Analysis
-
max time kernel
126s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
19-04-2021 11:39
Static task
static1
Behavioral task
behavioral1
Sample
5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe
Resource
win10v20210408
General
-
Target
5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe
-
Size
70KB
-
MD5
0a6cc2a5fd2701a3d80cca1438c4950d
-
SHA1
260f28d8fde4bccee35b4c5a80568ca431e13435
-
SHA256
5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c
-
SHA512
e70ce320f088aec289b9ae8c5ed539d6f10581544b53a23053746514744f51556c8fcdb193f6c88421b1bc22e5bdfd1270c5048e9fb8da391e5dcc0d2a157152
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1594587808-2047097707-2163810515-1000\HOW TO DECRYPT FILES.txt
btcontact@protonmail.com
Signatures
-
Detected Xorist Ransomware 2 IoCs
Processes:
resource yara_rule \??\c:\users\admin\appdata\local\temp\6f6um0t6ltx1txd.exe family_xorist C:\Users\Admin\AppData\Local\Temp\6f6Um0t6lTX1txd.exe family_xorist -
Xorist Ransomware
Xorist is a ransomware first seen in 2020.
-
Drops file in Drivers directory 3 IoCs
Processes:
5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exedescription ioc process File opened for modification C:\Windows\SysWOW64\drivers\gmreadme.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\drivers\en-US\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\drivers\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe -
Executes dropped EXE 1 IoCs
Processes:
6f6Um0t6lTX1txd.exepid process 2220 6f6Um0t6lTX1txd.exe -
Modifies Installed Components in the registry 2 TTPs
-
Drops startup file 1 IoCs
Processes:
5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Alcmeter = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6f6Um0t6lTX1txd.exe" 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc process File opened (read-only) \??\D: explorer.exe -
Drops file in System32 directory 64 IoCs
Processes:
5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exedescription ioc process File created C:\Windows\System32\DriverStore\FileRepository\cpu.inf_amd64_06bb16552d790e06\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmdyna.inf_amd64_a108fc1c262a2454\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\prnhpcl2.inf_amd64_17ed6c3130d87c50\amd64\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\fr-CA\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\spp\tokens\pkeyconfig\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Schemas\PSMaml\structureGlossary.xsd 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\swenum.inf_amd64_2272ffce58da1b4a\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\wiaca00j.inf_amd64_2b730d5c3b5d1ba1\amd64\MP490\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\c_diskdrive.inf_amd64_cbfc0b9bd9a6879a\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmhaeu.inf_amd64_79e9bf8e86fe4c7a\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmtdkj3.inf_amd64_bfdb69573c743cf6\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\fr-FR\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\wbem\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Schemas\PSMaml\command.xsd 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\iagpio.inf_amd64_8df3c3e4f563fd12\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\prnepcl2.inf_amd64_5940f4dc3bf9366e\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\prnkmcl2.inf_amd64_307402cc1b5656a2\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\remoteposdrv.inf_amd64_1c33e17d642417bb\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\MailContactsCalendarSync\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0019\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\WindowsOptionalFeatureSet\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\c_cdrom.inf_amd64_e9ccc8e280468e6f\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\c_floppydisk.inf_amd64_e5b6484b132a8980\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmbug3.inf_amd64_b70af81d635ecc4b\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmcodex.inf_amd64_3e0e10ef1ed768f3\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\sbp2.inf_amd64_38dd9d28dc203938\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\wiaek002.inf_amd64_f5e1942118a448c2\DeviceModelInfo\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\DiagSvcs\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmgl006.inf_amd64_dcae7410e66d3b79\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\sti.inf_amd64_cabeac16a0ac4ce6\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_RegistryResource\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmdsi.inf_amd64_54d1bf33a7f27449\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmnis3t.inf_amd64_48b4ac6fad1cc2df\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmsuprv.inf_amd64_c2e1b9e4124ec014\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\prnms003.inf_amd64_bb379132d2c203f7\Amd64\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\wiaek002.inf_amd64_f5e1942118a448c2\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\oobe\en-US\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmnokia.inf_amd64_042e77d823507cab\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\prnsacl1.inf_amd64_8adcb7af71f53089\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\sppui\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\AdvancedInstallers\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\ialpss2i_gpio2_skl.inf_amd64_411effdb15e0fbab\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmolic.inf_amd64_88b9ac0a07b44bf8\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\netv1x64.inf_amd64_30040c3eb9d7ade4\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\sdfrd.inf_amd64_eec092acf44d0f6e\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\umbus.inf_amd64_b2036a5d6cbf5691\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\athw8x.inf_amd64_a91a0d9812dd8820\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\sdbus.inf_amd64_f8ffd35506a32c7a\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\Com\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\tpm.inf_amd64_7d5f89afdf3873b2\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\wvmbus.inf_amd64_dc4183ba06fb8ed2\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\et-EE\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_RoleResource\en-US\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\netnvm64.inf_amd64_35bbbe80dec15683\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0010\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\NetAdapter\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Schemas\PSMaml\developerDscResource.xsd 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\Configuration\Schema\MSFT_FileDirectoryConfiguration\en-US\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_WaitForAll\en-US\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Schemas\PSMaml\baseConditional.xsd 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\c_fssystemrecovery.inf_amd64_5988d2ec543a9bf2\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\termkbd.inf_amd64_e9e7dca831869821\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmboca.inf_amd64_9d1fc732e40565e3\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmx5560.inf_amd64_1965e65204acd540\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe -
Drops file in Program Files directory 64 IoCs
Processes:
5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.ibm.icu_52.1.0.v201404241930.jar 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jface.text_3.9.1.v20140827-1810.jar 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.4_1.4.24201.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy.jar 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color32.bmp 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\da-dk\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\VideoLAN\VLC\lua\modules\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\animations\OneNoteFRE_CreateNotes_LTR_Phone.mp4 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\tr-tr\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pt-br\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\localedata.jar 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.XLS 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-black\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sl-si\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\TableTextServiceTigrinya.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-favorites_ja.jar 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\manifest.json 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\nl-nl\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\css\main-selector.css 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-services_ja.jar 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.views_3.7.0.v20140408-0703.jar 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-host.jar 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_splitter\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\210x173\5.jpg 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\AppxMetadata\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.16112.11601.0_neutral_resources.scale-150_8wekyb3d8bbwe\Assets\contrast-white\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\en-ae\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.core.nl_ja_4.4.0.v20140623020002.jar 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\cs-cz\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sv-se\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\VideoLAN\VLC\COPYING.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_x64__8wekyb3d8bbwe\_Resources\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\de-de\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ko-kr\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ca-es\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-settings.jar 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\3.jpg 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\WindowsApps\Microsoft.OneConnect_2.1701.277.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-ma\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\MainPageState2\statistics_bp_920.jpg 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ru-ru\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\Diagnostics\Simple\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\HowToPlay\FreeCell\Control_1.jpg 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\SplashScreen\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\daily_challenge.jpg 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-explorer_ja.jar 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-keyring-fallback_ja.jar 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\tr-tr\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-gb\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.launcher_1.3.0.v20140415-2008.jar 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\Common Files\microsoft shared\ink\da-DK\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.swt.win32.win32.x86_64.nl_zh_4.4.0.v20140623020002.jar 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe -
Drops file in Windows directory 64 IoCs
Processes:
5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exedescription ioc process File created C:\Windows\SystemApps\DesktopLearning_cw5n1h2txyewy\images\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-oleaccrc.resources_31bf3856ad364e35_10.0.15063.0_en-us_1bc144a563b9bf4e\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-i..-optional.resources_31bf3856ad364e35_11.0.15063.0_en-us_e1bcf034bd7c61f5\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework-SystemXml\v4.0_4.0.0.0__b77a5c561934e089\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-webdavbinaries_31bf3856ad364e35_10.0.15063.0_none_7b654c81690459a4\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\msil_multipoint-wms.mms.diagnostics_31bf3856ad364e35_10.0.15063.0_none_465f72554944aed0\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ie-f12script2_31bf3856ad364e35_11.0.15063.0_none_300c66afb76332e8\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-irdafiletransfer_31bf3856ad364e35_10.0.15063.0_none_708731a4206656f9\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File opened for modification C:\Windows\schemas\EAPHost\eapuserpropertiesv1.xsd 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_dual_c_fsantivirus.inf_31bf3856ad364e35_10.0.15063.0_none_e8997f32664ba88e\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-containerdiagnosticstool_31bf3856ad364e35_10.0.15063.0_none_9874e9a3703899ed\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devices-wifi_31bf3856ad364e35_10.0.15063.0_none_fcdb0ddbd3dacf9d\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-f..ger-utils.resources_31bf3856ad364e35_10.0.15063.0_en-us_e3766ab3e571570b\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\x86_netfx4-aspnet_wp_exe_b03f5f7f11d50a3a_4.0.14917.0_none_6ef9dbc567e8360c\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-f..temutilitylibraries_31bf3856ad364e35_10.0.15063.0_none_faaa3111287c1300\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack-onecore_31bf3856ad364e35_10.0.15063.0_none_4f64cf93581c5162\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-skype-ortc_31bf3856ad364e35_10.0.15063.0_none_fb0aed588774ff7d\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..otcli-dll.resources_31bf3856ad364e35_10.0.15063.0_en-us_ee3082d6e78b6f38\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..y-webauth.resources_31bf3856ad364e35_10.0.15063.0_en-us_bb631878daed8552\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-i..l-keyboard-00010480_31bf3856ad364e35_10.0.15063.0_none_a556ae71c4421aa7\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-p..nfiguration-cmdline_31bf3856ad364e35_10.0.15063.0_none_24c43bc2edee9fcb\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\InfusedApps\Packages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_dual_battery.inf_31bf3856ad364e35_10.0.15063.0_none_30b8cefdf6f914e9\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-flvprophandler_31bf3856ad364e35_10.0.15063.0_none_b7594ab1b689f885\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft.configci.commands_31bf3856ad364e35_10.0.15063.0_none_be0b42ca1bba41a3\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\x86_netfx-installutillib_dll_b03f5f7f11d50a3a_10.0.15063.0_none_7006fa2774e78859\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..phony-phonedatasync_31bf3856ad364e35_10.0.15063.0_none_788c8e1c08d94e1e\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\msil_microsoft.build.engine_b03f5f7f11d50a3a_10.0.15063.0_none_f1f19e49aae6169d\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\msil_microsoft.isam.esent.interop.wsa_31bf3856ad364e35_10.0.15063.0_none_78deb95284e31307\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\BitLockerDiscoveryVolumeContents\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\InfusedApps\Applications\Microsoft.OneConnect_2.1701.277.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-speechrecognizer-en-us_31bf3856ad364e35_10.0.15063.0_none_c822a30e253b6625\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\x86_microsoft-windows-icm-ui.resources_31bf3856ad364e35_10.0.15063.0_en-us_f1879cdc2221d069\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\rescache\_merged\3318594788\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..directplay8-payload_31bf3856ad364e35_10.0.15063.0_none_1493c1a0fcb41dc8\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..t-service.resources_31bf3856ad364e35_10.0.15063.0_en-us_69584659eb5205c4\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-lsa_31bf3856ad364e35_10.0.15063.0_none_c1b30e4dc9fab399\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\InfusedApps\Packages\Microsoft.WindowsCamera_2017.125.40.0_x64__8wekyb3d8bbwe\AppxMetadata\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..ng-client.resources_31bf3856ad364e35_10.0.15063.0_en-us_c0866c79cad2c149\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\msil_system.identitymodel_b77a5c561934e089_10.0.15063.0_none_d6ab010de073bee9\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_windows-id-connecte..r-wlidsvc.resources_31bf3856ad364e35_10.0.15063.0_en-us_a9de489d27dbe324\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\Wizard\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SystemApps\ContactSupport_cw5n1h2txyewy\Styles\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..devicescontrolpanel_31bf3856ad364e35_10.0.15063.0_none_35b3a50d81f066f6\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\speech\1009\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft.windows.h..display-driverclass_31bf3856ad364e35_10.0.15063.0_none_54a49003c924e820\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-userinit_31bf3856ad364e35_10.0.15063.0_none_ed3c934f0a7eb173\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft.windows.h..changer-driverclass_31bf3856ad364e35_10.0.15063.0_none_d9b94453ff88f501\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-rascmak_31bf3856ad364e35_10.0.15063.0_none_2bf4e41ce5e45a59\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\wow64_netfx-dfshim_dll_31bf3856ad364e35_10.0.15063.0_none_93e879fbca296650\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\x86_microsoft-windows-m..ac-sql-cliconfg-rll_31bf3856ad364e35_10.0.15063.0_none_1f7356c9dac90736\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c...appxmain.resources_31bf3856ad364e35_10.0.15063.0_ko-kr_af2122c29fd76136\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..tional-codepage-437_31bf3856ad364e35_10.0.15063.0_none_e024b59cd3e26ad0\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-shell32-kf-commonmusic_31bf3856ad364e35_10.0.15063.0_none_8a2a70806d4ff602\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\x86_microsoft-windows-s..-binaries.resources_31bf3856ad364e35_10.0.15063.0_cs-cz_c6c967d70130c59e\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\x86_netfx4-legacy_web_mediumtrust_config_b03f5f7f11d50a3a_4.0.15552.17062_none_b353f2fe03611023\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-tabletpc-inputpanel_31bf3856ad364e35_10.0.15063.0_none_2cf79951e4b1c881\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mdmregistration2_31bf3856ad364e35_10.0.15063.0_none_32d4c72216bf73c7\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-wwanhc_31bf3856ad364e35_10.0.15063.0_none_82bdd3073fdd90dc\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_netfx4-msbuild_rsp_b03f5f7f11d50a3a_4.0.15552.17062_none_729ecf42ae824bc2\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..l-keyboard-00020418_31bf3856ad364e35_10.0.15063.0_none_41ad21108029e6b6\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-lua-filevirtualization_31bf3856ad364e35_10.0.15063.0_none_78f4fe0cdd696494\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-i..-wow64-setupdll0007_31bf3856ad364e35_10.0.15063.0_none_ff0bdb04e93192c4\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-e..yphenation.binaries_31bf3856ad364e35_10.0.15063.0_none_67ca418bd10aa86b\HOW TO DECRYPT FILES.txt 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3544 3020 WerFault.exe 3104 2760 WerFault.exe explorer.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities explorer.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
SearchUI.exeSearchUI.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe -
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" explorer.exe -
Modifies registry class 64 IoCs
Processes:
explorer.exeSearchUI.exeexplorer.exe5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "132623575947209929" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "23" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\FFlags = "1092616209" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "56" SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OGPGKRTRABCQPJW\shell\open 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OGPGKRTRABCQPJW\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6f6Um0t6lTX1txd.exe" 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668} explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Mode = "6" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\IconSize = "48" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana SearchUI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OGPGKRTRABCQPJW\DefaultIcon 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\LogicalViewMode = "2" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByDirection = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000100000000000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 = 3a002e803accbfb42cdb4c42b0297fe99a87c641260001002600efbe11000000f4ecfc87702cd701011c968a702cd701b2928c8a702cd70114000000 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.btCry_zip 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OGPGKRTRABCQPJW\ = "CRYPTED!" 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OGPGKRTRABCQPJW\shell 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "23" SearchUI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.btCry_zip\ = "OGPGKRTRABCQPJW" 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Sort = 0000000000000000000000000000000002000000f4eec83032a8e241ab32e3c3ca28fd29030000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OGPGKRTRABCQPJW\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6f6Um0t6lTX1txd.exe,0" 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OGPGKRTRABCQPJW\shell\open\command 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.cortana SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OGPGKRTRABCQPJW 5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByKey:FMTID = "{30C8EEF4-A832-41E2-AB32-E3C3CA28FD29}" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f80cb859f6720028040b29b5540cc05aab60000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\NodeSlot = "2" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\NodeSlot = "3" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\FFlags = "1092616193" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
explorer.exepid process 3632 explorer.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
WerFault.exeWerFault.exepid process 3544 WerFault.exe 3544 WerFault.exe 3544 WerFault.exe 3544 WerFault.exe 3544 WerFault.exe 3544 WerFault.exe 3544 WerFault.exe 3544 WerFault.exe 3544 WerFault.exe 3544 WerFault.exe 3544 WerFault.exe 3544 WerFault.exe 3544 WerFault.exe 3544 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 3632 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WerFault.exeexplorer.exeWerFault.exeexplorer.exedescription pid process Token: SeDebugPrivilege 3544 WerFault.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeCreatePagefilePrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeCreatePagefilePrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeCreatePagefilePrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeCreatePagefilePrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeCreatePagefilePrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeCreatePagefilePrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeCreatePagefilePrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeCreatePagefilePrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeCreatePagefilePrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeCreatePagefilePrivilege 2760 explorer.exe Token: SeDebugPrivilege 3104 WerFault.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe Token: SeShutdownPrivilege 3632 explorer.exe Token: SeCreatePagefilePrivilege 3632 explorer.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
explorer.exeexplorer.exepid process 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
explorer.exeexplorer.exepid process 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
ShellExperienceHost.exeSearchUI.exeSearchUI.exeShellExperienceHost.exeexplorer.exepid process 780 ShellExperienceHost.exe 3732 SearchUI.exe 780 ShellExperienceHost.exe 3524 SearchUI.exe 3388 ShellExperienceHost.exe 3388 ShellExperienceHost.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe 3632 explorer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
explorer.exedescription pid process target process PID 3632 wrote to memory of 732 3632 explorer.exe NOTEPAD.EXE PID 3632 wrote to memory of 732 3632 explorer.exe NOTEPAD.EXE PID 3632 wrote to memory of 2220 3632 explorer.exe 6f6Um0t6lTX1txd.exe PID 3632 wrote to memory of 2220 3632 explorer.exe 6f6Um0t6lTX1txd.exe PID 3632 wrote to memory of 2220 3632 explorer.exe 6f6Um0t6lTX1txd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe"C:\Users\Admin\AppData\Local\Temp\5acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c.exe"1⤵
- Drops file in Drivers directory
- Drops startup file
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3020 -s 74161⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2760 -s 41722⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\HOW TO DECRYPT FILES.txt2⤵
-
C:\Users\Admin\AppData\Local\Temp\6f6Um0t6lTX1txd.exe"C:\Users\Admin\AppData\Local\Temp\6f6Um0t6lTX1txd.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Caches\cversions.2.dbMD5
19925a6583093334fd73fd22a6c258d8
SHA1536c492cdf58e3d66653781f3bf3e0c0285ba783
SHA256a6e3d7696a31918deeb55dd86932f06fa8a90dd1bca6c945fb79f78a31b59a6e
SHA512346420bdbaee6073077294b046c8dd880c3e8b72579ec7d07dfd67c1f18157ad36fb83bae74094d48995849b5a5eb53ec82cfdc9440c2e092094f239a9087a39
-
C:\ProgramData\Microsoft\Windows\Caches\{6AF0698E-D558-4F6E-9B3C-3716689AF493}.2.ver0x0000000000000001.dbMD5
d640c7c9780ef19f3042bbc3c4abf3a8
SHA123aae1a0b9ff7f1e5c31812e1b38645584d6b3aa
SHA256194c8420b3788da8f6f90c3265696fe746f2246735b7848800b53d098eeac225
SHA51202ba30a071ff7ac0d155f9e48528e3df57edeff5c2e92f0a533c13687e2ae101cc8e19da7088556d8950e7db981f63a630b8b3fc124df26403c552a481e9d900
-
C:\ProgramData\Microsoft\Windows\Caches\{6AF0698E-D558-4F6E-9B3C-3716689AF493}.2.ver0x0000000000000001.db.btCry_zipMD5
b49339d686de442f8a300e8c5e1833a8
SHA124f53b3073b266fdd8adb91e4f79f3025fab98e8
SHA256f3e3db5624988feb2bf625a633c18632abf4dcfd914b7b96bc444a4a40ef0ddf
SHA512b33b6226be96bafe6504f90be9e244b787c6d07d62a2b9465f60bca415929c13891df984dae3f2d6d33cdf138891afe7570917d75feed03173b112696d160021
-
C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.btCry_zipMD5
a0d1086b50b66907c76ecabd78b4624d
SHA141d648ca84595e078baf0ae6be813d97a797036b
SHA2568d3e1c3600847d84691c0f00ccda506924feedebb02bac9a2e06d5e422b4b26d
SHA5128ebe71d1742693f477dea70bc2afec6938f836596f7277f40e85a6ebb24d42ce2705958784ea7e95513c81570595cc5a081d22ef8345d5356582a8de0edb5b31
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Caches\{03BA58C4-B905-4D30-88C9-B63C603DA134}.3.ver0x0000000000000001.db.btCry_zipMD5
e6df94332cb28939e1f082207ba02649
SHA1b6a32f4f38a88934a3659cc6b803f3820883e61f
SHA25650eb18710589ef3449c8fbe0bfc337390b833c2a4a3eaceab8acaa12637d3405
SHA512e6d293ae12a0e14bcc1142eca1eb6788e4635cf6d39145d2f627fc7f7ce3672a03d584f68bd3c4fad142ac5626f9180315b175c0c5b7fab13b3eee980f6e9dd9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000001d.db.btCry_zipMD5
fcf1b9d9bd1d92ccfc0ec4dc8ff216a2
SHA1f20c577e73c5da651982b5b1d7b44d00c89be21d
SHA2568786917cb52e1892d0fcd1474b542948f5d2abfd4e944994e428c506065ae43f
SHA5127ddbfeb844e7396ac21a2c5ea389bdb4d4359900fdba122251351b86f6d6617f18f3a3bc542dbb48d511050cc0ce0bcc5e2bf6cf181fcd2c37867751df7b2055
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_16.dbMD5
12f7b7dc9907300d761e88b3ad48c86c
SHA129bafa813ccb606a33fd4a8d2b3f3b6ac2abe43d
SHA256e3ef4f1374f7925f6d5f8a72f5d99a7fbd319e92370ce6d8865231104c257dbd
SHA5120f9f3c2acb4ebbe6cbcd6694c8f6f04588aa0c7faadc2b86ad9d49307bfd71205073ac42609aab0fe3c4a4042cc2b41d4ca7d15870737f107bcfda6f08e2d2b7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_256.dbMD5
e0b4b6cd8300a2a528869a1eaee4ef18
SHA121c2d348732c5d2b3c170cbb9ea16dd921b5b529
SHA256fa0a32639b38bda273e8e0c48880255d0df984b82de69186781e8a4384f10553
SHA512ab3276615424cd83e614909342c98cf12359946506c06c63778da4eadc9044735098cae09c8b27c453da755b18b13483795f25ea36d490282e9a2bdba6b48b62
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_48.dbMD5
ae6fbded57f9f7d048b95468ddee47ca
SHA1c4473ea845be2fb5d28a61efd72f19d74d5fc82e
SHA256d3c9d1ff7b54b653c6a1125cac49f52070338a2dd271817bba8853e99c0f33a9
SHA512f119d5ad9162f0f5d376e03a9ea15e30658780e18dd86e81812dda8ddf59addd1daa0706b2f5486df8f17429c2c60aa05d4f041a2082fd2ec6ea8cc9469fade3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.dbMD5
580c0e3985d0c9f5774ab8ec15513321
SHA1f9e5850a58d0b15eb5d8b983d357bdd06e21f2fa
SHA256e7c96072622637716ae2bc83edcadd0f04609f393605bc512f0d2dae52430452
SHA5127bf110ed4592e8d30f81e58a9557894630e994758e3b09a98f3843b7722de603fe7d4040122a2bdd637854085871946932f29f8b95ed3928118d90c74b03fbe6
-
C:\Users\Admin\AppData\Local\Temp\6f6Um0t6lTX1txd.exeMD5
0a6cc2a5fd2701a3d80cca1438c4950d
SHA1260f28d8fde4bccee35b4c5a80568ca431e13435
SHA2565acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c
SHA512e70ce320f088aec289b9ae8c5ed539d6f10581544b53a23053746514744f51556c8fcdb193f6c88421b1bc22e5bdfd1270c5048e9fb8da391e5dcc0d2a157152
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.jpg.btCry_zipMD5
65845a4fb81f635208b9ffce737db63f
SHA109b93c92823b26eddd559c6e5e5e0a263b3bfce9
SHA25657ffe97f4caa710f7fc3525dece4d1c452bcf8d6fb1ae826ab6f3864a5693ee1
SHA51240c26799cec6a9f72000558d0a8e1777edf83f26e6c44cfadb5c4562d9d1f26756030122bacefeff2208178cb2a818cdba15d5ea0cdea7857d3846060280aa3e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\HOW TO DECRYPT FILES.txtMD5
9cc0c76ca19b1a4e97de6fabc092b1ac
SHA18370d3eeb719c63044b5809139ffbd983bcb2465
SHA25669bdf98042a2f33105977111ddfd707bdca5c445ce9c5421112829c098a50fe3
SHA5120b6ca3779a28287ef1cc6e760103fd5fc3d631e975125cc6d12cdaa895f9781a7b643441cfc829f38f66f179e6a3098cd1df7ae4ee3422502373bc45506711ae
-
C:\Users\Admin\Desktop\HOW TO DECRYPT FILES.txtMD5
9cc0c76ca19b1a4e97de6fabc092b1ac
SHA18370d3eeb719c63044b5809139ffbd983bcb2465
SHA25669bdf98042a2f33105977111ddfd707bdca5c445ce9c5421112829c098a50fe3
SHA5120b6ca3779a28287ef1cc6e760103fd5fc3d631e975125cc6d12cdaa895f9781a7b643441cfc829f38f66f179e6a3098cd1df7ae4ee3422502373bc45506711ae
-
C:\Users\Admin\Desktop\RestartTest.xls.btCry_zipMD5
3d66d7885a7f7c071852af211c2e62ed
SHA18e5447fb1ea731815aaf61155817f5a6090e2bb5
SHA256ee12d407ba2046f30eb973996ee4f18353cccfc7273278d2b05208927eb95c0f
SHA51289733c1c29e5ce1137ed9f19a4dc4868af7d9dea2e5ed6c46ec519586a98387cf6fcd3e3502f9ff01270f24ed43d41902b2b7af22db8c57df16d5a421dbb39f2
-
\??\c:\users\admin\appdata\local\temp\6f6um0t6ltx1txd.exeMD5
0a6cc2a5fd2701a3d80cca1438c4950d
SHA1260f28d8fde4bccee35b4c5a80568ca431e13435
SHA2565acebee8f450c294dcaad9165a1e3dd27ff027e99cca65564546e6ea2818b91c
SHA512e70ce320f088aec289b9ae8c5ed539d6f10581544b53a23053746514744f51556c8fcdb193f6c88421b1bc22e5bdfd1270c5048e9fb8da391e5dcc0d2a157152
-
memory/732-129-0x0000000000000000-mapping.dmp
-
memory/2220-131-0x0000000000000000-mapping.dmp
-
memory/3632-123-0x00000000025A0000-0x00000000025A1000-memory.dmpFilesize
4KB