB

    • memory/2188-220-0x00000000006D0000-0x00000000006DA000-memory.dmp

      Filesize

      40KB

    • memory/2188-228-0x0000000000CA0000-0x0000000000CAA000-memory.dmp

      Filesize

      40KB

    • memory/2188-229-0x0000000000CA0000-0x0000000000CAA000-memory.dmp

      Filesize

      40KB

    • memory/2296-261-0x0000000000400000-0x000000000044A000-memory.dmp

      Filesize

      296KB

    • memory/2488-265-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/2532-257-0x0000000000400000-0x0000000000489000-memory.dmp

      Filesize

      548KB

    • memory/2660-51-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2660-596-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2792-256-0x0000000000400000-0x00000000004A4000-memory.dmp

      Filesize

      656KB

    • memory/2796-116-0x0000000001300000-0x0000000001310000-memory.dmp

      Filesize

      64KB

    • memory/2836-262-0x0000000000400000-0x0000000000ABC000-memory.dmp

      Filesize

      6.7MB

    • memory/2956-258-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/2988-9-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2988-595-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/3040-304-0x0000000000400000-0x0000000000452000-memory.dmp

      Filesize

      328KB