Analysis
-
max time kernel
55s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 23:13
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00390.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00390.7z
-
Size
22.2MB
-
MD5
be01234d4d2719248cc7bfd2db5399f8
-
SHA1
30c4a2a41aa45b23d8ea01e547c0e7287b9ba256
-
SHA256
eaf4667ec6da80010831e61c49a8035dbf36a94ee99297848d3e673d15de52e5
-
SHA512
71d1fae415f5cb1bedeab41d51f5f8d116f1fa692beaf841e729050482b36647b425a8ac6b0e5ff8d3ad3dbe4d34d8133e06188281be416c9213253d35eaac57
-
SSDEEP
393216:bKwuR608VMFPJzP7sJSUgNyLNDcqt6/FGuEro0Y912PnhKMZTcc:N0D7sNBNuFfEM4PPoc
Malware Config
Extracted
azorult
http://185.130.215.95/ik0diey/index.php
Extracted
warzonerat
hive01.duckdns.org:8584
Signatures
-
Avaddon
Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.
-
Avaddon family
-
Avaddon payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe family_avaddon behavioral1/memory/4512-110-0x00000000008A0000-0x0000000000D77000-memory.dmp family_avaddon behavioral1/memory/4512-111-0x00000000008A0000-0x0000000000D77000-memory.dmp family_avaddon behavioral1/memory/4512-108-0x00000000008A0000-0x0000000000D77000-memory.dmp family_avaddon behavioral1/memory/4512-543-0x00000000008A0000-0x0000000000D77000-memory.dmp family_avaddon behavioral1/memory/4512-1043-0x00000000008A0000-0x0000000000D77000-memory.dmp family_avaddon -
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
GandCrab payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1208-150-0x00000000020A0000-0x00000000020B7000-memory.dmp family_gandcrab behavioral1/memory/1208-149-0x0000000000400000-0x000000000045F000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Hiverat family
-
Processes:
HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Xmrig family
-
HiveRAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/3620-1062-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/3620-1072-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/3620-1070-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/3620-1068-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/3620-1066-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/3620-1061-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/5284-1115-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe -
Warzone RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3708-1056-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/3708-1057-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/5604-1048-0x0000000000400000-0x00000000010B6000-memory.dmp xmrig -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MSbuild.exe HEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MSbuild.exe HEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe -
Executes dropped EXE 17 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Crusis.gen-ca953d329092c9aeb658cd69db542734fadc34ef4a113f63411a80888884d514.exeHEUR-Trojan-Ransom.MSIL.Foreign.gen-7d685e36c8627d81f5b6205702a94a06866b39341e28383a4dbfbbc54e567863.exeHEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exeHEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-c86127447c1ca99f50d252aacdbc074400053b6d3eebf053eb622ea9d2d9204e.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-c285362d2f0cda81372c976b3827794f73731dd9e54ff1762ef70dd077cf856f.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-83a4de085d04b1bf59b421a27b2e5168f55ccc763ebc7cf1dc4adf2df412071f.exeHEUR-Trojan-Ransom.Win32.Gen.vho-88b4243ce1630b49e01af9524a7b8edcae55eb2ed2e1a5290ade16921c900874.exeHEUR-Trojan-Ransom.Win32.Generic-9ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0.exeHEUR-Trojan-Ransom.Win32.Sodin.vho-f41ae53449ed9d769d604fedb3c7b1c980465448ee4b0fb4b7294870c9b333ee.exeTrojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exependrive.exewmiintegrator.exewmihostwin.exewmimic.exewmisecure.exewmisecure64.exepid process 5084 HEUR-Trojan-Ransom.MSIL.Crusis.gen-ca953d329092c9aeb658cd69db542734fadc34ef4a113f63411a80888884d514.exe 2544 HEUR-Trojan-Ransom.MSIL.Foreign.gen-7d685e36c8627d81f5b6205702a94a06866b39341e28383a4dbfbbc54e567863.exe 1328 HEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe 4512 HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe 3268 HEUR-Trojan-Ransom.Win32.Blocker.gen-c86127447c1ca99f50d252aacdbc074400053b6d3eebf053eb622ea9d2d9204e.exe 384 HEUR-Trojan-Ransom.Win32.Encoder.gen-c285362d2f0cda81372c976b3827794f73731dd9e54ff1762ef70dd077cf856f.exe 1208 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-83a4de085d04b1bf59b421a27b2e5168f55ccc763ebc7cf1dc4adf2df412071f.exe 2944 HEUR-Trojan-Ransom.Win32.Gen.vho-88b4243ce1630b49e01af9524a7b8edcae55eb2ed2e1a5290ade16921c900874.exe 4024 HEUR-Trojan-Ransom.Win32.Generic-9ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0.exe 2476 HEUR-Trojan-Ransom.Win32.Sodin.vho-f41ae53449ed9d769d604fedb3c7b1c980465448ee4b0fb4b7294870c9b333ee.exe 4788 Trojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exe 4296 pendrive.exe 464 wmiintegrator.exe 3616 wmihostwin.exe 2508 wmimic.exe 3560 wmisecure.exe 232 wmisecure64.exe -
Loads dropped DLL 3 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Encoder.gen-c285362d2f0cda81372c976b3827794f73731dd9e54ff1762ef70dd077cf856f.exepid process 384 HEUR-Trojan-Ransom.Win32.Encoder.gen-c285362d2f0cda81372c976b3827794f73731dd9e54ff1762ef70dd077cf856f.exe 384 HEUR-Trojan-Ransom.Win32.Encoder.gen-c285362d2f0cda81372c976b3827794f73731dd9e54ff1762ef70dd077cf856f.exe 384 HEUR-Trojan-Ransom.Win32.Encoder.gen-c285362d2f0cda81372c976b3827794f73731dd9e54ff1762ef70dd077cf856f.exe -
Processes:
resource yara_rule C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe themida behavioral1/memory/4512-110-0x00000000008A0000-0x0000000000D77000-memory.dmp themida behavioral1/memory/4512-111-0x00000000008A0000-0x0000000000D77000-memory.dmp themida behavioral1/memory/4512-108-0x00000000008A0000-0x0000000000D77000-memory.dmp themida behavioral1/memory/4512-543-0x00000000008A0000-0x0000000000D77000-memory.dmp themida behavioral1/memory/4512-1043-0x00000000008A0000-0x0000000000D77000-memory.dmp themida -
Processes:
resource yara_rule C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Encoder.div-726eddb66a4c65e4289dd7bfef9d4a11781c927706f17822069431801e0c6020.exe vmprotect behavioral1/memory/5592-549-0x0000000000180000-0x0000000000586000-memory.dmp vmprotect behavioral1/memory/5592-583-0x0000000000180000-0x0000000000586000-memory.dmp vmprotect behavioral1/memory/5540-685-0x00007FF768840000-0x00007FF768D66000-memory.dmp vmprotect behavioral1/memory/5592-943-0x0000000000180000-0x0000000000586000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Trojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Trojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exe -
Processes:
HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exedescription ioc process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-3350944739-639801879-157714471-1000\desktop.ini HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exedescription ioc process File opened (read-only) \??\B: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\A: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\L: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\U: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\F: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\V: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\E: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
Processes:
flow ioc 94 iplogger.org 97 iplogger.org 155 raw.githubusercontent.com 156 raw.githubusercontent.com 201 bitbucket.org 202 bitbucket.org -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 54 api.myip.com 55 api.myip.com -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
-
Processes:
resource yara_rule behavioral1/memory/5604-587-0x0000000000400000-0x00000000010B6000-memory.dmp upx behavioral1/memory/5520-604-0x0000000000400000-0x000000000086F000-memory.dmp upx C:\Users\Admin\SystemApps\AppSrv.exe upx behavioral1/memory/5520-1046-0x0000000000400000-0x000000000086F000-memory.dmp upx behavioral1/memory/5604-1048-0x0000000000400000-0x00000000010B6000-memory.dmp upx behavioral1/memory/5520-1117-0x0000000000400000-0x000000000086F000-memory.dmp upx \Device\HarddiskVolume1\Install.exe upx -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 832 1208 WerFault.exe HEUR-Trojan-Ransom.Win32.GandCrypt.gen-83a4de085d04b1bf59b421a27b2e5168f55ccc763ebc7cf1dc4adf2df412071f.exe 2764 2476 WerFault.exe HEUR-Trojan-Ransom.Win32.Sodin.vho-f41ae53449ed9d769d604fedb3c7b1c980465448ee4b0fb4b7294870c9b333ee.exe 5988 5428 WerFault.exe 5748 5592 WerFault.exe Trojan-Ransom.Win32.Foreign.ogeq-1c29ec8598c3c0434e96fa510ee7bf1367dccaeadba97b35219c669e20a000bd.exe 4980 5564 WerFault.exe Trojan-Ransom.Win32.Foreign.myji-de8ecf0fc20e170b98149cf5541438a0df8e887dcd2b6dce48dceaa237eebe78.exe 3592 5284 WerFault.exe 3.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
HEUR-Trojan-Ransom.MSIL.Crusis.gen-ca953d329092c9aeb658cd69db542734fadc34ef4a113f63411a80888884d514.exeHEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exeHEUR-Trojan-Ransom.Win32.Sodin.vho-f41ae53449ed9d769d604fedb3c7b1c980465448ee4b0fb4b7294870c9b333ee.exewmiintegrator.execmd.exewmic.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-c86127447c1ca99f50d252aacdbc074400053b6d3eebf053eb622ea9d2d9204e.exeHEUR-Trojan-Ransom.Win32.Gen.vho-88b4243ce1630b49e01af9524a7b8edcae55eb2ed2e1a5290ade16921c900874.exehelp.exeHEUR-Trojan-Ransom.MSIL.Foreign.gen-7d685e36c8627d81f5b6205702a94a06866b39341e28383a4dbfbbc54e567863.exeHEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-83a4de085d04b1bf59b421a27b2e5168f55ccc763ebc7cf1dc4adf2df412071f.exeHEUR-Trojan-Ransom.Win32.Generic-9ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0.exeTrojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exependrive.exewmic.exewmihostwin.exewmisecure.exewmisecure64.exewmic.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-c285362d2f0cda81372c976b3827794f73731dd9e54ff1762ef70dd077cf856f.exewmimic.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Crusis.gen-ca953d329092c9aeb658cd69db542734fadc34ef4a113f63411a80888884d514.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Sodin.vho-f41ae53449ed9d769d604fedb3c7b1c980465448ee4b0fb4b7294870c9b333ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiintegrator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.gen-c86127447c1ca99f50d252aacdbc074400053b6d3eebf053eb622ea9d2d9204e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Gen.vho-88b4243ce1630b49e01af9524a7b8edcae55eb2ed2e1a5290ade16921c900874.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Foreign.gen-7d685e36c8627d81f5b6205702a94a06866b39341e28383a4dbfbbc54e567863.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.GandCrypt.gen-83a4de085d04b1bf59b421a27b2e5168f55ccc763ebc7cf1dc4adf2df412071f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-9ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pendrive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmihostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisecure.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisecure64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-c285362d2f0cda81372c976b3827794f73731dd9e54ff1762ef70dd077cf856f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmimic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
Processes:
pendrive.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings pendrive.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exetaskmgr.exepowershell.exepid process 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1548 powershell.exe 1548 powershell.exe 1548 powershell.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 1188 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepowershell.exeHEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exeHEUR-Trojan-Ransom.MSIL.Foreign.gen-7d685e36c8627d81f5b6205702a94a06866b39341e28383a4dbfbbc54e567863.exewmic.exewmic.exewmic.exedescription pid process Token: SeRestorePrivilege 3732 7zFM.exe Token: 35 3732 7zFM.exe Token: SeSecurityPrivilege 3732 7zFM.exe Token: SeDebugPrivilege 2188 taskmgr.exe Token: SeSystemProfilePrivilege 2188 taskmgr.exe Token: SeCreateGlobalPrivilege 2188 taskmgr.exe Token: SeDebugPrivilege 1188 taskmgr.exe Token: SeSystemProfilePrivilege 1188 taskmgr.exe Token: SeCreateGlobalPrivilege 1188 taskmgr.exe Token: 33 2188 taskmgr.exe Token: SeIncBasePriorityPrivilege 2188 taskmgr.exe Token: SeDebugPrivilege 1548 powershell.exe Token: SeDebugPrivilege 1328 HEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe Token: SeDebugPrivilege 2544 HEUR-Trojan-Ransom.MSIL.Foreign.gen-7d685e36c8627d81f5b6205702a94a06866b39341e28383a4dbfbbc54e567863.exe Token: SeIncreaseQuotaPrivilege 3528 wmic.exe Token: SeSecurityPrivilege 3528 wmic.exe Token: SeTakeOwnershipPrivilege 3528 wmic.exe Token: SeLoadDriverPrivilege 3528 wmic.exe Token: SeSystemProfilePrivilege 3528 wmic.exe Token: SeSystemtimePrivilege 3528 wmic.exe Token: SeProfSingleProcessPrivilege 3528 wmic.exe Token: SeIncBasePriorityPrivilege 3528 wmic.exe Token: SeCreatePagefilePrivilege 3528 wmic.exe Token: SeBackupPrivilege 3528 wmic.exe Token: SeRestorePrivilege 3528 wmic.exe Token: SeShutdownPrivilege 3528 wmic.exe Token: SeDebugPrivilege 3528 wmic.exe Token: SeSystemEnvironmentPrivilege 3528 wmic.exe Token: SeRemoteShutdownPrivilege 3528 wmic.exe Token: SeUndockPrivilege 3528 wmic.exe Token: SeManageVolumePrivilege 3528 wmic.exe Token: 33 3528 wmic.exe Token: 34 3528 wmic.exe Token: 35 3528 wmic.exe Token: 36 3528 wmic.exe Token: SeIncreaseQuotaPrivilege 3472 wmic.exe Token: SeSecurityPrivilege 3472 wmic.exe Token: SeTakeOwnershipPrivilege 3472 wmic.exe Token: SeLoadDriverPrivilege 3472 wmic.exe Token: SeSystemProfilePrivilege 3472 wmic.exe Token: SeSystemtimePrivilege 3472 wmic.exe Token: SeProfSingleProcessPrivilege 3472 wmic.exe Token: SeIncBasePriorityPrivilege 3472 wmic.exe Token: SeCreatePagefilePrivilege 3472 wmic.exe Token: SeBackupPrivilege 3472 wmic.exe Token: SeRestorePrivilege 3472 wmic.exe Token: SeShutdownPrivilege 3472 wmic.exe Token: SeDebugPrivilege 3472 wmic.exe Token: SeSystemEnvironmentPrivilege 3472 wmic.exe Token: SeRemoteShutdownPrivilege 3472 wmic.exe Token: SeUndockPrivilege 3472 wmic.exe Token: SeManageVolumePrivilege 3472 wmic.exe Token: 33 3472 wmic.exe Token: 34 3472 wmic.exe Token: 35 3472 wmic.exe Token: 36 3472 wmic.exe Token: SeIncreaseQuotaPrivilege 3600 wmic.exe Token: SeSecurityPrivilege 3600 wmic.exe Token: SeTakeOwnershipPrivilege 3600 wmic.exe Token: SeLoadDriverPrivilege 3600 wmic.exe Token: SeSystemProfilePrivilege 3600 wmic.exe Token: SeSystemtimePrivilege 3600 wmic.exe Token: SeProfSingleProcessPrivilege 3600 wmic.exe Token: SeIncBasePriorityPrivilege 3600 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepid process 3732 7zFM.exe 3732 7zFM.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 2188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 2188 taskmgr.exe 1188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exetaskmgr.exepid process 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 2188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 2188 taskmgr.exe 1188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe 1188 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cmd.exepid process 4752 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
taskmgr.exepowershell.execmd.exeHEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exeTrojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exeHEUR-Trojan-Ransom.Win32.Generic-9ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0.exependrive.exewmiintegrator.exewmihostwin.exewmimic.exedescription pid process target process PID 2188 wrote to memory of 1188 2188 taskmgr.exe taskmgr.exe PID 2188 wrote to memory of 1188 2188 taskmgr.exe taskmgr.exe PID 1548 wrote to memory of 4752 1548 powershell.exe cmd.exe PID 1548 wrote to memory of 4752 1548 powershell.exe cmd.exe PID 4752 wrote to memory of 5084 4752 cmd.exe HEUR-Trojan-Ransom.MSIL.Crusis.gen-ca953d329092c9aeb658cd69db542734fadc34ef4a113f63411a80888884d514.exe PID 4752 wrote to memory of 5084 4752 cmd.exe HEUR-Trojan-Ransom.MSIL.Crusis.gen-ca953d329092c9aeb658cd69db542734fadc34ef4a113f63411a80888884d514.exe PID 4752 wrote to memory of 5084 4752 cmd.exe HEUR-Trojan-Ransom.MSIL.Crusis.gen-ca953d329092c9aeb658cd69db542734fadc34ef4a113f63411a80888884d514.exe PID 4752 wrote to memory of 2544 4752 cmd.exe HEUR-Trojan-Ransom.MSIL.Foreign.gen-7d685e36c8627d81f5b6205702a94a06866b39341e28383a4dbfbbc54e567863.exe PID 4752 wrote to memory of 2544 4752 cmd.exe HEUR-Trojan-Ransom.MSIL.Foreign.gen-7d685e36c8627d81f5b6205702a94a06866b39341e28383a4dbfbbc54e567863.exe PID 4752 wrote to memory of 2544 4752 cmd.exe HEUR-Trojan-Ransom.MSIL.Foreign.gen-7d685e36c8627d81f5b6205702a94a06866b39341e28383a4dbfbbc54e567863.exe PID 4752 wrote to memory of 1328 4752 cmd.exe HEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe PID 4752 wrote to memory of 1328 4752 cmd.exe HEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe PID 4752 wrote to memory of 1328 4752 cmd.exe HEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe PID 4752 wrote to memory of 4512 4752 cmd.exe HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe PID 4752 wrote to memory of 4512 4752 cmd.exe HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe PID 4752 wrote to memory of 4512 4752 cmd.exe HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe PID 4752 wrote to memory of 3268 4752 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.gen-c86127447c1ca99f50d252aacdbc074400053b6d3eebf053eb622ea9d2d9204e.exe PID 4752 wrote to memory of 3268 4752 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.gen-c86127447c1ca99f50d252aacdbc074400053b6d3eebf053eb622ea9d2d9204e.exe PID 4752 wrote to memory of 3268 4752 cmd.exe HEUR-Trojan-Ransom.Win32.Blocker.gen-c86127447c1ca99f50d252aacdbc074400053b6d3eebf053eb622ea9d2d9204e.exe PID 4752 wrote to memory of 384 4752 cmd.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-c285362d2f0cda81372c976b3827794f73731dd9e54ff1762ef70dd077cf856f.exe PID 4752 wrote to memory of 384 4752 cmd.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-c285362d2f0cda81372c976b3827794f73731dd9e54ff1762ef70dd077cf856f.exe PID 4752 wrote to memory of 384 4752 cmd.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-c285362d2f0cda81372c976b3827794f73731dd9e54ff1762ef70dd077cf856f.exe PID 4752 wrote to memory of 1208 4752 cmd.exe HEUR-Trojan-Ransom.Win32.GandCrypt.gen-83a4de085d04b1bf59b421a27b2e5168f55ccc763ebc7cf1dc4adf2df412071f.exe PID 4752 wrote to memory of 1208 4752 cmd.exe HEUR-Trojan-Ransom.Win32.GandCrypt.gen-83a4de085d04b1bf59b421a27b2e5168f55ccc763ebc7cf1dc4adf2df412071f.exe PID 4752 wrote to memory of 1208 4752 cmd.exe HEUR-Trojan-Ransom.Win32.GandCrypt.gen-83a4de085d04b1bf59b421a27b2e5168f55ccc763ebc7cf1dc4adf2df412071f.exe PID 4752 wrote to memory of 2944 4752 cmd.exe HEUR-Trojan-Ransom.Win32.Gen.vho-88b4243ce1630b49e01af9524a7b8edcae55eb2ed2e1a5290ade16921c900874.exe PID 4752 wrote to memory of 2944 4752 cmd.exe HEUR-Trojan-Ransom.Win32.Gen.vho-88b4243ce1630b49e01af9524a7b8edcae55eb2ed2e1a5290ade16921c900874.exe PID 4752 wrote to memory of 2944 4752 cmd.exe HEUR-Trojan-Ransom.Win32.Gen.vho-88b4243ce1630b49e01af9524a7b8edcae55eb2ed2e1a5290ade16921c900874.exe PID 4752 wrote to memory of 4024 4752 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-9ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0.exe PID 4752 wrote to memory of 4024 4752 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-9ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0.exe PID 4752 wrote to memory of 4024 4752 cmd.exe HEUR-Trojan-Ransom.Win32.Generic-9ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0.exe PID 4752 wrote to memory of 2476 4752 cmd.exe help.exe PID 4752 wrote to memory of 2476 4752 cmd.exe help.exe PID 4752 wrote to memory of 2476 4752 cmd.exe help.exe PID 4752 wrote to memory of 4788 4752 cmd.exe Trojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exe PID 4752 wrote to memory of 4788 4752 cmd.exe Trojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exe PID 4752 wrote to memory of 4788 4752 cmd.exe Trojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exe PID 4512 wrote to memory of 3528 4512 HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe wmic.exe PID 4512 wrote to memory of 3528 4512 HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe wmic.exe PID 4512 wrote to memory of 3528 4512 HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe wmic.exe PID 4788 wrote to memory of 1192 4788 Trojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exe cmd.exe PID 4788 wrote to memory of 1192 4788 Trojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exe cmd.exe PID 4788 wrote to memory of 1192 4788 Trojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exe cmd.exe PID 4024 wrote to memory of 4296 4024 HEUR-Trojan-Ransom.Win32.Generic-9ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0.exe pendrive.exe PID 4024 wrote to memory of 4296 4024 HEUR-Trojan-Ransom.Win32.Generic-9ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0.exe pendrive.exe PID 4024 wrote to memory of 4296 4024 HEUR-Trojan-Ransom.Win32.Generic-9ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0.exe pendrive.exe PID 4296 wrote to memory of 464 4296 pendrive.exe wmiintegrator.exe PID 4296 wrote to memory of 464 4296 pendrive.exe wmiintegrator.exe PID 4296 wrote to memory of 464 4296 pendrive.exe wmiintegrator.exe PID 464 wrote to memory of 3616 464 wmiintegrator.exe wmihostwin.exe PID 464 wrote to memory of 3616 464 wmiintegrator.exe wmihostwin.exe PID 464 wrote to memory of 3616 464 wmiintegrator.exe wmihostwin.exe PID 3616 wrote to memory of 2508 3616 wmihostwin.exe wmimic.exe PID 3616 wrote to memory of 2508 3616 wmihostwin.exe wmimic.exe PID 3616 wrote to memory of 2508 3616 wmihostwin.exe wmimic.exe PID 2508 wrote to memory of 3560 2508 wmimic.exe wmisecure.exe PID 2508 wrote to memory of 3560 2508 wmimic.exe wmisecure.exe PID 2508 wrote to memory of 3560 2508 wmimic.exe wmisecure.exe PID 2508 wrote to memory of 232 2508 wmimic.exe wmisecure64.exe PID 2508 wrote to memory of 232 2508 wmimic.exe wmisecure64.exe PID 2508 wrote to memory of 232 2508 wmimic.exe wmisecure64.exe PID 4512 wrote to memory of 3472 4512 HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe wmic.exe PID 4512 wrote to memory of 3472 4512 HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe wmic.exe PID 4512 wrote to memory of 3472 4512 HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe wmic.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00390.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3732
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1188
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.MSIL.Crusis.gen-ca953d329092c9aeb658cd69db542734fadc34ef4a113f63411a80888884d514.exeHEUR-Trojan-Ransom.MSIL.Crusis.gen-ca953d329092c9aeb658cd69db542734fadc34ef4a113f63411a80888884d514.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5084 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "HEUR-Trojan-Ransom.MSIL.Crusis.gen-ca953d329092c9aeb658cd69db542734fadc34ef4a113f63411a80888884d514.exe:Zone.Identifier"4⤵PID:1168
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "HEUR-Trojan-Ransom.MSIL.Crusis.gen-ca953d329092c9aeb658cd69db542734fadc34ef4a113f63411a80888884d514.exe:Zone.Identifier"4⤵PID:5252
-
-
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.MSIL.Foreign.gen-7d685e36c8627d81f5b6205702a94a06866b39341e28383a4dbfbbc54e567863.exeHEUR-Trojan-Ransom.MSIL.Foreign.gen-7d685e36c8627d81f5b6205702a94a06866b39341e28383a4dbfbbc54e567863.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exeHEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1328 -
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe"C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe"4⤵PID:3604
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"5⤵PID:1288
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"6⤵PID:5988
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"6⤵PID:3708
-
-
-
C:\Users\Admin\AppData\Roaming\2.exe"C:\Users\Admin\AppData\Roaming\2.exe"5⤵PID:3136
-
C:\Users\Admin\AppData\Roaming\2.exe"C:\Users\Admin\AppData\Roaming\2.exe"6⤵PID:3620
-
-
-
C:\Users\Admin\AppData\Roaming\3.exe"C:\Users\Admin\AppData\Roaming\3.exe"5⤵PID:5196
-
C:\Users\Admin\AppData\Roaming\3.exe"C:\Users\Admin\AppData\Roaming\3.exe"6⤵PID:5284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5284 -s 7647⤵
- Program crash
PID:3592
-
-
-
-
-
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exeHEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe3⤵
- UAC bypass
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4512 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.Blocker.gen-c86127447c1ca99f50d252aacdbc074400053b6d3eebf053eb622ea9d2d9204e.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-c86127447c1ca99f50d252aacdbc074400053b6d3eebf053eb622ea9d2d9204e.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3268
-
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.Encoder.gen-c285362d2f0cda81372c976b3827794f73731dd9e54ff1762ef70dd077cf856f.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-c285362d2f0cda81372c976b3827794f73731dd9e54ff1762ef70dd077cf856f.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:384 -
C:\Users\Admin\AppData\Local\Temp\y_installer.exeC:\Users\Admin\AppData\Local\Temp\y_installer.exe --partner 351634 --distr /quiet /msicl "YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=666"4⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe"C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe" /quiet /msicl "YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=666"5⤵PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\y_installer.exeC:\Users\Admin\AppData\Local\Temp\y_installer.exe --stat dwnldr/p=351634/cnt=0/dt=3/ct=3/rt=0 --dh 2332 --st 17305028655⤵PID:5768
-
-
-
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-83a4de085d04b1bf59b421a27b2e5168f55ccc763ebc7cf1dc4adf2df412071f.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-83a4de085d04b1bf59b421a27b2e5168f55ccc763ebc7cf1dc4adf2df412071f.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 4884⤵
- Program crash
PID:832
-
-
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.Gen.vho-88b4243ce1630b49e01af9524a7b8edcae55eb2ed2e1a5290ade16921c900874.exeHEUR-Trojan-Ransom.Win32.Gen.vho-88b4243ce1630b49e01af9524a7b8edcae55eb2ed2e1a5290ade16921c900874.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.Generic-9ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0.exeHEUR-Trojan-Ransom.Win32.Generic-9ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Roaming\pendrive.exe"C:\Users\Admin\AppData\Roaming\pendrive.exe" C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.Generic-9ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe" unk5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe" unk26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe" unk37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe" execute8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3560
-
-
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe" autorun8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:232 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:5880
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:5932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:5596
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:7644
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f9⤵PID:11564
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.Sodin.vho-f41ae53449ed9d769d604fedb3c7b1c980465448ee4b0fb4b7294870c9b333ee.exeHEUR-Trojan-Ransom.Win32.Sodin.vho-f41ae53449ed9d769d604fedb3c7b1c980465448ee4b0fb4b7294870c9b333ee.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 5484⤵
- Program crash
PID:2764
-
-
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exeTrojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\cmd.execmd /ccmd /cHELP&help&cmd /cru..................................jse&help&exit4⤵
- System Location Discovery: System Language Discovery
PID:1192 -
C:\Windows\SysWOW64\cmd.execmd /cHELP5⤵
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Windows\SysWOW64\help.exeHELP6⤵
- System Location Discovery: System Language Discovery
PID:1168
-
-
-
C:\Windows\SysWOW64\help.exehelp5⤵PID:2476
-
-
C:\Windows\SysWOW64\cmd.execmd /cru..................................jse5⤵PID:4896
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ru..................................jse"6⤵PID:4936
-
-
-
-
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Blocker.iwia-5caf695c28b6f70c3c8e8609d3f904857e76ad6f0f6aee5eececb0bf707701a8.exeTrojan-Ransom.Win32.Blocker.iwia-5caf695c28b6f70c3c8e8609d3f904857e76ad6f0f6aee5eececb0bf707701a8.exe3⤵PID:5428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5428 -s 2364⤵
- Program crash
PID:5988
-
-
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Blocker.lckf-be55d94db005244285fc0393a2b2d7c9bcb365812e1b2a60b48094dc8b21ccca.exeTrojan-Ransom.Win32.Blocker.lckf-be55d94db005244285fc0393a2b2d7c9bcb365812e1b2a60b48094dc8b21ccca.exe3⤵PID:5444
-
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Blocker.mpus-68f1ae4f8738b1fba9b21476af582f4a4a63cf2a68f33eade7fdc65280cc9711.exeTrojan-Ransom.Win32.Blocker.mpus-68f1ae4f8738b1fba9b21476af582f4a4a63cf2a68f33eade7fdc65280cc9711.exe3⤵PID:5456
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9824.tmp\9825.tmp\9826.bat C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Blocker.mpus-68f1ae4f8738b1fba9b21476af582f4a4a63cf2a68f33eade7fdc65280cc9711.exe"4⤵PID:5436
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "MicroProWork Corporation" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Managed In-process Helper DLL.scr" /f5⤵PID:5340
-
-
C:\Users\Admin\AppData\Roaming\Managed In-process Helper DLL.scr"Managed In-process Helper DLL.scr"5⤵PID:5020
-
C:\Users\Admin\AppData\Roaming\Managed In-process Helper DLL.sCr"C:\Users\Admin\AppData\Roaming\Managed In-process Helper DLL.sCr"6⤵PID:4072
-
-
-
-
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Cryptor.dtn-e453400f413b4ad2e996c28b7e72be2d42fc2a8d30e9c91a67a0e0e6915aff7f.exeTrojan-Ransom.Win32.Cryptor.dtn-e453400f413b4ad2e996c28b7e72be2d42fc2a8d30e9c91a67a0e0e6915aff7f.exe3⤵PID:5472
-
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Encoder.caq-6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exeTrojan-Ransom.Win32.Encoder.caq-6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe3⤵PID:5520
-
C:\Windows\SysWOW64\cmd.execmd /C "mkdir %userprofile%\SystemApps"4⤵PID:6084
-
-
C:\Windows\SysWOW64\cmd.execmd /C "copy Trojan-Ransom.Win32.Encoder.caq-6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe %userprofile%\SystemApps\AppSrv.exe"4⤵PID:5504
-
-
C:\Windows\SysWOW64\cmd.execmd /C "attrib +H %userprofile%\SystemApps"4⤵
- Hide Artifacts: Hidden Files and Directories
PID:5992 -
C:\Windows\SysWOW64\attrib.exeattrib +H C:\Users\Admin\SystemApps5⤵
- Views/modifies file attributes
PID:5644
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V SystemApps /t REG_SZ /F /D %userprofile%\SystemApps\AppSrv.exe"4⤵PID:4780
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V SystemApps /t REG_SZ /F /D C:\Users\Admin\SystemApps\AppSrv.exe5⤵
- Modifies registry key
PID:5852
-
-
-
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Encoder.div-726eddb66a4c65e4289dd7bfef9d4a11781c927706f17822069431801e0c6020.exeTrojan-Ransom.Win32.Encoder.div-726eddb66a4c65e4289dd7bfef9d4a11781c927706f17822069431801e0c6020.exe3⤵PID:5540
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c @echo off4⤵PID:5384
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color a4⤵PID:5500
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe"4⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http:\www.google.com4⤵PID:5676
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffefa7146f8,0x7ffefa714708,0x7ffefa7147185⤵PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10084448746834748531,16606089352495606601,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:25⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,10084448746834748531,16606089352495606601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:35⤵PID:5136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,10084448746834748531,16606089352495606601,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:85⤵PID:5664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10084448746834748531,16606089352495606601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:15⤵PID:6012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10084448746834748531,16606089352495606601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:15⤵PID:5572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10084448746834748531,16606089352495606601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:15⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10084448746834748531,16606089352495606601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:15⤵PID:6504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10084448746834748531,16606089352495606601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:15⤵PID:11200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10084448746834748531,16606089352495606601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:15⤵PID:11648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10084448746834748531,16606089352495606601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:15⤵PID:6224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,10084448746834748531,16606089352495606601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:85⤵PID:13992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,10084448746834748531,16606089352495606601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:85⤵PID:14220
-
-
-
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Encoder.kfw-264f2d87c5ea8ad59e5a50289cc694e55b6dd738c9a5c8fc79e9b3de3892586d.exeTrojan-Ransom.Win32.Encoder.kfw-264f2d87c5ea8ad59e5a50289cc694e55b6dd738c9a5c8fc79e9b3de3892586d.exe3⤵PID:5552
-
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Foreign.myji-de8ecf0fc20e170b98149cf5541438a0df8e887dcd2b6dce48dceaa237eebe78.exeTrojan-Ransom.Win32.Foreign.myji-de8ecf0fc20e170b98149cf5541438a0df8e887dcd2b6dce48dceaa237eebe78.exe3⤵PID:5564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5564 -s 4884⤵
- Program crash
PID:4980
-
-
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Foreign.ofid-9eb98f8b8d906a39d9b94c35c9e56adf29838b4d7aeba28c4b997c20a157acc6.exeTrojan-Ransom.Win32.Foreign.ofid-9eb98f8b8d906a39d9b94c35c9e56adf29838b4d7aeba28c4b997c20a157acc6.exe3⤵PID:5576
-
C:\Users\Admin\AppData\Roaming\Firefox.exe"C:\Users\Admin\AppData\Roaming\Firefox.exe"4⤵PID:12028
-
-
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Foreign.ogeq-1c29ec8598c3c0434e96fa510ee7bf1367dccaeadba97b35219c669e20a000bd.exeTrojan-Ransom.Win32.Foreign.ogeq-1c29ec8598c3c0434e96fa510ee7bf1367dccaeadba97b35219c669e20a000bd.exe3⤵PID:5592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5592 -s 11204⤵
- Program crash
PID:5748
-
-
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.PornoAsset.dicb-b7a1c91fe7678dfe124d8adc3ea23c4314b6b8580864a4f1c258e798a1b6879b.exeTrojan-Ransom.Win32.PornoAsset.dicb-b7a1c91fe7678dfe124d8adc3ea23c4314b6b8580864a4f1c258e798a1b6879b.exe3⤵PID:5604
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1208 -ip 12081⤵PID:4692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2476 -ip 24761⤵PID:4424
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5428 -ip 54281⤵PID:5640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5592 -ip 55921⤵PID:5468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5564 -ip 55641⤵PID:2872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5284 -ip 52841⤵PID:5952
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5532
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding CCC0955D72A4EDCF361AF88F5E1F88BE2⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\B4DA8E6A-AFD3-424A-8CA9-AB440EBB47CE\lite_installer.exe"C:\Users\Admin\AppData\Local\Temp\B4DA8E6A-AFD3-424A-8CA9-AB440EBB47CE\lite_installer.exe" --use-user-default-locale --silent --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --YABROWSER3⤵PID:6288
-
-
C:\Users\Admin\AppData\Local\Temp\A19A7800-07F0-4080-A590-415FE1D8EAF7\seederexe.exe"C:\Users\Admin\AppData\Local\Temp\A19A7800-07F0-4080-A590-415FE1D8EAF7\seederexe.exe" "--yqs=y" "--yhp=y" "--ilight=" "--oem=" "--nopin=n" "--pin_custom=n" "--pin_desktop=n" "--pin_taskbar=y" "--locale=us" "--browser=y" "--browser_default=" "--loglevel=trace" "--ess=" "--clids=C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml" "--sender=C:\Users\Admin\AppData\Local\Temp\37CA2971-C62D-4F86-AAA1-FC796E05846D\sender.exe" "--is_elevated=yes" "--ui_level=2" "--good_token=x" "--no_opera=n"3⤵PID:6444
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent --pin-taskbar=y --pin-desktop=n4⤵PID:6624
-
C:\Users\Admin\AppData\Local\Temp\pin\explorer.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent --pin-taskbar=y --pin-desktop=n /pin-path="C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.lnk" --is-pinning5⤵PID:10996
-
-
-
C:\Users\Admin\AppData\Local\Temp\37CA2971-C62D-4F86-AAA1-FC796E05846D\sender.exeC:\Users\Admin\AppData\Local\Temp\37CA2971-C62D-4F86-AAA1-FC796E05846D\sender.exe --send "/status.xml?clid=2278730-666&uuid=d2c32f43-b5e6-4f94-a75a-7b7f19fca4fb&vnt=Windows 10x64&file-no=8%0A10%0A11%0A12%0A13%0A15%0A17%0A18%0A20%0A21%0A22%0A25%0A36%0A40%0A42%0A45%0A57%0A61%0A89%0A102%0A103%0A111%0A123%0A124%0A125%0A129%0A"4⤵PID:7096
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\{E8A1DE75-ED31-4997-B06C-F4D8A978F848}.exe"C:\Users\Admin\AppData\Local\Temp\{E8A1DE75-ED31-4997-B06C-F4D8A978F848}.exe" --job-name=yBrowserDownloader-{E21E1678-A897-4B0A-8D59-0AF4AEC37506} --send-statistics --local-path=C:\Users\Admin\AppData\Local\Temp\{E8A1DE75-ED31-4997-B06C-F4D8A978F848}.exe --YABROWSER --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --silent --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=2278714-666&ui={d2c32f43-b5e6-4f94-a75a-7b7f19fca4fb} --use-user-default-locale1⤵PID:11868
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
911B
MD5d9f1ede2c0573497bd0a6c6756a2cced
SHA142f8628ba21d5f7b98e0c767af97dafe48e727db
SHA256688045d21e8363a6a3782c202182c6d399f28ecc5df4d2239d3ebee399428eda
SHA512d85c58c610d8b0aca231c43bb2dcfec5d08ea9cf3a9903daba97df82af95811ac65e3b962911359ccad6d1bb84e50c9900c093ce123d5964d2716afd1357f5e9
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
5KB
MD530241957ccf80d79ce95c2b33d6f062f
SHA1a38142f4e9d0f7e4120dd10a5e7bacef2c860d4a
SHA2566d7c535f3ecd5b99c5cf0faab7cddd3e861b628fb16fca9d7b986bd76ff8d597
SHA512e8915137e178dd840ddeba99f27a272b954c49af8abba59fa5a4143d95d970216e6b89a81ded52451881c379c92ed292f5442b8e055826920e6d21d0bfe780fa
-
Filesize
6KB
MD557c23ecfccc007973bcf9d1a4a92a1e3
SHA18ce54c6b629925f0351a48bfa975bc515e94848a
SHA256229edd2f7b3929997474d0a4443ca3c4e3731cad43359c0698a0cd6cd493bfb1
SHA512759e531858d868b1fd5fc707197b9613fa34bb98c8c9a591650e2259fcb6651b9ed1102cef7afbd9104680cecb74a255ff483c38f4968e0035d5d1b01722ccac
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5223bddf96f6dffc98b04d625672dc5ed
SHA13f0e7308cac76e76a51a383bc0a93ce109c465a9
SHA256c9792c504aa88e4176d8fb3f92e46d3575319c8b020621c6473e94b79d8a3679
SHA512691e61fbaf5f6726877fec1b4c32b2f54d02f88510d65bb1c857321302babc5f43811bda3a7bf1b38b2d22bfb67122cf68671e3500e8709278351156d4186464
-
Filesize
5KB
MD5a6f6261de61d910e0b828040414cee02
SHA1d9df5043d0405b3f5ddaacb74db36623dd3969dc
SHA2566bb91f1d74389b18bce6e71772e4c5573648c1a4823338193f700afdf8216be5
SHA51220cb7b646c160c942e379c6e7a1a8981a09f520361c0205052c1d66e2fdb76333ffaaf0ca1dfc779754f0e844b9946900fbd5690d01869e1607abc1fda6dffab
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\thumbnails\5d832db5d41e60982214acd0aa0e47c7
Filesize15KB
MD5af80a936c10e18de168538a0722d6319
SHA19b1c84a1cf7330a698c89b9d7f33b17b4ba35536
SHA2562435c0376fca765b21d43e897f4baa52daa0958a7015d04103488c606c99d1d3
SHA5129a1325c8ce05806e5c161a4cf47239f62baad8f79650fbd713e74928fce8171ced10ba7f24fac46c548e1dbf3f64106270cb25ca88c836c870107f5dc1f97879
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\thumbnails\d4a7f1971f35998f420f4ca8faaf417d
Filesize6KB
MD5e05d28ab78d61968a7132eafe61f54b4
SHA1dcf260ab7cdea7b6fc934e54765c964c1a20bd36
SHA256cbd302b0ea2218f495b9f0a814f34733f2c5f13a6634d74c6e85a5c0863b5621
SHA512ebea612bf803692fa3c7b2573c58f2e43fba0f7039e01b57203978cf69b6f8ca538b563791a760a7e901bb5e392879bd57bdbdb69b6a3781a3886fc0c01eddc0
-
Filesize
10.1MB
MD5e6d10b61b551b826819f52ac1dd1ea14
SHA1be2cdcba51f080764858ca7d8567710f2a692473
SHA25650d208224541ab66617323d8d791c06970a828eeb15b214965a5d88f6a093d41
SHA5120d5d98424bab24ccced9b73d5ed58851d320e0540963a3ccc14da6d6231b2413136fa11458dc2155bb5844af9e28f3a053f8b7f709a806a4070c5ff737fb0ac8
-
Filesize
802KB
MD59e4a5826a1a1cf37b3027322a8e74486
SHA1b0b9dff61fcdbc511c4334140560dbda591ba128
SHA25672cd89c71677d1817c44ce69177bd32e9ffc51f41c9cb7357fcfd16323a93762
SHA512eb19a8a7fda6d9e39620465d8a216d109fff57539f1fd7ae478267b7944f27d93dfe819246260852334d42eff92cf369fe97e75641bbfb04f13d1535fc79bd34
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
14KB
MD58c308660d10b4401c835f56d10b6c9e0
SHA17c4537cb08cd444df35de684a04bbfd5b00f501b
SHA25604ada35fb711abc9d09316bd318f89780caeebe70eac6e418d71a9875a8127d2
SHA512fa3540aeb8c3fd3c81cfd3769a8f641e04afb82cbd829ea49a852a44d203e32c442620626e09ebb2964637dcf1cbce2a29642417767001a89684f788752e6cfd
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a
-
Filesize
16KB
MD5c8ffec7d9f2410dcbe25fe6744c06aad
SHA11d868cd6f06b4946d3f14b043733624ff413486f
SHA25650138c04dc8b09908d68abc43e6eb3ab81e25cbf4693d893189e51848424449f
SHA5124944c84894a26fee2dd926bf33fdf4523462a32c430cf1f76a0ce2567a47f985c79a2b97ceed92a04edab7b5678bfc50b4af89e0f2dded3b53b269f89e6b734b
-
Filesize
11KB
MD5da979fedc022c3d99289f2802ef9fe3b
SHA12080ceb9ae2c06ab32332b3e236b0a01616e4bba
SHA256d6d8f216f081f6c34ec3904ef635d1ed5ca9f5e3ec2e786295d84bc6997ddcaa
SHA512bd586d8a3b07052e84a4d8201945cf5906ee948a34806713543acd02191b559eb5c7910d0aff3ceab5d3b61bdf8741c749aea49743025dbaed5f4c0849c80be6
-
Filesize
42.1MB
MD5bf952b53408934f1d48596008f252b8d
SHA1758d76532fdb48c4aaf09a24922333c4e1de0d01
SHA2562183a97932f51d5b247646985b4e667d8be45f18731c418479bbd7743c825686
SHA512a510a96e17090ada1a107e0f6d4819787652ab3d38cd17237f255c736817c7cfcb3fd5cf25f56d5693f4923375b2ab9548e9215070e252aae25c3528b2186d99
-
Filesize
510B
MD527bdb0864e3f7a9f6c61810adeaa9f53
SHA13c911d197a054a51a1ad444e3bcc4b634063597a
SHA2565981cca348493c670d47550ec9b201662046f5bb7c298af860c28814ff2f112f
SHA5120a4d78904c5efc0a2529b8d6f3e8e7001dd59807de8e9bd195e2f8a561b2e15de827dd65a74f7010f534f24df5fa2adb3e56074848878119955890feacde24ea
-
Filesize
14.6MB
MD5eb832c13649e41da3aa921a0753b4194
SHA122d196021b0e67b98b4beb4495e1d0b7052c0581
SHA2565b7e127a42b52b282640fb227da4005ee280b669bef57a9197b01a2eb6c1da46
SHA5125a4367b5cd6a4f6f1343cf47244f40b99518989feb345d2d263caeeb7f9f5dbe3e3538456718adc4cdaa2ca2d0ddd880292fc4794905f135ddc579a9a67b16fe
-
Filesize
2KB
MD5d3671ba4a17023f7a9ac6fc4720a6ebf
SHA1e5a8191d15afab8897ea1944cf792dbe16073399
SHA2567e9561c9bfa59d0acc1947fe6d05e96a0d3b51830725712252e64b9aa5c1c762
SHA512b97dff14ca3ac8081d263f6fbd3db1a0988d9080ee4f29392f486b16f7f0e4b1699aebd886f7323d049625136ee64e3f8bd000cc33e95c2bf073f33ef76621b2
-
Filesize
397KB
MD595828ee007d3586792d53ace50b2357e
SHA13501ccad7573fd467911f207155318db3a1a1554
SHA2568c4be5f1bc4e2f73d4396af48a31bf10362006472e9b28f40aa91f73a3815f12
SHA5129896eccb178fd772fc92e5793340bdbc1bd6169465d9a739df06c1154edbce16f6db5dd50df426ccbc40d8410d4ef170c3fb0bc700e7778149ff2168409638e7
-
Filesize
515B
MD51e63f6624a6ff3c308ea92c75b17d3a3
SHA123567ecb9581c048853a904f58a982dd3c9e9b10
SHA25697ac1a85f499b359be29deca4328bfcda295b53bd3f915b6d567b7d75158bd9f
SHA5121ea1a01eb8e7975125b0296ad34eab4ccef562da49533bd496fd3a09a2d482689a8639f69960336e3e4608b680c4d03ab2b468047f38083c50867a0442fdcbda
-
Filesize
393KB
MD5ea33ef88c0e9cf45dcd70dc971c46e02
SHA168bad4331a4f108a7ced1dfe0e87a63fc5ded774
SHA2566b0c966be8f3ebf3faf33582428a16b669d7571125108c7bbd8308882c55d709
SHA51237c8c9404bedf6e032b1de937641b70586ad51a5a4e95fb08798a472bff5f3766123b98e4059d08f2608932d860325ab111e093276b1c71a9286b7e5d8211998
-
Filesize
585KB
MD5bf400de7c5e0fb5fe483cb09c0ccb745
SHA146199385eb5aeccd6638d77a980c780344ac8ace
SHA256fafbac3283f1c1b642284c1cee4c4111a165df2afce327798e739e1bb09984fc
SHA512255c6fd43bd6e8954fec5e37b9c4aef9b210728073173ac51bc5ffaa6cb3cddab32d854c027ed7c0ff3e3d311e5b8e3c5a3ed3e1e08e8ccd60449485ec9bc93d
-
Filesize
584KB
MD5d21695b6d9bdd7ed0e35a0c70ce38205
SHA133522e95507f48e68a981b1097bcbe0354e31c1a
SHA25615a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c
SHA5120550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f
-
Filesize
68KB
MD5314cb7ffb31e3cc676847e03108378ba
SHA13667d2ade77624e79d9efa08a2f1d33104ac6343
SHA256b6d278384a3684409a2a86f03e4f52869818ce7dd8b5779876960353f7d35dc1
SHA512dc795fa35ea214843a781ee2b2ef551b91b6841a799bef2c6fb1907d90f6c114071a951ebb7b2b30e81d52b594d447a26ab12ddb57c331e854577d11e5febef5
-
Filesize
2KB
MD5636701832967f3ab9f5796c846bfa36e
SHA1fe447254a517ee38343feea8d89a814ab21d6aa0
SHA256a0b40defa33e4df6793cd08a0bf6c9ca6d208b3aa836dc035f8a98211d50a2ff
SHA5125f622c2d15ed102d1efb8db6687934a1c051008523da8e1aa5c41bbe134fc70cf72c7a048fdc25eb7b0e8ade6e6d7cfee9fe70bf32a85d54cfee5e7412ce40d2
-
Filesize
1KB
MD53adec702d4472e3252ca8b58af62247c
SHA135d1d2f90b80dca80ad398f411c93fe8aef07435
SHA2562b167248e8136c4d45c2c46e2bff6fb5e5137dd4dfdccde998599be2df2e9335
SHA5127562e093d16ee6305c1bb143a3f5d60dafe8b5de74952709abc68a0c353b65416bf78b1fa1a6720331615898848c1464a7758c5dfe78f8098f77fbfa924784c0
-
Filesize
18KB
MD502e859888da71ef93305b08b245c87c1
SHA1055b29b964534dc15857adf69bc5af4316852697
SHA256ce01a860cd0588b395eb784ace9277147beb69300cceaab0ef9aa7fc8a72c037
SHA512c9e1b4083b43f61386c6f1938c7c54280da2999b879594ae877ac954304a0e8de6787c7da37ab69777de904eb92360724ab6314f688c6a75756a5282cfde33c0
-
Filesize
318B
MD5fe2228417f609a6ddc8990d96bcadd14
SHA16bafa7f9a9d1da0ec838fcf8c9625fc045904561
SHA25694fe91aa91c4ea645f819cb330c3118853d6a40f9b55175f4de8583199c51813
SHA51219cbdbd6290d4688ca474d3f117dfd9336c2d0d8477c6409207698e10e4e2251e989668735c7a5fe51a5ffb9968602612068113fc9b80232dd09d7f011e17937
-
Filesize
262KB
MD5bf65035fd1936fbb11df73304ac38535
SHA1d1ca93701c10313cab6582d5ff8b8401b5ec7c02
SHA256fe4f959547575a25fdfb8d58580cc61d7e2096eb71106be5c6917cc443b35a34
SHA5124faa20f299123fbcb083b6210138aaacb53682de65157ba46877a2d3dc5aa00e5b2a6f9dc88d6c728b6c3a01efcd673ef06339e096e7e442b9e516bc9b87f1b2
-
Filesize
262KB
MD5a80b3aa76c2225de3a8c7e949691b86e
SHA11e239508991c22817117a74f6ba5b918967e26af
SHA256bc2f6f90673bfa2b7687dfd7d0427406df40252674ee5832bc472afdd2d6d388
SHA5121b6018d394ddf46d298ea7725aa1a230ff1653ed5ca2a38521b00daf30ee833fcf075831dab97ff0e13bac406aa9bc816ba5203ee58c9ad80c6417f21122b80f
-
Filesize
262KB
MD513938d0b2ddc5e9b345130430230caa2
SHA1752aac0b32e155c01444ac6d66db020488902238
SHA256db33a338607565f1874b4bc0cda2d79418d17a7de684ad22eb833294cbde2205
SHA51289da773d3f4ffc8318958ce6e7a02d66d1ed59c0e060f8950ea9331de0647ba3c14f608585c4560368d1ccceb6171120529b62a1a0edc7300e35173373190b09
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.MSIL.Crusis.gen-ca953d329092c9aeb658cd69db542734fadc34ef4a113f63411a80888884d514.exe
Filesize509KB
MD5962d71301a1b94ab5f602c6c46ffd384
SHA1f443da99ae86e4307ce218963861149b8b71bd4e
SHA256ca953d329092c9aeb658cd69db542734fadc34ef4a113f63411a80888884d514
SHA5127fb446c654b5a24ca57a850ded4a1e5cffc0e18c226d4cfbda9d9662faf6486b643fc81e52c1b8dd5eb4371faa1505ccb337d3fa6b1f5316d55fb4cd28445a92
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.MSIL.Foreign.gen-7d685e36c8627d81f5b6205702a94a06866b39341e28383a4dbfbbc54e567863.exe
Filesize1.0MB
MD532fef41093b0af299e01eaa40f261ca6
SHA195525d7d4a62a101d08c49fe167bfec66e73e96c
SHA2567d685e36c8627d81f5b6205702a94a06866b39341e28383a4dbfbbc54e567863
SHA512f7de41ecb09047a123650afcc1189fc0c87b5a0b67b2630b3293dd65aa89a55270c7ac546a948e1ec10da9109fb89cf493492e3b1fe2556a987406b10c402b15
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.MSIL.Spora.gen-0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe
Filesize1.8MB
MD54e7eb50a75f8bf74751576cdd5381809
SHA17e0dfbdd505b9451513b828e4d392e164fe566e9
SHA2560976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c
SHA51205b9ae0aef714798034ac0c271f5a1ef44221e9b56480f6de3e07d9e94e438bd0ba11ef44c6ff48267d0d9a94ec18355641c67d744d51326c8c7569048b660f3
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.Avaddon.vho-7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365.exe
Filesize4.8MB
MD56ff1ca648505fe8bea6b4a26616b9722
SHA17020b4d9e700b697d507a61bffea12c9475a23d2
SHA2567b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365
SHA512e65d67e22807e1a539997bd763fc6063226fce207c57b3b0316ef7640471f460016fa5f58feb006ff96dd7a2cf5bcff7c17f0af763e8518431fe13ce6d8c9db2
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.Blocker.gen-c86127447c1ca99f50d252aacdbc074400053b6d3eebf053eb622ea9d2d9204e.exe
Filesize1.1MB
MD51a640e4d7804288d0c2b860369b9789b
SHA1ffa16119c6dc243ad24dbb21d1783097c6c87f1d
SHA256c86127447c1ca99f50d252aacdbc074400053b6d3eebf053eb622ea9d2d9204e
SHA512f4fc9f7648888c0c3c99320f82af757d5c9075b144d6ff8c1afec15812e4a5d980b45cf6e13f010a95773d0ef0ef216dccfa84aef1baf54bdde4e9d6bcea4e91
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.Encoder.gen-c285362d2f0cda81372c976b3827794f73731dd9e54ff1762ef70dd077cf856f.exe
Filesize201KB
MD5831c1c601be7c16e03169e8251f70a33
SHA1ff6b1cf14ea2ed482091a3deba292549dbb792c3
SHA256c285362d2f0cda81372c976b3827794f73731dd9e54ff1762ef70dd077cf856f
SHA51221fd94b81a895701be155aac2f375c97356942c4269c00ff8b7d9a2f34b47d4271dadd8e030b623481e156c775147e6cd927ee24e8f5e8ba10247dc9c1b7cc13
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-83a4de085d04b1bf59b421a27b2e5168f55ccc763ebc7cf1dc4adf2df412071f.exe
Filesize321KB
MD5e360a2fadde78f5f6864068c20b8e7bc
SHA1b3d466ed4d4aeb75e7621520c0fcba503fbafb74
SHA25683a4de085d04b1bf59b421a27b2e5168f55ccc763ebc7cf1dc4adf2df412071f
SHA512a564745d71b1f9a514799cda4d131b9bc4b06d9fd71befd125f76974a82a0b1039c6f9a9947bab83921e78c5525ab10b922d0b55d288592dfc40b3681f539252
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.Gen.vho-88b4243ce1630b49e01af9524a7b8edcae55eb2ed2e1a5290ade16921c900874.exe
Filesize389KB
MD5f705ae10ee0742c922ca530b1f5a6b09
SHA1a42f4bb6092a98267ccb4d7f2f354092c86c2847
SHA25688b4243ce1630b49e01af9524a7b8edcae55eb2ed2e1a5290ade16921c900874
SHA512efa70954e23de5728fff5f338e0f7523b4b0f65af507acfbe12b44499fa032c7048d6ed2425be525f59303125dd6388af412d79780335d2fb23b15a3f645c919
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.Generic-9ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0.exe
Filesize262KB
MD509f7bfc0f9274b8de90a827270d488b0
SHA102c6637a70884f8a4934cffa635d17fff8606ed4
SHA2569ed5939ea8422f12514d53b1518004222f385e43d17a12f0372bfd46cf0850b0
SHA5121c84ba053882742aeff2c0136e153b58970c857a8633c7a1cb49fbbc6ea5f9477a324a840c725e3554e0a2dd781619b4df67a645f6a6222650b766919457d140
-
C:\Users\Admin\Desktop\00390\HEUR-Trojan-Ransom.Win32.Sodin.vho-f41ae53449ed9d769d604fedb3c7b1c980465448ee4b0fb4b7294870c9b333ee.exe
Filesize246KB
MD5088b1d28c53e1cfbe795f047f7d0f6f9
SHA1c14e958f4424b25477779c9e427257f92545d5ec
SHA256f41ae53449ed9d769d604fedb3c7b1c980465448ee4b0fb4b7294870c9b333ee
SHA512f2e9826ae31cc5d4df34a8783028dc0acbc74e5201a6b954c323d0173563c15a57850e8d81242286127a0a97727a3b0e59450312e5704b083607fa1d5ef2f684
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Agent.azbv-3320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536.exe
Filesize263KB
MD53720523ef42644b37bc895d47b1a5850
SHA11b4f5b49eff04cd2b50fcf230c2caaa200701097
SHA2563320ddfa73df3e02e6daf617ae73cdff1575eeba72da735123c94ed567fce536
SHA512f2db1b80ed3ac68e71b745f4b4f03a08268dd1959a2ab05592abfefbec9f13f805bf23d6e8459873f6e579d80d1f673978d048ac74b1dd21cd7a144bbdc5a515
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Blocker.fkst-0630b658972a2027e68002605b4e4b632d33a8cf9a73d26d57bd1c6f05421825.exe
Filesize464KB
MD5db473b2b4c3aadda51580060a46ae44a
SHA18d75fad7e230c54e773308c1c9d98ed3b1c9fe78
SHA2560630b658972a2027e68002605b4e4b632d33a8cf9a73d26d57bd1c6f05421825
SHA51256025e95fbb94ecaf3d6900f68f91791fa762bd038b92acf22f52e000763dc9ae09be7c7f2d9fb0a0071d18d06802dd1693d2b5f6f405eb729a35f38e364abfe
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Blocker.iwia-5caf695c28b6f70c3c8e8609d3f904857e76ad6f0f6aee5eececb0bf707701a8.exe
Filesize357KB
MD5108efe03a91329dd849cca7ef0424187
SHA1dd778aa00f298d0c17ce2cbf2a4e213801f00b53
SHA2565caf695c28b6f70c3c8e8609d3f904857e76ad6f0f6aee5eececb0bf707701a8
SHA5123f635c3510b7de7f301758330b39083c05d97727e6562d35a680ef9dc027975a8245998c1a29988aa8e101128a56a4f8cfc9ecd94b08e57d7ee14728cbb9cd0b
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Blocker.lckf-be55d94db005244285fc0393a2b2d7c9bcb365812e1b2a60b48094dc8b21ccca.exe
Filesize112KB
MD50676dd45bdaf6142d9edacfe9bba29ba
SHA11aba020cdd1a4a82cdf970a6f14ae94eb304992d
SHA256be55d94db005244285fc0393a2b2d7c9bcb365812e1b2a60b48094dc8b21ccca
SHA51260d5828768009122c20809af144934ce779cd564e3d443b4d87a1323094570223986183d5dacfdd031a2037764c7a8eebf50398b552078256a13dd09c154f4f3
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Blocker.mpus-68f1ae4f8738b1fba9b21476af582f4a4a63cf2a68f33eade7fdc65280cc9711.exe
Filesize2.0MB
MD53dc7a4031c1f545d6d86a075f573ff20
SHA1c258e704002685ec57e0e18504d2d3594a8472f8
SHA25668f1ae4f8738b1fba9b21476af582f4a4a63cf2a68f33eade7fdc65280cc9711
SHA512a395c8287495b29b6d643efc76633ff2bfa3f5f764b71cf83a37bf28c64ea53fb84e7cc23160d8510d0114ea582410dc14c0ed28f64141581bbb4cdc033a4e88
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Cryptor.dtn-e453400f413b4ad2e996c28b7e72be2d42fc2a8d30e9c91a67a0e0e6915aff7f.exe
Filesize6.3MB
MD56eb69acd2ac82be838c8b3d8910b0d70
SHA16316421e06a6000f9736696f3b0d1f08ac1134c7
SHA256e453400f413b4ad2e996c28b7e72be2d42fc2a8d30e9c91a67a0e0e6915aff7f
SHA5122b5402b5270bdc6949c2eebdc1ef4855f77a8e06cb894a7315ce24bdd45ab10d1b279282d50aef17ca7641b0279e08b1320295e1dfadf0f1a8607c901a1cce5d
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Encoder.div-726eddb66a4c65e4289dd7bfef9d4a11781c927706f17822069431801e0c6020.exe
Filesize2.6MB
MD5bcfcd4426956cbf0f6aec3342ac1f95d
SHA146ace3779461506ba7baecb24580de0ed7e2f7cf
SHA256726eddb66a4c65e4289dd7bfef9d4a11781c927706f17822069431801e0c6020
SHA51268af9a89cf04b59bf5fae4529cf47c5eebb71a918c0e57b8a4b1c24ca74377518294060c8efc4ee702165303b525b9a2e18b9cd7e526ee61a79bb341199220ef
-
C:\Users\Admin\Desktop\00390\Trojan-Ransom.Win32.Encoder.kfw-264f2d87c5ea8ad59e5a50289cc694e55b6dd738c9a5c8fc79e9b3de3892586d.exe
Filesize420KB
MD5d1d10b06d5824c6b6e793b32462e46a2
SHA1824e0cbd63d3943d3bba332e1556fba78190e628
SHA256264f2d87c5ea8ad59e5a50289cc694e55b6dd738c9a5c8fc79e9b3de3892586d
SHA51216713dd4f8d0898c6d83a0520aeb3542f716bc456aecd62bcddc767d014f793e8dce3293b91b83605c0132467b2285205fb958a6f9a663b1be42eee66b9c74c7
-
Filesize
51B
MD5ee184142cc5fab272780c9b5f5f3e1db
SHA11ae9c77f9f1f06f03396236ed5a71bcfc3effc5a
SHA256b71e3f58c691372c595dd4cad6e4a046e773604dae5bbc98534831dfec2318ae
SHA51284d58ad40f36c09328c9cb4e607b0d2db67865df5bbb8e6f82904b8214f9c10e57b46b31205c19fc50cafc14c6c174690634885df8f9cb32df8dfef28dbcdc16
-
Filesize
8KB
MD52d0a0058e6a498307e561f93b0cbf653
SHA165ab231205847f0d888f07eb99930a95853c61fe
SHA256d2bf3d3f9b25f68a016bbe3d601b1997f2754e1543aef3b27deb86ead0a15432
SHA512b58724a73dbd7c369494366417b83848aee5b4139a31aa0c75aed44f8bcd738da7e5b2e8758fc2f488fb5c8b1b7f10549f4569a8cd9e8780b0d2d97156e9f642
-
Filesize
1.6MB
MD5d644eb3560601aa504917b281306a350
SHA1b43554ea4fa8eed7a9d36e4172546487b627a45d
SHA2566dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8
SHA512c9a2100bd23d583d63c5fd37251b81407036f422d5cdcf2386419d78eaf25fbf2fa7bc6d34ef33f2b427ead5004ce92da9184a70d5c202d2dcb12571b403fc46
-
Filesize
181KB
MD50c80a997d37d930e7317d6dac8bb7ae1
SHA1018f13dfa43e103801a69a20b1fab0d609ace8a5
SHA256a5dd2f97c6787c335b7807ff9b6966877e9dd811f9e26326837a7d2bd224de86
SHA512fe1caef6d727344c60df52380a6e4ab90ae1a8eb5f96d6054eced1b7734357ce080d944fa518cf1366e14c4c0bd9a41db679738a860800430034a75bb90e51a5
-
Filesize
11B
MD584be494cbbf410b3a6a0bd120f5f9f00
SHA14d949862a0289dd6b66c1642e2ca668e6907ab2c
SHA25696a8b52d5d8be68c0f15f674d24c75347a8b2ebad15cc386cde1127fd6ee37be
SHA5122a97caece7e241b06a0920a4caa0a8d01e10ca1f8c95d6cbb28a0105678a513929eff81c8ed9f01fdc2efdea160a8e7943b053b2d06c7190881e823926586c9e
-
Filesize
8.5MB
MD504eed9d1d836a9313214fca470c8874c
SHA1f0f8e83ca6f04ade0f4030aa59a69975b158744f
SHA256b7a1c91fe7678dfe124d8adc3ea23c4314b6b8580864a4f1c258e798a1b6879b
SHA512db36929e8e1491317da0b2105cd117ca6e2004d44b824a32158e75bbb32d98f3a1a8ccccfe3eb2047928c8c1145f062d1ae2b13048da91e4ab16fdb7bae4d7cc