Analysis
-
max time kernel
200s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00475.7z
Resource
win10v2004-20240802-en
General
-
Target
RNSM00475.7z
-
Size
54.2MB
-
MD5
8c8b6e8695bd5235c7cb7590bb1c60fc
-
SHA1
c90a814e4061b6aca686f74f9cf1a3c5822a2b54
-
SHA256
1fbfdf74a1a014bf68815f4efbf04acfe304b78d8cc6e2464fc25b0b56752e00
-
SHA512
085fef245b52daca6b447e18ac0a0169d0bed23b8be7106ae188ee8b900f21c0aa6627e3759d0e39e710955ce516144a0e55187a2dff4e28bae1c92fc79aafb9
-
SSDEEP
786432:sVgbtJA8C96CGC9ARnR8HKw4dHmWIywSF8/M6Jfnm6Y+s6uD+/uAgjpMt9enS//p:sVUr0BbFSFz/aluD+KMt9z/mWJ95rr
Malware Config
Signatures
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
GandCrab payload 3 IoCs
resource yara_rule behavioral1/memory/6140-2185-0x0000000002220000-0x0000000002237000-memory.dmp family_gandcrab behavioral1/memory/6140-2184-0x0000000000400000-0x0000000000433000-memory.dmp family_gandcrab behavioral1/memory/6140-2372-0x0000000000400000-0x0000000000433000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Renames multiple (56) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (577) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (88) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.pef-95fec41a73473b1ccf4467874e8f1833b2a852f7703c7c134e36bfc04ee436bc.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation wmisecure64.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Encoder.gen-448de6e8dac16e82edffb183dfc61d43206c83b1bd7b65d93eed0f2450d11643.exe -
Executes dropped EXE 17 IoCs
pid Process 3616 HEUR-Trojan-Ransom.MSIL.Angel.gen-5ca8470a788aef9cf8c64c8b16f913409070c0eecc68301ef5aec8cb94d0d64f.exe 3284 HEUR-Trojan-Ransom.MSIL.Blocker.gen-772698a21bcad661285d94eba61409f9a871a21bbcb8e1166fca0e32d055c114.exe 3224 HEUR-Trojan-Ransom.MSIL.Encoder.gen-448de6e8dac16e82edffb183dfc61d43206c83b1bd7b65d93eed0f2450d11643.exe 1220 HEUR-Trojan-Ransom.MSIL.Gen.gen-eba7b6dcd4f9889f5d175d9983718316fe66eb6a6887ed0e102a96154986942a.exe 4512 HEUR-Trojan-Ransom.Win32.Blocker.pef-95fec41a73473b1ccf4467874e8f1833b2a852f7703c7c134e36bfc04ee436bc.exe 4340 HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe 1448 Wallpapers.exe 376 wmiintegrator.exe 2512 zbhnd.exe 5032 wmihostwin.exe 1616 wmimic.exe 2108 wmisecure.exe 3504 wmisecure64.exe 3440 HEUR-Trojan-Ransom.Win32.Cryptoff.vho-fa5300fa49f861f9d505c8887d5f4da508fca61d592adbbb4cbecc9882a85264.exe 4000 HEUR-Trojan-Ransom.Win32.Cryptor.gen-718810b8eeb682fc70df602d952c0c83e028c5a5bfa44c506756980caf2edebb.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6956 ChickiMiki Design.exe -
Adds Run key to start application 2 TTPs 15 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7soxg5ahbu = "C:\\Users\\Admin\\Desktop\\00475\\HEUR-Trojan-Ransom.Win32.Cryptoff.vho-fa5300fa49f861f9d505c8887d5f4da508fca61d592adbbb4cbecc9882a85264.exe" HEUR-Trojan-Ransom.Win32.Cryptoff.vho-fa5300fa49f861f9d505c8887d5f4da508fca61d592adbbb4cbecc9882a85264.exe -
Drops desktop.ini file(s) 5 IoCs
description ioc Process File created C:\Users\Admin\Pictures\Camera Roll\desktop.ini HEUR-Trojan-Ransom.MSIL.Encoder.gen-448de6e8dac16e82edffb183dfc61d43206c83b1bd7b65d93eed0f2450d11643.exe File created C:\Users\Admin\Pictures\Saved Pictures\desktop.ini HEUR-Trojan-Ransom.MSIL.Encoder.gen-448de6e8dac16e82edffb183dfc61d43206c83b1bd7b65d93eed0f2450d11643.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini HEUR-Trojan-Ransom.MSIL.Gen.gen-eba7b6dcd4f9889f5d175d9983718316fe66eb6a6887ed0e102a96154986942a.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini HEUR-Trojan-Ransom.MSIL.Gen.gen-eba7b6dcd4f9889f5d175d9983718316fe66eb6a6887ed0e102a96154986942a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1927882244.png" reg.exe -
resource yara_rule behavioral1/files/0x00070000000234d2-221.dat upx behavioral1/memory/4340-224-0x0000000000400000-0x00000000005BB000-memory.dmp upx behavioral1/files/0x000200000001e3a2-713.dat upx behavioral1/memory/4340-2302-0x0000000000400000-0x00000000005BB000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ink\ipsar.xml.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\sunec.dll.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Java\jre-1.8\bin\javaws.exe.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Grace-ul-oob.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessVL_MAK-ul-phn.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Grace-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\[email protected] HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Java\jdk-1.8\bin\serialver.exe.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_OEM_Perp-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\EduWorks Data Streamer Add-In\Microsoft.Office.Tools.dll HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\fonts\LucidaBrightDemiBold.ttf HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Java\jre-1.8\lib\fonts\LucidaTypewriterBold.ttf.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019MSDNR_Retail-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WordNaiveBayesCommandRanker.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-black_scale-80.png HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\7-Zip\Lang\be.txt.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\mip.exe.mui HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\libpng.md.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription5-ul-oob.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_KMS_Client-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp6-ul-phn.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\management-agent.jar HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription4-ppd.xrm-ms.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordR_Grace-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WINWORD_F_COL.HXK HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp3-ul-phn.xrm-ms.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\POWERPNT_F_COL.HXK.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\uk\msipc.dll.mui.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-black_scale-80.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_ConsumerSub_Bypass30-ul-oob.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Office16\AUDIOSEARCHMAIN.DLL.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_SubTest-pl.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Common Files\System\msadc\msadcor.dll.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Top Shadow.eftx.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdXC2RVL_MAKC2R-ul-phn.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Common Files\System\ja-JP\wab32res.dll.mui HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Ion.thmx.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Office16\MML2OMML.XSL.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\pl\msipc.dll.mui.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Tw Cen MT.xml HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_MAK-ul-phn.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019VL_KMS_Client_AE-ul-oob.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Common Files\microsoft shared\ink\ko-KR\tipresx.dll.mui HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Java\jdk-1.8\bin\java.exe.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\unlimited\local_policy.jar HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Common Files\microsoft shared\ink\it-IT\TipTsf.dll.mui.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_SubTest-pl.xrm-ms.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\msotelemetryintl.dll.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Redshift\lib\OpenSSL64.DllA\libeay32.dll HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalPipcR_OEM_Perp-ppd.xrm-ms HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART11.BDR.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.contrast-white_scale-180.png.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\fr\msipc.dll.mui.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Common Files\microsoft shared\ink\mraut.dll.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\jni_md.h HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-crt-private-l1-1-0.dll HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_OEM_Perp-ppd.xrm-ms.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe -
pid Process 6188 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5576 6140 WerFault.exe 122 -
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Gen.gen-eba7b6dcd4f9889f5d175d9983718316fe66eb6a6887ed0e102a96154986942a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-772698a21bcad661285d94eba61409f9a871a21bbcb8e1166fca0e32d055c114.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmihostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisecure64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChickiMiki Design.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Encoder.gen-448de6e8dac16e82edffb183dfc61d43206c83b1bd7b65d93eed0f2450d11643.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.pef-95fec41a73473b1ccf4467874e8f1833b2a852f7703c7c134e36bfc04ee436bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiintegrator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cryptor.gen-718810b8eeb682fc70df602d952c0c83e028c5a5bfa44c506756980caf2edebb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wallpapers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbhnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Angel.gen-5ca8470a788aef9cf8c64c8b16f913409070c0eecc68301ef5aec8cb94d0d64f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmimic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisecure.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x00070000000234fd-96.dat nsis_installer_1 behavioral1/files/0x00070000000234fd-96.dat nsis_installer_2 behavioral1/files/0x00070000000234fe-98.dat nsis_installer_1 behavioral1/files/0x00070000000234fe-98.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings Wallpapers.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5040 powershell.exe 5040 powershell.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4212 7zFM.exe 3056 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeRestorePrivilege 4212 7zFM.exe Token: 35 4212 7zFM.exe Token: SeSecurityPrivilege 4212 7zFM.exe Token: SeDebugPrivilege 5040 powershell.exe Token: SeDebugPrivilege 1696 taskmgr.exe Token: SeSystemProfilePrivilege 1696 taskmgr.exe Token: SeCreateGlobalPrivilege 1696 taskmgr.exe Token: SeDebugPrivilege 3056 taskmgr.exe Token: SeSystemProfilePrivilege 3056 taskmgr.exe Token: SeCreateGlobalPrivilege 3056 taskmgr.exe Token: 33 1696 taskmgr.exe Token: SeIncBasePriorityPrivilege 1696 taskmgr.exe Token: SeDebugPrivilege 6188 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4212 7zFM.exe 4212 7zFM.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 1696 taskmgr.exe 1696 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe 3056 taskmgr.exe -
Suspicious use of SetWindowsHookAW 64 IoCs
pid Process 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe 6140 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4100 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 3056 1696 taskmgr.exe 98 PID 1696 wrote to memory of 3056 1696 taskmgr.exe 98 PID 5040 wrote to memory of 1288 5040 powershell.exe 100 PID 5040 wrote to memory of 1288 5040 powershell.exe 100 PID 1288 wrote to memory of 3616 1288 cmd.exe 102 PID 1288 wrote to memory of 3616 1288 cmd.exe 102 PID 1288 wrote to memory of 3616 1288 cmd.exe 102 PID 1288 wrote to memory of 3284 1288 cmd.exe 104 PID 1288 wrote to memory of 3284 1288 cmd.exe 104 PID 1288 wrote to memory of 3284 1288 cmd.exe 104 PID 1288 wrote to memory of 3224 1288 cmd.exe 105 PID 1288 wrote to memory of 3224 1288 cmd.exe 105 PID 1288 wrote to memory of 3224 1288 cmd.exe 105 PID 1288 wrote to memory of 1220 1288 cmd.exe 106 PID 1288 wrote to memory of 1220 1288 cmd.exe 106 PID 1288 wrote to memory of 1220 1288 cmd.exe 106 PID 1288 wrote to memory of 4512 1288 cmd.exe 107 PID 1288 wrote to memory of 4512 1288 cmd.exe 107 PID 1288 wrote to memory of 4512 1288 cmd.exe 107 PID 1288 wrote to memory of 4340 1288 cmd.exe 108 PID 1288 wrote to memory of 4340 1288 cmd.exe 108 PID 3284 wrote to memory of 1448 3284 HEUR-Trojan-Ransom.MSIL.Blocker.gen-772698a21bcad661285d94eba61409f9a871a21bbcb8e1166fca0e32d055c114.exe 110 PID 3284 wrote to memory of 1448 3284 HEUR-Trojan-Ransom.MSIL.Blocker.gen-772698a21bcad661285d94eba61409f9a871a21bbcb8e1166fca0e32d055c114.exe 110 PID 3284 wrote to memory of 1448 3284 HEUR-Trojan-Ransom.MSIL.Blocker.gen-772698a21bcad661285d94eba61409f9a871a21bbcb8e1166fca0e32d055c114.exe 110 PID 1448 wrote to memory of 376 1448 Wallpapers.exe 111 PID 1448 wrote to memory of 376 1448 Wallpapers.exe 111 PID 1448 wrote to memory of 376 1448 Wallpapers.exe 111 PID 4512 wrote to memory of 2512 4512 HEUR-Trojan-Ransom.Win32.Blocker.pef-95fec41a73473b1ccf4467874e8f1833b2a852f7703c7c134e36bfc04ee436bc.exe 112 PID 4512 wrote to memory of 2512 4512 HEUR-Trojan-Ransom.Win32.Blocker.pef-95fec41a73473b1ccf4467874e8f1833b2a852f7703c7c134e36bfc04ee436bc.exe 112 PID 4512 wrote to memory of 2512 4512 HEUR-Trojan-Ransom.Win32.Blocker.pef-95fec41a73473b1ccf4467874e8f1833b2a852f7703c7c134e36bfc04ee436bc.exe 112 PID 376 wrote to memory of 5032 376 wmiintegrator.exe 113 PID 376 wrote to memory of 5032 376 wmiintegrator.exe 113 PID 376 wrote to memory of 5032 376 wmiintegrator.exe 113 PID 5032 wrote to memory of 1616 5032 wmihostwin.exe 114 PID 5032 wrote to memory of 1616 5032 wmihostwin.exe 114 PID 5032 wrote to memory of 1616 5032 wmihostwin.exe 114 PID 1616 wrote to memory of 2108 1616 wmimic.exe 115 PID 1616 wrote to memory of 2108 1616 wmimic.exe 115 PID 1616 wrote to memory of 2108 1616 wmimic.exe 115 PID 1616 wrote to memory of 3504 1616 wmimic.exe 116 PID 1616 wrote to memory of 3504 1616 wmimic.exe 116 PID 1616 wrote to memory of 3504 1616 wmimic.exe 116 PID 1288 wrote to memory of 3440 1288 cmd.exe 117 PID 1288 wrote to memory of 3440 1288 cmd.exe 117 PID 1288 wrote to memory of 4000 1288 cmd.exe 120 PID 1288 wrote to memory of 4000 1288 cmd.exe 120 PID 1288 wrote to memory of 4000 1288 cmd.exe 120 PID 1288 wrote to memory of 6140 1288 cmd.exe 122 PID 1288 wrote to memory of 6140 1288 cmd.exe 122 PID 1288 wrote to memory of 6140 1288 cmd.exe 122 PID 4000 wrote to memory of 6188 4000 HEUR-Trojan-Ransom.Win32.Cryptor.gen-718810b8eeb682fc70df602d952c0c83e028c5a5bfa44c506756980caf2edebb.exe 123 PID 4000 wrote to memory of 6188 4000 HEUR-Trojan-Ransom.Win32.Cryptor.gen-718810b8eeb682fc70df602d952c0c83e028c5a5bfa44c506756980caf2edebb.exe 123 PID 4000 wrote to memory of 6188 4000 HEUR-Trojan-Ransom.Win32.Cryptor.gen-718810b8eeb682fc70df602d952c0c83e028c5a5bfa44c506756980caf2edebb.exe 123 PID 3504 wrote to memory of 2060 3504 wmisecure64.exe 124 PID 3504 wrote to memory of 2060 3504 wmisecure64.exe 124 PID 3504 wrote to memory of 2060 3504 wmisecure64.exe 124 PID 3504 wrote to memory of 6512 3504 wmisecure64.exe 129 PID 3504 wrote to memory of 6512 3504 wmisecure64.exe 129 PID 3504 wrote to memory of 6512 3504 wmisecure64.exe 129 PID 6188 wrote to memory of 6880 6188 powershell.exe 131 PID 6188 wrote to memory of 6880 6188 powershell.exe 131 PID 6188 wrote to memory of 6880 6188 powershell.exe 131 PID 3224 wrote to memory of 6956 3224 HEUR-Trojan-Ransom.MSIL.Encoder.gen-448de6e8dac16e82edffb183dfc61d43206c83b1bd7b65d93eed0f2450d11643.exe 132 PID 3224 wrote to memory of 6956 3224 HEUR-Trojan-Ransom.MSIL.Encoder.gen-448de6e8dac16e82edffb183dfc61d43206c83b1bd7b65d93eed0f2450d11643.exe 132
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RNSM00475.7z1⤵
- Modifies registry class
PID:3292
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4100
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1120
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00475.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4212
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.MSIL.Angel.gen-5ca8470a788aef9cf8c64c8b16f913409070c0eecc68301ef5aec8cb94d0d64f.exeHEUR-Trojan-Ransom.MSIL.Angel.gen-5ca8470a788aef9cf8c64c8b16f913409070c0eecc68301ef5aec8cb94d0d64f.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3616
-
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.MSIL.Blocker.gen-772698a21bcad661285d94eba61409f9a871a21bbcb8e1166fca0e32d055c114.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-772698a21bcad661285d94eba61409f9a871a21bbcb8e1166fca0e32d055c114.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Roaming\Wallpapers.exe"C:\Users\Admin\AppData\Roaming\Wallpapers.exe" C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.MSIL.Blocker.gen-772698a21bcad661285d94eba61409f9a871a21bbcb8e1166fca0e32d055c114.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe" unk5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe" unk26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe" unk37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe" execute8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108
-
-
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe" autorun8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:6512
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:7392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:8236
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:9024
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1972
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:8136
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1348
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:6832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:7244
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:8272
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:9440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:548
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.MSIL.Encoder.gen-448de6e8dac16e82edffb183dfc61d43206c83b1bd7b65d93eed0f2450d11643.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-448de6e8dac16e82edffb183dfc61d43206c83b1bd7b65d93eed0f2450d11643.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\ChickiMiki Design.exe"C:\Users\Admin\AppData\ChickiMiki Design.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6956
-
-
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.MSIL.Gen.gen-eba7b6dcd4f9889f5d175d9983718316fe66eb6a6887ed0e102a96154986942a.exeHEUR-Trojan-Ransom.MSIL.Gen.gen-eba7b6dcd4f9889f5d175d9983718316fe66eb6a6887ed0e102a96154986942a.exe3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
PID:1220
-
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.Win32.Blocker.pef-95fec41a73473b1ccf4467874e8f1833b2a852f7703c7c134e36bfc04ee436bc.exeHEUR-Trojan-Ransom.Win32.Blocker.pef-95fec41a73473b1ccf4467874e8f1833b2a852f7703c7c134e36bfc04ee436bc.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exeHEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Program Files directory
PID:4340
-
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.Win32.Cryptoff.vho-fa5300fa49f861f9d505c8887d5f4da508fca61d592adbbb4cbecc9882a85264.exeHEUR-Trojan-Ransom.Win32.Cryptoff.vho-fa5300fa49f861f9d505c8887d5f4da508fca61d592adbbb4cbecc9882a85264.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3440
-
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.Win32.Cryptor.gen-718810b8eeb682fc70df602d952c0c83e028c5a5bfa44c506756980caf2edebb.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-718810b8eeb682fc70df602d952c0c83e028c5a5bfa44c506756980caf2edebb.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$a = [System.IO.File]::ReadAllText(\"C:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6188 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\1927882244.png /f5⤵
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:6880
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False5⤵
- System Location Discovery: System Language Discovery
PID:7068
-
-
-
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-c66034fc4aeab446fc483db24feb82c3bf017ab4355d6dce261a7aa344d75a4b.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookAW
PID:6140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6140 -s 4724⤵
- Program crash
PID:5576
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 6140 -ip 61401⤵PID:5416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1011B
MD5d90d05a5fea9c28b3bf2b55f808c3a45
SHA17774c79c85b4401acfc56002f9e8a3e10e8a7b60
SHA2568a9b224d68a718e7cd4da069a158408d9c71fb8ecc4e4a6581982d7a35b29cec
SHA512783d830a0d75911da6878ea58f7191f1438a429e232c63db86e6f09a1bb390ec7ee72f10db1ee695177686cacab24c9e58f61e7d403d75dd9c817c592131170a
-
Filesize
1.8MB
MD5afe2174ca587707b863bf4902c9852eb
SHA12fd0c70aa2e8c462926cf5501b19ed525e88efab
SHA2566573fd48947b4548e337ee26a4b142687f3e4ee37135f007de6cdd49aef1aff8
SHA5128c01622fbd596933ed828cb7e55146c3af93b74819fb87fef26a7531e5befac242bf92c97ac98fbbfcda46c93b1293c6e5f834160ff10c4e940db04d383821db
-
Filesize
16KB
MD563c98db59f68e9b7fa09d35ccfb271e7
SHA1d650c52ea22f0e7f93ba724de4832c3a48767c5a
SHA256ccba0b2098c98d0dedaf16ae5e9ca302c25769f5a312968347ddc8b2129b0513
SHA5123900af4b16c3d585b102f2950f457e4ae119dce684199e34d14a7bda516734a8debd96a061bf4e3ab9b9140d87217f32c064d9585d4ef0896404462d226fb675
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
C:\Users\Admin\AppData\Local\Temp\7zE470D9A28\00475\HEUR-Trojan.Win32.Crypt.gen-c5ccdeea44050d8be9cf04b42ba6336dfd81e4a930ec6cd916f5f4e3a5f713bb.exe
Filesize253KB
MD5196ef716e51eb90f7ffcfd2219ce1d5e
SHA13c5d438cb3dee2b0474ea45be67069db184e26bb
SHA256c5ccdeea44050d8be9cf04b42ba6336dfd81e4a930ec6cd916f5f4e3a5f713bb
SHA512e303bd36a6cd409bf146b0716a52c50ab5069b3dd513303a8c63c1494013450e5a84ee0bf7eb5d7396946080f57ef08275e09326bc2bd3fc80f94f911e872759
-
C:\Users\Admin\AppData\Local\Temp\7zE470D9A28\00475\HEUR-Trojan.Win32.Crypt.gen-e419efc94e3209360dcacc40d27f3b45983940b490e89b5085226c172016eb2b.exe
Filesize516KB
MD5c0600b4147dc48f8469e7f49aa2fc1b9
SHA1cce3d10ca67f4c5e36f6c8234cdd80b5a034d46b
SHA256e419efc94e3209360dcacc40d27f3b45983940b490e89b5085226c172016eb2b
SHA51268a751e90982c9906f539c5bfde8052ec28695c01da86a54f9d7b06993924013d3f5edf8c3aadec327ce8d77a003d0d580426e60d3857a7c2e5076357879915d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
52KB
MD589af5e1c7d17991e59919008c51a96bd
SHA19642f4111f24fa06ddeff2a309958042ad55828a
SHA2560d0e6f5a21f63729c8dc03d7d7f5bc69452462d5c742a7538f178e9769cfb4f9
SHA512b4c17aef39f274e1a118b601003b01bd30d946b04368e794a62141a4ed7af7d7bc33737ba2fa95b2e4180ceb1971afc65af5c347adc5bd0f579520fda5732442
-
Filesize
1.0MB
MD5e5dfa48b05eccf2c98a22d38477c3d5e
SHA14dbc7e6940abd0ec0307f4720d8a6e54d327e527
SHA256647c529f721bc1b5f57369411f57e888cd6a13bd12ddedc63ba101563aa5ac29
SHA5125ae80b803b71c84e4aa90ceb2aa8b68aabcfedddc20ae65f90372176b114a411b39ecca79847f14c8f9f94c185b949b0d2ca1de237267dd33a789c3481ee71ad
-
Filesize
1.0MB
MD5d89f8e58cf8d768223f26275c2f35e5a
SHA1e570e5d715f1c97bda71aee7ceeaa8b95247beec
SHA256c063f7239739aab8afdd9c57662cb682a22d96297e5ee8b14e3242f471107db6
SHA512f7060f7b0a3455a30ef45609691844899bb1f2a93724658094023207044841fd07db3a6bd50523e27b0b4d6644654423c8582857b3b8f63a8c3d324939e2b4e3
-
Filesize
1.0MB
MD5814c969e91c36dbf6ccce8124e3bcf9d
SHA17abfd1a14c13f91a7ad021ca5ded3c2bb1c66c4f
SHA25665509f6d92b38abce1195045a9e58433bed6458df16c326e5be7c5c37f5945a1
SHA5125783ac9d30513222b819a1b90d7b13567cd61d6cb8bc94731971b7a2611f02170bcd0f19d39a07c9e14ad56b3df80c20a74561f7598fd919a9f712b354b5e1a3
-
Filesize
1.0MB
MD50762013bab75b9f0eb6acb7203a62cab
SHA177f30e14c051a834df9fc5fc1373ae921762a5ad
SHA2565e30e5e195bc74b1bc3a0e0b0cc88693d505cb8a02d57cf63ac23b044c48012f
SHA512ea32e8779e7ebd64e019f1e8901de27bbac58d5ccd76d285dc340c01323447afe527eecdd83d53a2b246929857b7252be87f0839883b9ae3c02faab9bc65301e
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.MSIL.Angel.gen-5ca8470a788aef9cf8c64c8b16f913409070c0eecc68301ef5aec8cb94d0d64f.exe
Filesize190KB
MD574ab936b5ec88d237e710ac935d60737
SHA1c48ef50c560cb7f3da5b62f8710b68996493c0d9
SHA2565ca8470a788aef9cf8c64c8b16f913409070c0eecc68301ef5aec8cb94d0d64f
SHA51227e923abb63c2e790631ce3e1f4ced195e94a7ab92a59576916ebab5e473a85aa063e76d950366e3b877f6bab2411f93b88f66f82b11f291a474b1bb0baa70eb
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.MSIL.Blocker.gen-772698a21bcad661285d94eba61409f9a871a21bbcb8e1166fca0e32d055c114.exe
Filesize1.0MB
MD5f8fdb3c3cbe550d2c89fd8eb86da8baf
SHA17b9fa16d0ce2395447311d4e5083fe581bf3cb01
SHA256772698a21bcad661285d94eba61409f9a871a21bbcb8e1166fca0e32d055c114
SHA512098819cdbf4237c160e3c935977c983dfb2215927fed57c3c7379a3c6de647434983cfca40111d791a38675f0675f2e2b9bfb866472e8666272e79c9f00ef060
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.MSIL.Encoder.gen-448de6e8dac16e82edffb183dfc61d43206c83b1bd7b65d93eed0f2450d11643.exe
Filesize179KB
MD5e75a484e15eb8974b5836f57ec753b65
SHA157a4210db7527a3a42117e130fc1c4697f383c7b
SHA256448de6e8dac16e82edffb183dfc61d43206c83b1bd7b65d93eed0f2450d11643
SHA5127df1e73387dab3b869e92efcaf80f5e0c7d9e878c74eb0a9398ecccfb667a98edec38a7194de18d287aec1f9464b63ad33bcec7a826c69076087488a5cbac772
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.MSIL.Gen.gen-eba7b6dcd4f9889f5d175d9983718316fe66eb6a6887ed0e102a96154986942a.exe
Filesize1.2MB
MD5c0d5972cdafee17baee0e03268891783
SHA1fbfef0ea258095aff9d53b819a7174ec52947ba9
SHA256eba7b6dcd4f9889f5d175d9983718316fe66eb6a6887ed0e102a96154986942a
SHA5128dfc287c200591ec9a03e3d3a3d3256f75687bfff747694549e64acf365ffe1695afd8da171bf20cf35cc204c58207fed6effcba962af02ae75b859aa83bc19d
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.Win32.Blocker.pef-95fec41a73473b1ccf4467874e8f1833b2a852f7703c7c134e36bfc04ee436bc.exe
Filesize52KB
MD577aabab482c7eb162ea98fd20665ea7f
SHA150250769ee714bf2749ec428858b5e5dc8d7e037
SHA25695fec41a73473b1ccf4467874e8f1833b2a852f7703c7c134e36bfc04ee436bc
SHA512335ec0c8c13562216531ac68fba258132c163334f5b90aafcb98e38717e50233fd9c0883185ae06ae176afcd72712bc894767452b756d5a466f6252fd5d72987
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-1c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8.exe
Filesize1.8MB
MD581daa885db0384c76e6cbf7298c2af8b
SHA1ce7ff931ca463d45ed4eaa09f4b4b9b1ecb0ccdb
SHA2561c64c91268249161e66b3bb7a2c3b9f62ea21b6036a13093d84bde66bc4009b8
SHA5127dd406b2cb7403b0c4d9879a4fe31d8fbebc440b1ed83716da33b4adfc17c9b3405ba6a5b014d97d79bdb34f5c484e539b5dc09b709518bb9c77b54b9567102d
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.Win32.Cryptoff.vho-fa5300fa49f861f9d505c8887d5f4da508fca61d592adbbb4cbecc9882a85264.exe
Filesize130KB
MD573aecfe0e6fe8e5a12e76137f68c9e3f
SHA171190b042f653b5fcd04c6b5a79ae93309071120
SHA256fa5300fa49f861f9d505c8887d5f4da508fca61d592adbbb4cbecc9882a85264
SHA5127c0c53fb82d8bd82fbca3711283397c50e0f13415f6bfb66484128959901bd1b46b1835ab0dea4969e64f80fc64e703fba5d6b5c1a820787b6b5724c75a574ef
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan-Ransom.Win32.Cryptor.gen-718810b8eeb682fc70df602d952c0c83e028c5a5bfa44c506756980caf2edebb.exe
Filesize921KB
MD5b76d1d3d2d40366569da67620cf78a87
SHA1ae23c0227afc973f11d6d08d898a6bb7516418e2
SHA256718810b8eeb682fc70df602d952c0c83e028c5a5bfa44c506756980caf2edebb
SHA51285991cd78c13546e3fcb9da0574000eb1ff118c05f77d603c19941f3eaab908ab65b57f82dbd20d4c7784d0892ff5ea8ab8c160338d78b5fc76f71e09cec20b5
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan.Win32.Crypt.gen-c5ccdeea44050d8be9cf04b42ba6336dfd81e4a930ec6cd916f5f4e3a5f713bb.exe
Filesize253KB
MD56c2852882fc92bee9d4802fb6d298372
SHA190cb4e21a5610abc13473f67e5b8a4a994bc276c
SHA256473885b4f2c605cec2be5a7e3343c318fced7206856bbc1ec9d55f6cf6e1bf49
SHA512608a6bd20a6f6fdf3151202e5bad9cda6bab094486408e33ef0c0ce6f467d95f56042b5e99f755e85dec7c95389feb0991e06aaca4c3fd2a92fda32beabde655
-
C:\Users\Admin\Desktop\00475\HEUR-Trojan.Win32.Crypt.gen-e419efc94e3209360dcacc40d27f3b45983940b490e89b5085226c172016eb2b.exe
Filesize516KB
MD5bbd9f4a7203b1be8d336c2a57777c9a1
SHA13408450c165214771ebc31eca944927fb435894c
SHA25613ebbf96188f06e9813ebd19a6b9911794926ca83027060db4e533513c3e9dfd
SHA512cfb5f52ce85d7682ad4eaba05c47b51cec45f60d3bd4088c709e0eb1a46861161050eac8558690f20fe48abedc5c63d15c3cf829e7ded4fbb85341d4b4d7a93b
-
Filesize
1.0MB
MD54c7c124385ca73a8fc720ce4439f31d2
SHA1cf18b1c94f0ed8433892f0ac725a67133dba28fd
SHA256b2df6c864bc643dcdd8bf5fc2302603c439ff1da836adf0e678ce005805b9eb1
SHA512439db6facf55407029a5c4d12c603a85486a5fbaa1d4e7f6d272bdd7aafe341673c430664ae2b887064e7ca54a8a17b29b1cca6e2d13605e78b11722e5ec0f90
-
Filesize
1.0MB
MD5a330cc42dbb2a0074e2e7f67397a65b0
SHA1b086b35cec4978cdeb2126a01b33065b58741b72
SHA256a9c69e0bcfc906cd48d74d2e158ca8a97ed349362eaf62cb2914ec69557befbe
SHA512608599b7ce42c57616bd98199733a36bba29fa50a4221240c460a592a1cbeff881b49625824379887eb54bad6fa01dd4261c194bef73c1134e67240f995cb288
-
Filesize
1.0MB
MD5e86d2518c8b3018317c89a49c43967a0
SHA1fbcfa280758964dc642cdb91fbe5de12aee6e160
SHA256e07b80a635c678b4a2227370bc512bf167876a5dc6767f6b921a5e07a84bb6fb
SHA512278d1b119abc7d6678309afe1e7e5330348560ad4d40369b36f8aae4497fbf37cb67523d542e0cbfbc6ecfb8f1f71925c54a1d4a9bb7a35973ed5955ed6f5902
-
Filesize
1.0MB
MD5b296c1fe4b2ae1bb3de2403d17d90449
SHA14c36af39e4e31cedae4c641245cc80d05888af68
SHA25607b8ac22843b429a8853f30f97b751e02e47208ccabb73875282562a313d1467
SHA512639f47aab221fcf8ce0774593ee8127cc96e9baae3b6a9a580ce34500aee134266c639d8c9dfeae41c11c6f906cc308814e4c744140dd80d13ca1224fa0c0f90
-
Filesize
1.0MB
MD5e55c05511fa8dcb6134ced98ee18bc6f
SHA1e24c1fe23650d605fd8216dfa7078500a4120985
SHA2564671a0a7bb6ae53d436591da03c24fe83d6d7fb3dbb395ace92d1b121ece82c8
SHA5124f839da8251d6c40275590d3f42f569ad33d8b5f59f932d2db93a3ac260a0cbeeaf7c546db7a3491375e1603899654cf127b5748c46fb7acc4f349c6e1243c9d
-
Filesize
1.0MB
MD5153f007c3b4e3552ad539a055f6010e0
SHA137a6f9af3d75289fcb3e8793a3476340d991379b
SHA2565ea1b29a3b17bcef046d547f4d4d5ae56f7db0fcc366598928672f9e46fd6a30
SHA512302d9d7bfee654d4bfbc5de1b99c3615465bab7bd5ab6edd8af11be50ce39087495881550eeaf277eaf6c5f7174dae3ac41e0bc22fcce7d2bfb35c202d3d6253
-
Filesize
1.0MB
MD5769ecfe6d38d3cb6d494b54a07fe379a
SHA1131397f9074df3bbf870356c6b5e8f1df0df67f2
SHA2560b78dc049feea0c41aa2373177c80743091dd08cf55a212dc19ded8f35f4502f
SHA512b054186ce7e082bd92d2177603fdbe01973a4580b62ff919d54f11ed8454f6d9c13a529b15253ed97aa52c4cd9675a70b1356eb9fd3d9f1f548762a46929880f
-
Filesize
1.0MB
MD5b0eff85529ad76eb573226db7a82fdd4
SHA138edc8fb2478fb46eee0ff6ae81221eaf85c3449
SHA256138649676507060a2d491f86aa48db08bd9341e34e4be65b78d2bb490c0a533c
SHA512ec98b8670c244e1578198e7b9dea08439d27aa27e50649a636697bb2074fb864958bea2838c3c6119137389e50422c763a3bcfe0743a8eafb175360fff8199fc
-
Filesize
1.0MB
MD57387cd03d052c5b292a5055f0d57ad49
SHA1227839f57990ee932ad972af4f7159d2ce8b5d92
SHA25635c504a386ad51414e14a5949195ab40d1b5b125da4bf847295331fb628abb4d
SHA51285e2270637c7fd6087604a6e010784edcd7e0e3fcbfcdcbec0d1aaf1448681c8d84405bcba7337b2fc88008a6e72440555b607522b892c596a0013d534ee3840
-
Filesize
1.0MB
MD50cfc1078a90f7067e5984b18a84a5c55
SHA1ad03c60da751168d499edd02e99f5a3fbabc1e6f
SHA256ae8a3e18f6a07450d3656eb401d059a07f82ccd9cabc50e7a80beacc8effe444
SHA512c53aeb9883ac5c38dc26e3a2eb06e9e7b13e5a148536768ebfaa042ad2022040d13a1a91c9a2552f67d9f607c1a919ae4eec6a7424add5ada315f532113ac83e
-
Filesize
1.0MB
MD58ee3549351b2ae0bb18d5858b4d46964
SHA1ed67d8fe20fd98c201c3b9cb635725fc10429cde
SHA2560dfa3f44183941985fce5888573d3e0e336890e6767be23097809d0aee795812
SHA512337f07935a07037f99fcf7cce5580cbec3eaf7710257bb30070e10b2b076368c3f5c560e3b5c0680f744f0d1841ace0c83ba89122b2b510453965057a12383e5
-
Filesize
1.0MB
MD5c36ec057e7b9cd80d9a27549ee90ea69
SHA1784487adb48bb3a9168aec8dce240282f5ab2384
SHA2568e42cec3f0dd08b31fc78db8f3751f840d851a3a8044c19cabc334d6e3188f24
SHA512bf09930bc89f4bf7932c5a057ac3bf23eac6483ef5ec564d0e5fff21c5cede5b0328db3f30e5f07891a21183fce26529420ded2f93d4d509bd821d66cc744475
-
Filesize
1.0MB
MD56786d0375251ad927dc9ee2aea3b3d32
SHA194d1331f0ed512d31070f0e4e78710a9f9387c12
SHA2568786739b8917d91241020184d82c3406df2672fc2b842180d2879e092f96c8c2
SHA5120c6a97b1c5e9d2c61323be718e552d9c0542b857f77d16b86300eab9a934192b04fc7827322bcb865960a3c54875eeee120fc45720eb7c97b4ad6903871e8f16
-
Filesize
1.0MB
MD57d84f0b47a71bc235df8a4c45a5669a8
SHA16d33be77a09edb3103da4103a934d1d8bfdaae64
SHA25623a46563ac84fd7ddf3d344a97060b54d7e67dd389c1d9a884e02318a2564c80
SHA51248f4b41064dfce7eccf7cee8d864c5e9e24bc9854d17622a608ce37cf570b2fdd44eddec1d90310d40664bb341b57424a62f2cab398b9ff93d7623365be4f121
-
Filesize
1.0MB
MD568b5438fbfb90a9436d0903972f68488
SHA1b63c8b1f1176befa79f0400eb549bb1a277fd26e
SHA2566b7c462abe4f6d11c9076f660d1d52bdab8ed4cf5f5e7f8560d3d244303cbb4b
SHA5125c76e67d2df84992df7745451e865278b5486ecc800dc36e56240d3dcdc3316af1d614a499baf9e7014ea17b553bd5391741e06c4ff89e90b1694a8433028e9b
-
Filesize
1.0MB
MD550a8c7ccae74e6377dd482bc297b0a91
SHA154351f4da2b5c46da8be752a34faddd3abdac932
SHA2569e8a6f531b8ea0c7c685d6048d835b37e0832b2211527f888697c71eb73b7f64
SHA512bf13adb7d3e0d9a5512cd3c9425e484192c0ee26cc903178d61c719ba2ec37ed9aae41279bf446c08fbc2c5537f7044389f4f44efa7f62fffda2e607300d015a
-
Filesize
1.0MB
MD5590a8e5cecba0a6c9b2210bca73197fd
SHA18b3da937a467cf762604a55288c17e649d15c8da
SHA2569abc2f0d07d89aeb77b8bc20bfa394cc22d9ef21e7eabfe42fed23ea1de5e167
SHA512713eb67370f417cd07ce2594b4fca128e8fec443db541c531772698d08e9ab682f99dacb37fc638f5c0a4e04d519c115e3a8f4f6d38f691f5c1f33b074c0c188
-
Filesize
1.0MB
MD584d18b762da52fe3757a49aa413ebc78
SHA1cdb267dd1c03fb840cb1989db405eae6409280c0
SHA256db5eafbef10f05f5479afedfd2c4d9fb62c5c6c156e660560482b7d5d82335de
SHA5122dd3feb951d24958a2948722957d626f03470f5b8229b717d50c2c06064da63a017ed6452c7bc1411bee0046685b335f2fa6764e0a0b49c656063304bcba53bd
-
Filesize
1.0MB
MD54db14910b793ba1a5f64cb30f1611685
SHA17691b6c34da5b48dd8c3ffaadb4a6d5af34c6f05
SHA256f60b13768cd178f7afb0801388735e2ef5ca7713e4ced13dec3998a3f8f5925a
SHA5125a2643d1c7cc550ee04a089b61dc925519090ef7d219ce041ae31f31d6302f9b0ef8fe63ea94e343f36f8b290cc8e97a0528ee1c35db63b3fe4eccee954e986c
-
Filesize
361B
MD58d908dee235fa5e8672541305dc9b0b0
SHA154eb9a1d16d942109ffd235952be8ca4736ddc25
SHA256febb4af63422f6327cb17b6e0ade4018cff17250fcda0a6c2df7f600c2eaa839
SHA512f6e7b81cfd5aaeadabd231a494933f82e42c254e779f38ff65ba13eba5618f22acc40ff13f514bfa442513cc711c7e2f11605c3edefbc263e9cf9ffe89c01e0c
-
Filesize
17B
MD5c4f11c97075a6ce73f9be2b5d342c83f
SHA12c45fa2e5aaad8d5fc2d850b4a77c1cb3a8008d9
SHA25603542ea9000a1acef8a897fa73af788f1cfbf2f08007971c4ad7553c671a1d0a
SHA51210ddb6c96dd648db889a01356668aad979811d30e79f3c6687ff8762d9c297a9f5c69afe35b02f7a7357b5df0b193807c952eeb8b3c16b16494f20bf42705f1d
-
Filesize
361B
MD53b66bb3f5d86aadc5ae602a854161d46
SHA1140da6280d18d44daebf3ef225b1e358b7a7f9e1
SHA256d8e8191890deec43bebd2ef90ecee8c1e387ed2dda9cfbc1a93550a90f830e58
SHA5123f0a71a85419a79e271e79bfd359e0f153054c30c1cc866a727c742a5fba75f72b2a9ef3df6ca06e23ed7a63b7d4d31d7902fd7e3f6a3be84ebf0fd073110643
-
Filesize
361B
MD52949246f192dc70e58a04664663efaa6
SHA16e3fa9a3691b81f3db86cb43b020482dcfdbd5b5
SHA256a2db9f813766dc3f634f17d89cca4ece7c985ab14a51ec013932293556118f74
SHA512a1e87478ae9397dae2481fbe7208deb2a09a069a4b22101b3171e8d922e45598d3c8e29dca806ce2bc9d8b64b6dfa80a461c38908207573e16ba49ebed7d599f
-
Filesize
361B
MD5253a2a1ff343a700234ecd2583537c0e
SHA1c2f1e81d19c2edcb90c142411b7639f886f15d8b
SHA256de740c2f83a6dbfde29b8ba275ac36ecc5fca47ee3857a5b30c31914d18a0655
SHA512322444a5b327510934e9d14c4a3a1aafdcad5661a5dbc7156d510e020354c64db57f27fed102fb772a1f8b1b66d93e99e459a3734010c5d67785356ee5328693
-
Filesize
361B
MD5aa2b1fd0b2d086d26a99555b7fff45d4
SHA16a4f909e2ac84acdb3009d83c8bf0a0afd278a0d
SHA256eeb9939631b247fba19b181c717d17c0b6927964bc854c24aaf8c1fa3bb20314
SHA512e56d7cd1891b290e5a28f4d08e23ca0105cb947715f268714d62df508ddb0db4590819474b416da90658b863f43bc7dc2eaace904a402d79942964628fcb2d33
-
Filesize
361B
MD5b965c1941bb351d1e701b0118bcf4a7c
SHA1c6b996afd74dd4e1866b3287b5e3f92eeda7e3e1
SHA256e2ef8b77821a40727cbf3b2d628b5a65782226e6ef1fc626283bc34a709eccbe
SHA512f61149525b13b30b1d94ba671adcf22d23370ce934e6e0d7e807b32ad5de05693fa7d9019f080379da64d648c3b781e4b77d4d244460836903702c680f074e59
-
Filesize
361B
MD5fab38b4b8afcb1c58914707a5f486ee5
SHA1b13dc1a829a49f7a2e00c13865df6a0ec1a1b051
SHA256612dfe6c9c5ccc02e70789e3b5a50afed1578562e173e86674655b8399d481b0
SHA512956fb1def18ba52ee3d3203f35b6a7df6fb06637a9fc876cea6dd10fa46da35b7ea43ba8606f5af7f58397c4eab2b7fed3d0a9b5bc3debab734b7e957a34229e
-
Filesize
361B
MD594727900585bf094547583088b1de2a3
SHA111fcb237a0e6629a061f44b466fa39609e7daa1a
SHA25630d90a03c66f50fd19efae36609f81f0db7ae48c967f9bde22a3cdce430dc8fc
SHA512bedc0a209cbb0c43206051e163bbe4a4724fdf7f6605cbee9e4e2d741d4107f3f031c2b2b95454fe65a6b8ff1bd38c90f4868959165e8fa8891c0f63ba17ee95
-
Filesize
361B
MD56ca90b60cd2db62675738d9aea515c64
SHA1d0d2cf41d69d493fdc2544fd9046c48d57b19f85
SHA2566d80a32b5372cdb09f0d8f9175b9ad4f1d63fd9c9606f4bfec696ca7f6b0fc3c
SHA512e2298871ebe6056a58efd9c5c7b149173aa62d3a6fa65ef803facfdda29783b122626b2550b687def3419782a86b78e2dedfc15b8f5a61f70eaa0f9147711d63
-
Filesize
361B
MD548ddb7a4cdc3e6e47a1ad3c7359cfa27
SHA127789105c0d7fda4185b8ec36df816fbe9f5c456
SHA256aa4b7a12fbcd667c91aa145e28aa723036a5dfe18e114ea231b67870365ca584
SHA512711483ccb67e0a9202763aa28e59bbcc9cfc1ec93bb2350c6405288293ed50777eb4c8e7f4bad90f570a38ad65a08aa56d578a2acf27eccbc830f54b5d5130ae
-
Filesize
361B
MD5d5143ab600c167ce1cbb7c35a7f8f3d2
SHA1fa6255159980ae9af20773d7ac5a046ee0b2ccdc
SHA2565c5eb49c565e3015086193bd250db39409fef88cb8b8e7e8dacb418f599f83aa
SHA512957d892c7f29501d79a0322d996350e669a2bcf767904dcff2fac0dad5045f4a886737be9edd23ab6e7f950031fa44b4585aabbc1f861402a9a033e45795116e
-
Filesize
361B
MD57019f08a8a2637f688ad22fee5a09c63
SHA1f06a917c28a3e5ba65c0386b33f141116b91f041
SHA256b98b8180340d4fab2fa5a6280a2f8ce22c39a26d38884dfabbf4a3ce1df8c666
SHA512df235d439af4daad9e54f351b2f201800569f4dffdc9ba0161b2d7fccaee8d2ab6b0efd52b48cb60ab87e0e3c5d37ba3aafea8881e5d4360a722e5884be48350