Malware Analysis Report

2024-10-19 10:39

Sample ID 221125-z1mqqsab81
Target c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4
SHA256 c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4
Tags
xorist persistence ransomware spyware stealer evasion
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4

Threat Level: Known bad

The file c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4 was found to be: Known bad.

Malicious Activity Summary

xorist persistence ransomware spyware stealer evasion

Detected Xorist Ransomware

Xorist Ransomware

Modifies firewall policy service

Xorist family

Drops file in Drivers directory

Reads user/profile data of web browsers

Drops startup file

Adds Run key to start application

Drops file in System32 directory

Drops file in Windows directory

Drops file in Program Files directory

Modifies registry class

Suspicious use of WriteProcessMemory

Suspicious behavior: MapViewOfSection

Enumerates system info in registry

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-11-25 21:11

Signatures

Detected Xorist Ransomware

Description Indicator Process Target
N/A N/A N/A N/A

Xorist family

xorist

Analysis: behavioral1

Detonation Overview

Submitted

2022-11-25 21:11

Reported

2022-11-26 06:52

Platform

win7-20220812-en

Max time kernel

151s

Max time network

42s

Command Line

C:\Windows\system32\lsass.exe

Signatures

Detected Xorist Ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Xorist Ransomware

ransomware xorist

Drops file in Drivers directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\drivers\es-ES\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\drivers\fr-FR\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\drivers\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\drivers\gmreadme.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\drivers\it-IT\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\drivers\ja-JP\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\drivers\de-DE\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\drivers\en-US\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Alcmeter = "C:\\Users\\Admin\\AppData\\Local\\Temp\\w8i9eHkHOwWwQlX.exe" C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\System32\DriverStore\FileRepository\cxfalcon_ibv64.inf_amd64_neutral_d065aec3fcf4ec4e\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\prnca00z.inf_amd64_neutral_27f402ce616c3ebc\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\prnky004.inf_amd64_neutral_5db759db19acd3ae\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\wd.inf_amd64_neutral_759109899b486d47\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\fr-FR\about_Session_Configurations.help.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\hpsamd.inf_amd64_neutral_84ae149ecc9f8033\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\wiabr008.inf_amd64_neutral_27d1c9a28eac4eed\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\es-ES\Licenses\eval\EnterpriseE\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\InstallShield\setupdir\0003\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\de-DE\about_data_sections.help.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_WS-Management_Cmdlets.help.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_If.help.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\prnsv002.inf_amd64_neutral_6ca80563d6148ee5\Amd64\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\fr-FR\Licenses\eval\EnterpriseE\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\InstallShield\setupdir\001f\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\ja-JP\Licenses\_Default\Ultimate\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\migwiz\dlmanifests\Microsoft-Windows-IasServer-MigPlugin\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\slmgr\0C0A\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitsTransfer\ja-JP\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\System32\catroot2\dberr.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\mdmaiwa5.inf_amd64_neutral_ea8128ac5da37eb9\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\prnhp005.inf_amd64_neutral_914d6c300207814f\Amd64\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\Speech\Engines\SR\fr-FR\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\de-DE\about_command_precedence.help.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\en-US\about_remote_output.help.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\prnca00a.inf_amd64_neutral_d64d696193e69d7b\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\es-ES\about_Quoting_Rules.help.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\it-IT\about_type_operators.help.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\ja-JP\about_Assignment_Operators.help.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\de-DE\Licenses\OEM\HomePremiumE\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\prnrc004.inf_amd64_neutral_bbd3435eeaf576ee\Amd64\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\ja-JP\Licenses\eval\HomePremium\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\migwiz\PostMigRes\Web\base_images\System.gif C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\prnts003.inf_amd64_neutral_33a68664c7e7ae4b\Amd64\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\es-ES\Licenses\_Default\HomePremiumN\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\de-DE\Licenses\eval\Professional\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\prnep002.inf_amd64_neutral_efc4a7485b172c07\Amd64\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\prnlx00b.inf_amd64_neutral_89b555703683b583\Amd64\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\fr-FR\about_Core_Commands.help.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\atiilhag.inf_amd64_neutral_0a660e899f5038a2\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\mdmags64.inf_amd64_neutral_e68956e24e287714\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\mdmtdkj3.inf_amd64_neutral_7e1053ab483310f6\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\fr-FR\erofflps.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\de-DE\about_types.ps1xml.help.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\es-ES\about_For.help.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\es-ES\about_hash_tables.help.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\XPSViewer\fr-FR\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\prnlx008.inf_amd64_neutral_75545721835fd863\Amd64\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\migwiz\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\acpi.inf_amd64_neutral_aed2e7a487803437\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\mdmpin.inf_amd64_neutral_2415474b9db0a888\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\netr7364.inf_amd64_neutral_68988e550e69a417\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\it-IT\Licenses\_Default\StarterN\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\mdmaiwat.inf_amd64_neutral_213e93b5ced8b0fe\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\SysWOW64\Speech\SpeechUX\fr-FR\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\mdminfot.inf_amd64_neutral_fc6bcd80e9e6a3c3\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\wiaxx002.inf_amd64_neutral_fbe080a7dd77c4a3\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\prnep00b.inf_amd64_neutral_2e6b718b2b177506\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\de-DE\about_prompts.help.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\mdmdp2.inf_amd64_neutral_ab710894455d7b9a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\mdmisdn.inf_amd64_neutral_061c61abd3904560\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\prnhp003.inf_amd64_neutral_4480210763997eb4\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\wdmvsc.inf_amd64_neutral_a2cf745000e2ea92\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_hail.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14830_.GIF C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\system_dot.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\TextFile.zip C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_dot.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\icon.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Internet Explorer\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Windows Media Player\it-IT\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_single_orange.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\pause_down.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00038_.GIF C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382931.JPG C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143744.GIF C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\dial.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_double_bkg.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_right_rest.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21519_.GIF C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\CALENDAR.GIF C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Microsoft Games\Mahjong\en-US\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR4B.GIF C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waxing-crescent.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\ro.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_m.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_sun.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_s.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\es.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Connectivity.gif C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Common Files\System\es-ES\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\es-ES\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14529_.GIF C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\tile_bezel.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\Atlantic\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\search_background.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\combo-hover-middle.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground_PAL.wmv C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Windows Mail\de-DE\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\eu.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\1033\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\PREVIEW.GIF C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_FormsHomePage.gif C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR43B.GIF C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00158_.GIF C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationRight_SelectionSubpicture.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\2.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\item_hover_flyout.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0177257.JPG C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\THMBNAIL.PNG C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01046J.JPG C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Media\Quirky\Windows Pop-up Blocked.wav C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallSqlState.sql C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_mdmnttp2.inf_31bf3856ad364e35_6.1.7600.16385_none_30292759e684c77e\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-b..g-base-professional_31bf3856ad364e35_6.1.7600.16385_none_5033cc0ab905012a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-bootconfig.resources_31bf3856ad364e35_6.1.7600.16385_es-es_20a4a7ffdd575f27\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\Microsoft.NET\Framework\v3.0\WPF\it\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_disk.inf.resources_31bf3856ad364e35_6.1.7600.16385_en-us_626b9448fd63c9a1\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_hal.inf.resources_31bf3856ad364e35_6.1.7600.16385_en-us_997f9822c7490adb\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_mdmmts.inf_31bf3856ad364e35_6.1.7600.16385_none_bee826439264ce7c\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_mdmvv.inf.resources_31bf3856ad364e35_6.1.7600.16385_de-de_464a03410f3981f7\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-a..e-results.resources_31bf3856ad364e35_6.1.7600.16385_it-it_4a47802690327476\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-crypt32-dll.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_58ec176c913d7aa6\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-d..g-cmdline.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_b1f3571064438086\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\System.Web.Abstractions.resources\3.5.0.0_de_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.IdentityModel\0a637affd530a4ee90f0ed36c3febc79\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_mdmbr008.inf_31bf3856ad364e35_6.1.7600.16385_none_c32ad6c89eb402fe\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-f..ruetype-segoescript_31bf3856ad364e35_6.1.7601.17514_none_32eade0d03ae2a68\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_dot4prt.inf.resources_31bf3856ad364e35_6.1.7600.16385_en-us_e4de75d2183603a9\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_iirsp.inf.resources_31bf3856ad364e35_6.1.7600.16385_en-us_a258cf424b77be5b\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-efs-service.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_d7a848d023c8969c\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\inf\ASP.NET_4.0.30319\0019\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-com-complus.res_31bf3856ad364e35_6.1.7600.16385_none_88a5cc7effe2dfca\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-commonlog.resources_31bf3856ad364e35_6.1.7600.16385_en-us_6e4dacd214324325\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.VisualC\74de34cd518bf49352c8346149ddfbc1\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.AddI3d71a354#\e9b555ea0ea297aaf786f05eefd6e5a9\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\inf\ASP.NET\0816\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-a..mecontrol.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_67fd31de7795e748\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_6.1.7600.16385_fi-fi_79b34814f7ded8e5\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-eventviewer.resources_31bf3856ad364e35_6.1.7600.16385_it-it_0d45c6504da51061\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-d..ctshow-dv.resources_31bf3856ad364e35_6.1.7600.16385_en-us_743a98caca6a17eb\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-d..w-capture.resources_31bf3856ad364e35_6.1.7600.16385_es-es_d36fce677b431996\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-d2d_31bf3856ad364e35_6.1.7601.17514_none_05c2ec3372908373\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\Media\Festival\Windows Ding.wav C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-anytime-upgrade_31bf3856ad364e35_6.1.7600.16385_none_fb591b6cf023ade3\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-console.resources_31bf3856ad364e35_6.1.7600.16385_it-it_66c13d41262bb2b4\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\9469491f37d9c35b596968b206615309\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_battery.inf.resources_31bf3856ad364e35_6.1.7601.17514_ja-jp_f1e80a5c0dda0243\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_megasr.inf.resources_31bf3856ad364e35_6.1.7600.16385_de-de_c1ae6009ec8c7566\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\inf\.NET CLR Networking 4.0.0.0\0416\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_mdmhayes.inf_31bf3856ad364e35_6.1.7600.16385_none_4afb2ef6408c5ee8\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_megasas.inf.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_6a9f7adfa0d9a71a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-bootconfig.resources_31bf3856ad364e35_6.1.7600.16385_en-us_20d94b1bdd306d82\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-c..helibrary.resources_31bf3856ad364e35_6.1.7600.16385_it-it_8ca0350f2122a9d3\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-comctl32-v5.resources_31bf3856ad364e35_6.1.7600.16385_sv-se_a3dab79bf7c211cf\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-dui70_31bf3856ad364e35_6.1.7600.16385_none_b3a9a17817cbcd9e\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\System.DirectoryServices.AccountManagement\3.5.0.0__b77a5c561934e089\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\AppConfig\App_LocalResources\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\Microsoft.NET\Framework\v3.5\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-fde.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_8cff405e05768c66\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_mdmbtmdm.inf_31bf3856ad364e35_6.1.7600.16385_none_4998bfc1a50ffd5a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-commonlog.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_10d07fb5072b4b2c\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-b..trics-adm.resources_31bf3856ad364e35_6.1.7600.16385_it-it_11b1a08795dae83f\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-directwrite.resources_31bf3856ad364e35_7.1.7601.16492_hu-hu_cab3b172475e654c\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-ehome-ehkorime_31bf3856ad364e35_6.1.7600.16385_none_4ad84a579cb593ce\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-f..lications.resources_31bf3856ad364e35_6.1.7600.16385_de-de_c75de581a6dbdfaa\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-f..temcompareutilities_31bf3856ad364e35_6.1.7600.16385_none_5cbb962a4f0d58c1\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\Media\Sonata\Windows Information Bar.wav C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_mdmhayes.inf.resources_31bf3856ad364e35_6.1.7600.16385_es-es_02979a084b1788b5\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-a..assistant.resources_31bf3856ad364e35_6.1.7600.16385_de-de_bcd3cafd91383411\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-b..fessional.resources_31bf3856ad364e35_6.1.7601.17514_en-us_090436357cf6c2b9\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_98b24799b5d08c05\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\winsxs\amd64_microsoft-windows-display.resources_31bf3856ad364e35_6.1.7600.16385_en-us_f76d5676e7d5a264\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.DynamicData\v4.0_4.0.0.0__31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Workflow Foundation\SQL\ja\SqlPersistenceService_Logic.sql C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\ = "CRYPTED!" C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\DefaultIcon C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\w8i9eHkHOwWwQlX.exe,0" C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\shell\open\command C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\shell\open C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\w8i9eHkHOwWwQlX.exe" C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CryptoTorLocker2015! C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.CryptoTorLocker2015!\ = "PRPASCBHJSZLMOM" C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\shell C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 784 wrote to memory of 368 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\wininit.exe
PID 784 wrote to memory of 368 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\wininit.exe
PID 784 wrote to memory of 368 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\wininit.exe
PID 784 wrote to memory of 368 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\wininit.exe
PID 784 wrote to memory of 368 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\wininit.exe
PID 784 wrote to memory of 368 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\wininit.exe
PID 784 wrote to memory of 368 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\wininit.exe
PID 784 wrote to memory of 376 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\csrss.exe
PID 784 wrote to memory of 376 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\csrss.exe
PID 784 wrote to memory of 376 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\csrss.exe
PID 784 wrote to memory of 376 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\csrss.exe
PID 784 wrote to memory of 376 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\csrss.exe
PID 784 wrote to memory of 376 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\csrss.exe
PID 784 wrote to memory of 376 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\csrss.exe
PID 784 wrote to memory of 416 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\winlogon.exe
PID 784 wrote to memory of 416 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\winlogon.exe
PID 784 wrote to memory of 416 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\winlogon.exe
PID 784 wrote to memory of 416 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\winlogon.exe
PID 784 wrote to memory of 416 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\winlogon.exe
PID 784 wrote to memory of 416 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\winlogon.exe
PID 784 wrote to memory of 416 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\winlogon.exe
PID 784 wrote to memory of 460 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\services.exe
PID 784 wrote to memory of 460 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\services.exe
PID 784 wrote to memory of 460 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\services.exe
PID 784 wrote to memory of 460 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\services.exe
PID 784 wrote to memory of 460 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\services.exe
PID 784 wrote to memory of 460 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\services.exe
PID 784 wrote to memory of 460 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\services.exe
PID 784 wrote to memory of 476 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsass.exe
PID 784 wrote to memory of 476 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsass.exe
PID 784 wrote to memory of 476 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsass.exe
PID 784 wrote to memory of 476 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsass.exe
PID 784 wrote to memory of 476 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsass.exe
PID 784 wrote to memory of 476 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsass.exe
PID 784 wrote to memory of 476 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsass.exe
PID 784 wrote to memory of 484 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsm.exe
PID 784 wrote to memory of 484 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsm.exe
PID 784 wrote to memory of 484 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsm.exe
PID 784 wrote to memory of 484 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsm.exe
PID 784 wrote to memory of 484 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsm.exe
PID 784 wrote to memory of 484 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsm.exe
PID 784 wrote to memory of 484 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsm.exe
PID 784 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 784 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 784 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 784 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 784 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 784 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 784 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 784 wrote to memory of 664 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 784 wrote to memory of 664 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 784 wrote to memory of 664 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 784 wrote to memory of 664 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 784 wrote to memory of 664 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 784 wrote to memory of 664 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 784 wrote to memory of 664 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 784 wrote to memory of 748 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\System32\svchost.exe
PID 784 wrote to memory of 748 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\System32\svchost.exe
PID 784 wrote to memory of 748 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\System32\svchost.exe
PID 784 wrote to memory of 748 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\System32\svchost.exe
PID 784 wrote to memory of 748 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\System32\svchost.exe
PID 784 wrote to memory of 748 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\System32\svchost.exe
PID 784 wrote to memory of 748 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\System32\svchost.exe
PID 784 wrote to memory of 796 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\System32\svchost.exe

Processes

C:\Windows\system32\lsass.exe

C:\Windows\system32\lsass.exe

C:\Windows\system32\services.exe

C:\Windows\system32\services.exe

C:\Windows\system32\winlogon.exe

winlogon.exe

C:\Windows\system32\csrss.exe

%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16

C:\Windows\system32\wininit.exe

wininit.exe

C:\Windows\system32\lsm.exe

C:\Windows\system32\lsm.exe

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k NetworkService

C:\Windows\system32\taskhost.exe

"taskhost.exe"

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation

C:\Windows\system32\sppsvc.exe

C:\Windows\system32\sppsvc.exe

C:\Windows\system32\Dwm.exe

"C:\Windows\system32\Dwm.exe"

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork

C:\Windows\System32\spoolsv.exe

C:\Windows\System32\spoolsv.exe

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k RPCSS

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k DcomLaunch

C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe

"C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe"

Network

N/A

Files

memory/784-54-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

memory/784-55-0x0000000000400000-0x0000000000560000-memory.dmp

memory/784-56-0x0000000000400000-0x0000000000560000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-11-25 21:11

Reported

2022-11-26 06:53

Platform

win10v2004-20220812-en

Max time kernel

130s

Max time network

165s

Command Line

C:\Windows\system32\lsass.exe

Signatures

Detected Xorist Ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies firewall policy service

evasion
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe:*:enabled:@shell32.dll,-1" C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Xorist Ransomware

ransomware xorist

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\DRIVERS\ETC\HOSTS C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Alcmeter = "C:\\Users\\Admin\\AppData\\Local\\Temp\\w8i9eHkHOwWwQlX.exe" C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\THIRDPARTYLICENSEREADME-JAVAFX.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\Weather_LogoSmall.scale-100.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-20_altform-lightunplated.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\tr-tr\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-ae\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\nb-no\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNotePageLargeTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\Assets\GameBar_LargeTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\illustrations_retina.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteAppList.targetsize-256_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-40.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\nb-no\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\cstm_brand_preview2x.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageWideTile.scale-400.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-60_altform-lightunplated.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Common Files\System\ado\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\MoviesAnywhereLogoWithTextDark.scale-125.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteAppList.targetsize-256_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-48_contrast-black.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\FileExtension.targetsize-48.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Generic-Dark.scale-100.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarMediumTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\SplashScreen.scale-125_contrast-white.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\lv-LV\View3d\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNewNoteSmallTile.scale-100.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.contrast-black_targetsize-40.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraWideTile.contrast-white_scale-100.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\en-il\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\measure_poster.jpg C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\pt-br\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\cardview-addtotable.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\OrientationControlFrontIndicatorHover.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.scale-125_contrast-white.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-24_altform-unplated_contrast-white.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\Doughboy.scale-250.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Outlook.scale-250.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsMedTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderSmallTile.contrast-black_scale-100.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\SplashScreen.scale-200.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\AppIcon.targetsize-16_altform-unplated_contrast-white.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\MEDIA\BOMB.WAV C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\microsoft-logo-white.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-black\LargeTile.scale-100_contrast-black.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-30_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\sv-se\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\onboarding\calls_emptystate_v3.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\WideTile.scale-100_contrast-white.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-64_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\Ratings\Yelp3.scale-200.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.targetsize-30_contrast-white.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\ScreenSketchSplashScreen.scale-125_contrast-white.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.contrast-white_scale-200.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubStoreLogo.scale-200_contrast-white.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-white\SmallTile.scale-100.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-white\SmallTile.scale-100_contrast-white.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageSmallTile.scale-100_contrast-black.png C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.JScript.Resources\8.0.0.0_ja_b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Interop.Excel\15.0.0.0__71e9bce111e9429c\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Ink.Resources\6.1.0.0_en_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_32\System.Printing\3.0.0.0__31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility.Resources\1.0.0.0_de_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC\MSDATASRC\7.0.3300.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_64\System.Web\2.0.0.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Utilities.Resources\2.0.0.0_it_b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_64\Microsoft.Transactions.Bridge.Dtc\3.0.0.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Utilities.Resources\2.0.0.0_ja_b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\AspNetMMCExt.Resources\2.0.0.0_ja_b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Tools.Outlook.v9.0\9.0.0.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management.Resources\1.0.0.0_en_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\AspNetMMCExt.Resources\2.0.0.0_it_b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Tasks.Resources\2.0.0.0_ja_b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Utilities.Resources\2.0.0.0_de_b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.ManagementConsole.Resources\3.0.0.0_it_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_64\System.Transactions\2.0.0.0__b77a5c561934e089\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC\mscomctl\10.0.4504.0__31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_64\System.Data\2.0.0.0__b77a5c561934e089\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine.Resources\2.0.0.0_fr_b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Tasks.Resources\2.0.0.0_it_b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.ManagementConsole.Resources\3.0.0.0_fr_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost.Resources\1.0.0.0_en_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\apppatch\en-US\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Interop.Graph\15.0.0.0__71e9bce111e9429c\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Diagnostics\1.0.0.0__31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Diagnostics.Resources\1.0.0.0_en_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.ManagementConsole.Resources\3.0.0.0_ja_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Ink.Resources\6.1.0.0_fr_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\1.0.0.0__31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\appcompat\Programs\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_32\PresentationCore\3.0.0.0__31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Diagnostics.Resources\1.0.0.0_de_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility.Resources\1.0.0.0_ja_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\apppatch\fr-FR\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine.Resources\2.0.0.0_de_b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Ink.Resources\6.1.0.0_es_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Interop.PowerPoint\15.0.0.0__71e9bce111e9429c\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management.Resources\1.0.0.0_it_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility.Resources\1.0.0.0_it_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_64\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Accessibility\2.0.0.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.JScript.Resources\8.0.0.0_it_b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management.Resources\1.0.0.0_de_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management.Resources\1.0.0.0_ja_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility.Resources\1.0.0.0_es_31bf3856ad364e35\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\apppatch\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_32\Microsoft.Transactions.Bridge.Dtc\3.0.0.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_32\System.Web\2.0.0.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\AspNetMMCExt\2.0.0.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine.Resources\2.0.0.0_es_b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC\stdole\7.0.3300.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\AspNetMMCExt.Resources\2.0.0.0_de_b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine.Resources\2.0.0.0_ja_b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Utilities.Resources\2.0.0.0_fr_b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
File created C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Tools.Word.v9.0\9.0.0.0__b03f5f7f11d50a3a\HOW TO DECRYPT FILES.txt C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "140" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2226" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "7999" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2659" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2659" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\shell\open\command C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2719" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2226" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\ = "CRYPTED!" C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\DefaultIcon C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "173" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2226" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\w8i9eHkHOwWwQlX.exe" C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "7999" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2719" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "173" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "173" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2719" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.CryptoTorLocker2015!\ = "PRPASCBHJSZLMOM" C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\shell C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\shell\open C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\MuiCache C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "140" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "7999" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CryptoTorLocker2015! C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2659" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "140" C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\w8i9eHkHOwWwQlX.exe,0" C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4468 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\winlogon.exe
PID 4468 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\winlogon.exe
PID 4468 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\winlogon.exe
PID 4468 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\winlogon.exe
PID 4468 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\winlogon.exe
PID 4468 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\winlogon.exe
PID 4468 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsass.exe
PID 4468 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsass.exe
PID 4468 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsass.exe
PID 4468 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsass.exe
PID 4468 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsass.exe
PID 4468 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\lsass.exe
PID 4468 wrote to memory of 768 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\fontdrvhost.exe
PID 4468 wrote to memory of 768 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\fontdrvhost.exe
PID 4468 wrote to memory of 768 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\fontdrvhost.exe
PID 4468 wrote to memory of 768 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\fontdrvhost.exe
PID 4468 wrote to memory of 768 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\fontdrvhost.exe
PID 4468 wrote to memory of 768 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\fontdrvhost.exe
PID 4468 wrote to memory of 776 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\fontdrvhost.exe
PID 4468 wrote to memory of 776 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\fontdrvhost.exe
PID 4468 wrote to memory of 776 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\fontdrvhost.exe
PID 4468 wrote to memory of 776 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\fontdrvhost.exe
PID 4468 wrote to memory of 776 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\fontdrvhost.exe
PID 4468 wrote to memory of 776 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\fontdrvhost.exe
PID 4468 wrote to memory of 784 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 784 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 784 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 784 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 784 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 784 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 940 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 940 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 940 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 940 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 940 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 940 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 1008 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\dwm.exe
PID 4468 wrote to memory of 1008 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\dwm.exe
PID 4468 wrote to memory of 1008 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\dwm.exe
PID 4468 wrote to memory of 1008 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\dwm.exe
PID 4468 wrote to memory of 1008 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\dwm.exe
PID 4468 wrote to memory of 1008 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\dwm.exe
PID 4468 wrote to memory of 432 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 432 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 432 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 432 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 432 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 432 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\System32\svchost.exe
PID 4468 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\System32\svchost.exe
PID 4468 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\System32\svchost.exe
PID 4468 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\System32\svchost.exe
PID 4468 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\System32\svchost.exe
PID 4468 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\System32\svchost.exe
PID 4468 wrote to memory of 852 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 852 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 852 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe
PID 4468 wrote to memory of 852 N/A C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe C:\Windows\system32\svchost.exe

Processes

C:\Windows\system32\lsass.exe

C:\Windows\system32\lsass.exe

C:\Windows\system32\winlogon.exe

winlogon.exe

C:\Windows\system32\dwm.exe

"dwm.exe"

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k RPCSS -p

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k DcomLaunch -p

C:\Windows\system32\fontdrvhost.exe

"fontdrvhost.exe"

C:\Windows\system32\fontdrvhost.exe

"fontdrvhost.exe"

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe

"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc

C:\Windows\system32\SppExtComObj.exe

C:\Windows\system32\SppExtComObj.exe -Embedding

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService -s W32Time

C:\Windows\system32\wbem\wmiprvse.exe

C:\Windows\system32\wbem\wmiprvse.exe

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k netsvcs -p

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe

"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc

C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe

"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent

C:\Windows\system32\taskhostw.exe

taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc

C:\Windows\system32\sihost.exe

sihost.exe

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p

C:\Windows\System32\spoolsv.exe

C:\Windows\System32\spoolsv.exe

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService -p -s nsi

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc

C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe

"C:\Users\Admin\AppData\Local\Temp\c1ff7936d3eb96ab174c4411bfb95ae7ba287e0a9abb8cd26002610b62318de4.exe"

C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe

"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca

Network

Country Destination Domain Proto
N/A 72.21.91.29:80 tcp
N/A 52.109.13.63:443 tcp
N/A 209.197.3.8:80 tcp
N/A 209.197.3.8:80 tcp
N/A 209.197.3.8:80 tcp
N/A 8.8.8.8:53 ilo.brenz.pl udp
N/A 8.8.8.8:53 ant.trenz.pl udp
N/A 148.81.111.121:80 ant.trenz.pl tcp
N/A 93.184.221.240:80 tcp
N/A 20.52.64.200:443 tcp
N/A 8.8.8.8:53 ilo.brenz.pl udp
N/A 148.81.111.121:80 ilo.brenz.pl tcp
N/A 204.79.197.200:443 tcp
N/A 8.8.8.8:53 ghwihb.com udp
N/A 8.8.8.8:53 mlgios.com udp
N/A 8.8.8.8:53 seycdk.com udp
N/A 8.8.8.8:53 ttolig.com udp
N/A 8.8.8.8:53 sobuml.com udp
N/A 8.8.8.8:53 juwybj.com udp
N/A 8.8.8.8:53 salpef.com udp
N/A 8.8.8.8:53 vzksyx.com udp
N/A 8.8.8.8:53 jgglhi.com udp
N/A 8.8.8.8:53 osdbih.com udp
N/A 8.8.8.8:53 obipip.com udp
N/A 8.8.8.8:53 hrluya.com udp
N/A 8.8.8.8:53 yzyikc.com udp
N/A 8.8.8.8:53 yxnusp.com udp
N/A 8.8.8.8:53 ykooxf.com udp
N/A 8.8.8.8:53 exiaco.com udp
N/A 8.8.8.8:53 gxtdyk.com udp
N/A 8.8.8.8:53 tgfriy.com udp
N/A 8.8.8.8:53 qcboox.com udp
N/A 8.8.8.8:53 aycvfk.com udp
N/A 8.8.8.8:53 aoyixv.com udp
N/A 8.8.8.8:53 kodoml.com udp
N/A 8.8.8.8:53 wtytmk.com udp
N/A 8.8.8.8:53 lonhoq.com udp
N/A 8.8.8.8:53 bdbbnd.com udp
N/A 8.8.8.8:53 feuaai.com udp
N/A 8.8.8.8:53 olhptz.com udp
N/A 8.8.8.8:53 yauygo.com udp
N/A 8.8.8.8:53 kgqehu.com udp
N/A 8.8.8.8:53 106.89.54.20.in-addr.arpa udp
N/A 8.8.8.8:53 xoeaid.com udp
N/A 8.8.8.8:53 opwqdy.com udp
N/A 8.8.8.8:53 xkjqja.com udp
N/A 8.8.8.8:53 ysozzi.com udp
N/A 8.8.8.8:53 ghrmcf.com udp
N/A 8.8.8.8:53 huarps.com udp
N/A 8.8.8.8:53 tpuwby.com udp
N/A 8.8.8.8:53 lwzstc.com udp
N/A 8.8.8.8:53 rqyror.com udp
N/A 8.8.8.8:53 orppia.com udp
N/A 8.8.8.8:53 ulxumo.com udp
N/A 8.8.8.8:53 yxxyci.com udp
N/A 8.8.8.8:53 vxaobi.com udp
N/A 8.8.8.8:53 apwlul.com udp
N/A 8.8.8.8:53 fuzfnd.com udp
N/A 8.8.8.8:53 yzxsoy.com udp
N/A 8.8.8.8:53 mnyecs.com udp
N/A 8.8.8.8:53 oltuys.com udp
N/A 8.8.8.8:53 ojtvfd.com udp
N/A 8.8.8.8:53 gygknf.com udp
N/A 8.8.8.8:53 asuqua.com udp
N/A 8.8.8.8:53 tntuym.com udp
N/A 8.8.8.8:53 ratvyf.com udp
N/A 8.8.8.8:53 azgamd.com udp
N/A 8.8.8.8:53 afooki.com udp
N/A 8.8.8.8:53 ydxvto.com udp
N/A 8.8.8.8:53 smzuvv.com udp
N/A 8.8.8.8:53 zfulbs.com udp
N/A 8.8.8.8:53 uunewf.com udp
N/A 8.8.8.8:53 jfduyr.com udp
N/A 8.8.8.8:53 xfoguj.com udp
N/A 8.8.8.8:53 jchwix.com udp
N/A 8.8.8.8:53 zoafen.com udp
N/A 8.8.8.8:53 zzshlb.com udp
N/A 8.8.8.8:53 tazeil.com udp
N/A 8.8.8.8:53 oxjsmt.com udp
N/A 8.8.8.8:53 uwyeas.com udp
N/A 8.8.8.8:53 shbqfd.com udp
N/A 8.8.8.8:53 vsofkw.com udp
N/A 8.8.8.8:53 nbgylz.com udp
N/A 8.8.8.8:53 ivklgb.com udp
N/A 8.8.8.8:53 liukcl.com udp
N/A 8.8.8.8:53 haaepe.com udp
N/A 8.8.8.8:53 ytijqe.com udp
N/A 8.8.8.8:53 tirvcx.com udp
N/A 8.8.8.8:53 iouspz.com udp
N/A 8.8.8.8:53 wkayyd.com udp
N/A 8.8.8.8:53 ilkcwp.com udp
N/A 8.8.8.8:53 sipoyj.com udp
N/A 8.8.8.8:53 wfcpwi.com udp
N/A 8.8.8.8:53 mripuu.com udp
N/A 8.8.8.8:53 jzdfeo.com udp
N/A 8.8.8.8:53 wvjucz.com udp
N/A 8.8.8.8:53 gibjww.com udp
N/A 8.8.8.8:53 zbatbl.com udp
N/A 8.8.8.8:53 wgpacy.com udp
N/A 8.8.8.8:53 eigiem.com udp
N/A 8.8.8.8:53 jkzeih.com udp
N/A 8.8.8.8:53 moeayu.com udp
N/A 8.8.8.8:53 gtxiey.com udp
N/A 8.8.8.8:53 oooeqn.com udp
N/A 8.8.8.8:53 alyeiv.com udp
N/A 8.8.8.8:53 xfeibp.com udp
N/A 8.8.8.8:53 fdjhay.com udp
N/A 8.8.8.8:53 znagpk.com udp
N/A 8.8.8.8:53 pufgcy.com udp
N/A 8.8.8.8:53 xqynva.com udp
N/A 8.8.8.8:53 olleqq.com udp
N/A 8.8.8.8:53 ylckfu.com udp
N/A 8.8.8.8:53 furcmd.com udp
N/A 8.8.8.8:53 koqvsi.com udp
N/A 8.8.8.8:53 ilo.brenz.pl udp
N/A 148.81.111.121:80 ilo.brenz.pl tcp
N/A 204.79.197.200:443 www.bing.com tcp
N/A 148.81.111.121:80 ilo.brenz.pl tcp

Files

memory/4468-132-0x0000000000400000-0x0000000000560000-memory.dmp

memory/4468-133-0x0000000000400000-0x0000000000560000-memory.dmp

memory/4548-143-0x000002D306270000-0x000002D306290000-memory.dmp

memory/4548-144-0x000002D3052D8000-0x000002D3052E0000-memory.dmp

memory/4548-145-0x000002D306AA0000-0x000002D306AC0000-memory.dmp

memory/4548-150-0x000002D308162000-0x000002D308165000-memory.dmp

memory/4548-151-0x000002D308162000-0x000002D308165000-memory.dmp

memory/4548-152-0x000002D308162000-0x000002D308165000-memory.dmp

memory/4548-153-0x000002D308162000-0x000002D308165000-memory.dmp