Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
437s -
max time network
438s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/03/2025, 12:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/topics/malware-collection
Resource
win11-20250217-en
Errors
General
-
Target
https://github.com/topics/malware-collection
Malware Config
Signatures
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral1/files/0x001900000002b130-550.dat mimikatz -
Executes dropped EXE 7 IoCs
pid Process 468 Locky.exe 3084 Ransomware.7ev3n.exe 3716 Ransomware.BadRabbit.exe 3080 Ransomware.CoronaVirus.exe 4208 Ransomware.CryptoLocker.exe 4752 Ransomware.CryptoWall.exe 3052 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Loads dropped DLL 1 IoCs
pid Process 1500 rundll32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 2 camo.githubusercontent.com 32 camo.githubusercontent.com 33 camo.githubusercontent.com 34 camo.githubusercontent.com 35 camo.githubusercontent.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-addr.es 59 ip-addr.es -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\infpub.dat Ransomware.BadRabbit.exe File opened for modification C:\Windows\infpub.dat rundll32.exe File created C:\Windows\cscc.dat rundll32.exe File created C:\Windows\dispci.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Locky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ransomware.CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ransomware.CryptoWall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ransomware.7ev3n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ransomware.BadRabbit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ransomware.CoronaVirus.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000_Classes\Local Settings msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\MalwareCollection-master.zip:Zone.Identifier msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5296 schtasks.exe 5308 schtasks.exe 5264 SCHTASKS.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1532 msedge.exe 1532 msedge.exe 3408 msedge.exe 3408 msedge.exe 236 identity_helper.exe 236 identity_helper.exe 1624 msedge.exe 1624 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 788 powershell.exe 788 powershell.exe 788 powershell.exe 1500 rundll32.exe 1500 rundll32.exe 1500 rundll32.exe 1500 rundll32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4752 Ransomware.CryptoWall.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeRestorePrivilege 436 7zG.exe Token: 35 436 7zG.exe Token: SeSecurityPrivilege 436 7zG.exe Token: SeSecurityPrivilege 436 7zG.exe Token: SeRestorePrivilege 4756 7zG.exe Token: 35 4756 7zG.exe Token: SeSecurityPrivilege 4756 7zG.exe Token: SeSecurityPrivilege 4756 7zG.exe Token: SeDebugPrivilege 788 powershell.exe Token: SeShutdownPrivilege 1500 rundll32.exe Token: SeDebugPrivilege 1500 rundll32.exe Token: SeTcbPrivilege 1500 rundll32.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2820 WindowsTerminal.exe 872 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2468 1532 msedge.exe 81 PID 1532 wrote to memory of 2468 1532 msedge.exe 81 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 2672 1532 msedge.exe 82 PID 1532 wrote to memory of 1088 1532 msedge.exe 83 PID 1532 wrote to memory of 1088 1532 msedge.exe 83 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84 PID 1532 wrote to memory of 3044 1532 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/topics/malware-collection1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffca5063cb8,0x7ffca5063cc8,0x7ffca5063cd82⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,13181282690268495032,12215263389735281431,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,13181282690268495032,12215263389735281431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,13181282690268495032,12215263389735281431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2488 /prefetch:82⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13181282690268495032,12215263389735281431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13181282690268495032,12215263389735281431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13181282690268495032,12215263389735281431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13181282690268495032,12215263389735281431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1872,13181282690268495032,12215263389735281431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13181282690268495032,12215263389735281431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13181282690268495032,12215263389735281431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,13181282690268495032,12215263389735281431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,13181282690268495032,12215263389735281431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13181282690268495032,12215263389735281431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1872,13181282690268495032,12215263389735281431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7160 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,13181282690268495032,12215263389735281431,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2456 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3752
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3252
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Virus\Virus.9X.WinNuke\" -spe -an -ai#7zMap19807:206:7zEvent220101⤵
- Suspicious use of AdjustPrivilegeToken
PID:436
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\" -an -ai#7zMap31522:3786:7zEvent66321⤵
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
C:\Windows\System32\DataExchangeHost.exeC:\Windows\System32\DataExchangeHost.exe -Embedding1⤵PID:2860
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:2372
-
C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\wt.exe"C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\wt.exe"1⤵PID:3508
-
C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\WindowsTerminal.exewt.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Windows\system32\wsl.exeC:\Windows\system32\wsl.exe --list3⤵PID:1180
-
-
C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\OpenConsole.exe"C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\OpenConsole.exe" --headless --win32input --resizeQuirk --width 120 --height 27 --signal 0xa50 --server 0xa4c3⤵PID:4196
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:788 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:3552
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo off "5⤵PID:4108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo off "5⤵PID:4428
-
-
C:\Windows\system32\clip.execlip5⤵PID:4340
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Locky.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Locky.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:468
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.7ev3n.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.7ev3n.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3084 -
C:\Users\Admin\AppData\Local\system.exe"C:\Users\Admin\AppData\Local\system.exe"6⤵PID:3048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat7⤵PID:5196
-
-
C:\Windows\SysWOW64\SCHTASKS.exeC:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:5264
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:647⤵PID:5512
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:647⤵PID:5520
-
-
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.BadRabbit.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.BadRabbit.exe"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3716 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 156⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Delete /F /TN rhaegal7⤵PID:4032
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /F /TN rhaegal8⤵PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 741991499 && exit"7⤵PID:412
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 741991499 && exit"8⤵
- Scheduled Task/Job: Scheduled Task
PID:5308
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 13:00:007⤵PID:1052
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 13:00:008⤵
- Scheduled Task/Job: Scheduled Task
PID:5296
-
-
-
C:\Windows\4237.tmp"C:\Windows\4237.tmp" \\.\pipe\{79D8F8A7-0502-41E1-BAD6-86B606FCC511}7⤵PID:3584
-
-
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.CoronaVirus.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.CoronaVirus.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3080
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.CryptoLocker.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.CryptoLocker.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4208 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.CryptoLocker.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000002387⤵PID:1668
-
-
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.CryptoWall.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.CryptoWall.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4752 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\syswow64\explorer.exe"6⤵PID:1604
-
C:\Windows\SysWOW64\svchost.exe-k netsvcs7⤵PID:1152
-
-
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.GoldenEye.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.GoldenEye.exe"5⤵PID:3076
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.InfinityCrypt.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.InfinityCrypt.exe"5⤵PID:5052
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Jigsaw.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Jigsaw.exe"5⤵PID:4756
-
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Jigsaw.exe6⤵PID:3920
-
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Mischa.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Mischa.exe"5⤵PID:1956
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Mischa.v2.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Mischa.v2.exe"5⤵PID:928
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.NoMoreRansom.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.NoMoreRansom.exe"5⤵PID:652
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.NotPetya.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.NotPetya.exe"5⤵PID:4784
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Petya.A.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Petya.A.exe"5⤵PID:1196
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Satana.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Satana.exe"5⤵PID:1604
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.WannaCrypt0r.v1.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.WannaCrypt0r.v1.exe"5⤵PID:2548
-
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.WannaCrypt0r.v2.exe"C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.WannaCrypt0r.v2.exe"5⤵PID:3592
-
-
-
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.DD28355ECA9B248EB40A15815E609E005A2875F512A8EABA1A23C48D33C52040
Filesize32KB
MD5c1f1a88a9822d382b516143a8cd58a93
SHA1f4fd3933e07ba730f7aabe3a66f3fc00aeb5c2d1
SHA2567d1953c5521443a3e0446d785620397d2999a3c0e61bbf1d7a9e30209e6aacd6
SHA512119cfe5cccf88716ba522d9f7c4c9a681d28a1febe0db8d9aa40339f757c2a27ee5ba0161fac05722d03bfa9576b594d2ebfb4cc81872c0f43384abe0899cdc9
-
Filesize
152B
MD5b98903eec4d4ba62d58ef15c040a098c
SHA1edbfd3947a194ddd1ee2e2edb465eb7a57f27cb3
SHA256698d9fcc6775ee16a41017cf13ccd9614001c681b8a4da741a1851f1b9f48def
SHA512ee53739c6c098c48a594768bbbbada27d9728034b85e0e67220be097007348162f257a31f0669bcd17ba142b10b110680c3b5b18f9c40b37e5fa1fe8124d27e8
-
Filesize
152B
MD5afe073f7cd46dc621114e4f8757336cc
SHA12063f15f773ff434b375a1fe4c593bc91b31f2e0
SHA256e54fed17731c51a64a17e37dc2511159e55b308f0a67939477494c15166ebffd
SHA512bfe0b1bb10d93def5ed5104e8aac1d74991de2ad64042ebcb35ad43e3dc3bfdb47d126a3c6632238e68c8e227187ba05f81192b50843162134222446fdb0b25f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5ffa5aed3a82592da5f824e1923c9d24a
SHA14406a3069cc0c5acbf1fac8b512e89ddd4c095cd
SHA256804e372c1b8183085c2fa363ae561b2ad600185fdc2ee46874655f54f98963e1
SHA51203eeff570ec14abd8b4ad85c5818eedb84d19be5eeac8ae49a6edd6c94c099bd533f1031b8879467fa0a09d6910ca5b0b4fff7a47afa5a3a10ea9dcfe364a6d4
-
Filesize
657B
MD57618662a2a7ff595d99c17a84807a8fc
SHA1b9777164432f570843d463dedc0d963cfe6758a6
SHA256175af3452b59107f5580818989bdd27067a0db99b971fb8f52896bfa8e9a0db7
SHA512cd19fa196c9eb2e4770d3fc9d3f10e115a93e019c65328998ffe09fae7c20bb2192261a43e8527f7a3db41b2488cd70d94bbd313eabda5b9665328c4ba100c4d
-
Filesize
5KB
MD5b6747a2896d57402aa83dc0ab1e1f1ae
SHA16b5b21ee2fbdc81b4beb7910aaf02d875ab3d7be
SHA256145f9da053c767fc437db28f7688e17f5ad111a5f6d286d2c3d6d9596c412f49
SHA512f83e6205870689f0ebfd585a3a904eefaf9db1c90373979c60a91cc10847700dd38fdbfbbba9499dc8fe841224896469f793847696f91b620c3fff46edebd309
-
Filesize
6KB
MD53330d0b5b2449cfe3537867439115ec0
SHA11edfa5e419e5131167b2e18d65a3f951e63b7875
SHA2564f90b5df0aef96bdfa83bc4b9f1ed21da2ed35fed531030ea6c233dcd8aa95f2
SHA512d91988d595d6318748f70a6a2b54df018f3ebbf6a6174b5d7509d34def4b68045fd3c66b974c9a2c7afddf7789d73eaedd8711be968d3f211554114a49f6cc66
-
Filesize
6KB
MD531d72c8118ba2d2f45744e6aff765a5d
SHA1dad691addf977b5b60f9a92ca83e7517e47eecde
SHA2563536f18af3990137aade48787dd1b2d528eddd7cd349f137cc54b34aa481cf3f
SHA512d94cf1583f151e201b3dcd8d5964cd6241874dfb9f48ae269ddf630b651608de091e0e0bc8a15900c3926eca9e9d822c0f6f59fa64472001ff10c994a40e5bd0
-
Filesize
1KB
MD5279cf2cf234dc6efecc042a076af3f92
SHA1f65ba2e8eb08c8a646a7d9951f3d34d6a611d7a2
SHA2568f012a51383a6a4e3db64ee9d33e6d236e2d899712709ae444d328896ac85f0f
SHA512f58920574b7e159f6ff58167dce25d935c243cee077407f8c40b33096e1fc731848e9ee7962630c4bd57e765105a34625c7dbd7036c5b08b973d97f4599e688a
-
Filesize
706B
MD52239c1cd775135c9227c541db2d57417
SHA141417c6ae451f0e4239ae76983b8f28f8959e025
SHA256a69c1c20a26d25553a91f7b5962dfa7afbb0919ddf0961588d3f355b68210daa
SHA5123562d3acd68c46d8218f0e5dc2e7ffe73db067760291188e167c2e7bbbdbda9bbd110911108c877a1577be437e600f8dacf0c0d192bfd1d0d37b74a77df30439
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD59ee68c620a9f3badcefedb4d2e5f03a6
SHA16067038e6466d9c289a189f5aeb8a1aeb4d45d26
SHA2569ce79234c90c64be12d772c3a5352250009f4867c232b5aca53c35172cfde206
SHA512d933efa0bc973afc32021de1003ac294c2a78ee71d01c2c16bb2741df5a0bd4d377b90020f7e093024add3f4fde3b3b316922063f1ce3b57104b6632b5529456
-
Filesize
10KB
MD5ec68272d86403dedf4ffe293285249b8
SHA173911a28ca98870f130985961c6c696e5e820849
SHA2561bf3e16c9c248ad0697382d5dc5d4df380912c76d3f8304071dab6ef57c077f6
SHA51210137446cd2cbc0ecefda837a7b284a5495d24f0d09b0b9856e735797dc18503e922127fd1cf5340e032df7f46d17084fe4743e2208c7479d8c09acffebf69c7
-
Filesize
12KB
MD55eefb88d23f75785ed39b5c5c2201dc8
SHA1770f878e850cf216a28327c03766ffaf9d2e19ec
SHA2564b468eb86b248e1d321adb090bb1417b3fd1e5826c923980750c6c04c256b084
SHA512cbe727969bb29dfb2e64d064358dc933ccbd4e77429fbd6936f896bdc4e74ba2ac4e5303c19b20273ee7aae6595f2cc75677b8742350064e025a723fe2493a7d
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\fd849cbb-7562-48af-a104-4b100ff8e97a.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
315KB
MD503879716db29b6bf4c06b5ceb5efb616
SHA1d458cb848fc1419fe5f8e8d7a7c9c70cdc4ad0ca
SHA2564c435b0d4ce8f2cb7347c0f3fae5037933948b116142b5091e12bd9dfccf074d
SHA512cf21a642116cf44f5cdf0b859d2aa1df65ef46eda148f1ea0dd901a59e0cbd5c1cb874712625ea810a4aca17bd7af623aa16af8f809baa204a74e2b6153c7f59
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
180KB
MD5b06d9dd17c69ed2ae75d9e40b2631b42
SHA1b606aaa402bfe4a15ef80165e964d384f25564e4
SHA256bc98c8b22461a2c2631b2feec399208fdc4ecd1cd2229066c2f385caa958daa3
SHA5128e54aca4feb51611142c1f2bf303200113604013c2603eea22d72d00297cb1cb40a2ef11f5129989cd14f90e495db79bffd15bd6282ff564c4af7975b1610c1c
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.7ev3n.exe
Filesize315KB
MD59f8bc96c96d43ecb69f883388d228754
SHA161ed25a706afa2f6684bb4d64f69c5fb29d20953
SHA2567d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5
SHA512550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.BadRabbit.exe
Filesize431KB
MD5fbbdc39af1139aebba4da004475e8839
SHA1de5c8d858e6e41da715dca1c019df0bfb92d32c0
SHA256630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da
SHA51274eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.CoronaVirus.exe
Filesize1.0MB
MD5055d1462f66a350d9886542d4d79bc2b
SHA1f1086d2f667d807dbb1aa362a7a809ea119f2565
SHA256dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0
SHA5122c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.CryptoLocker.exe
Filesize338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.CryptoWall.exe
Filesize132KB
MD5919034c8efb9678f96b47a20fa6199f2
SHA1747070c74d0400cffeb28fbea17b64297f14cfbd
SHA256e036d68b8f8b7afc6c8b6252876e1e290f11a26d4ad18ac6f310662845b2c734
SHA512745a81c50bbfd62234edb9788c83a22e0588c5d25c00881901923a02d7096c71ef5f0cd5b73f92ad974e5174de064b0c5ea8044509039aab14b2aed83735a7c4
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.GoldenEye.exe
Filesize254KB
MD5e3b7d39be5e821b59636d0fe7c2944cc
SHA100479a97e415e9b6a5dfb5d04f5d9244bc8fbe88
SHA256389a7d395492c2da6f8abf5a8a7c49c3482f7844f77fe681808c71e961bcae97
SHA5128f977c60658063051968049245512b6aea68dd89005d0eefde26e4b2757210e9e95aabcef9aee173f57614b52cfbac924d36516b7bc7d3a5cc67daae4dee3ad5
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.GoldenEye.js
Filesize365KB
MD5b569d40e0084c0fb80078fbf808f516f
SHA12d18d4c3f7cb914faea39553ffd8ed7e1cd4151d
SHA256c0adb85d67ffe4663e065b195121a43fadb9c2930c5a0d20a032acd31a64fbc9
SHA512313373938c0b28ea528a6fb8b628f3f80e677db9a839d0dbb082c2c092087c632674f4d5d4d46aea26a48239bb276a8d7d2cfaa14b6c26e16b6cf95813dc0fbb
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.InfinityCrypt.exe
Filesize211KB
MD5b805db8f6a84475ef76b795b0d1ed6ae
SHA17711cb4873e58b7adcf2a2b047b090e78d10c75b
SHA256f5d002bfe80b48386a6c99c41528931b7f5df736cd34094463c3f85dde0180bf
SHA51262a2c329b43d186c4c602c5f63efc8d2657aa956f21184334263e4f6d0204d7c31f86bda6e85e65e3b99b891c1630d805b70997731c174f6081ecc367ccf9416
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Jigsaw.exe
Filesize283KB
MD52773e3dc59472296cb0024ba7715a64e
SHA127d99fbca067f478bb91cdbcb92f13a828b00859
SHA2563ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
SHA5126ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Mischa.exe
Filesize878KB
MD58a241cfcc23dc740e1fadc7f2df3965e
SHA11a5faa5637bec9805039a93d6e199bac26fce413
SHA256d4b6524315d5de727a8af3e4e73e8b28dab27c62fd0a6a7a891460061c2f3d60
SHA512440528b7f92d6703f008124206b9afce3d72efd30cc31b67386fa515f939b72a7eb8afe0b0cb81586680708948afdee021e33e9e5310b59aa3ab2bbdb2128318
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Mischa.v2.exe
Filesize279KB
MD5c8623aaa00f82b941122edef3b1852e3
SHA11785230107633bf908034ef0d5403367765bcafb
SHA256ecc5cc62c8200954079191e586123522f88aa1414ae98908380176d75d2e7eab
SHA5124223cdb0734ba3d9055503b73e1c69a94299c345c19aca52ef85d5eefcb7715756b8ebb92c9c462030d503af47653cd6182e1e14d04cc32309c6200db458b3d6
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.NoMoreRansom.exe
Filesize1.4MB
MD563210f8f1dde6c40a7f3643ccf0ff313
SHA157edd72391d710d71bead504d44389d0462ccec9
SHA2562aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f
SHA51287a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.NotPetya.exe
Filesize366KB
MD5e5cc289b0b2b74b8e02f5a7f07867705
SHA181a884e16a81979c7fe56e61bcfdb94f8bb937ff
SHA2566497eb7e530ccecce0bc9d8a0771221d7e980b7be875b2b3969110eb8b8f2305
SHA5124cd22f953ce44d6d960dbe2bf651ae01fc865ec45742450a24a15c6f6b48b825b7979dbf287bf87f8290344f7bf5bf69d1c1f762f2e81a27d1fe0997712a5d2f
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Petya.A.exe
Filesize225KB
MD5af2379cc4d607a45ac44d62135fb7015
SHA139b6d40906c7f7f080e6befa93324dddadcbd9fa
SHA25626b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739
SHA51269899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.Satana.exe
Filesize49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.WannaCrypt0r.v1.exe
Filesize224KB
MD55c7fb0927db37372da25f270708103a2
SHA1120ed9279d85cbfa56e5b7779ffa7162074f7a29
SHA256be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844
SHA512a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206
-
C:\Users\Admin\Downloads\MalwareCollection-master\MalwareCollection-master\Ransomware\Ransomware.WannaCrypt0r.v2.exe
Filesize3.4MB
MD584c82835a5d21bbcf75a61706d8ab549
SHA15ff465afaabcbf0150d1a3ab2c2e74f3a4426467
SHA256ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
SHA51290723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244
-
Filesize
60KB
MD5347ac3b6b791054de3e5720a7144a977
SHA1413eba3973a15c1a6429d9f170f3e8287f98c21c
SHA256301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c
SHA5129a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787
-
Filesize
401KB
MD51d724f95c61f1055f0d02c2154bbccd3
SHA179116fe99f2b421c52ef64097f0f39b815b20907
SHA256579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648
SHA512f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113